MISPost 600
MISPost 600
MISPost 600
Information
SyStemS
Solving BuSineSS ProBlemS with
information technology
Gerald V. Post
Sixth Edition
Management
Information
Systems
Solving Business Problems
With
Information Technology
Version 6.0.1
Gerald V. Post
University of the Pacifc
Management Information Systems
Solving Business Problems with Information Technology
Copyright 2012 by Gerald V. Post
All rights reserved. No part of this publication may be reproduced or distributed
in any form or stored in any database or retrieval system without the prior written
consent of Gerald V. Post.
The cover photo shows a bicycle hill in Northern California but is a metaphor for
the road to understanding information technology. It can be a fun road with scen-
ery, climbs, and turns.
Students:
Your honesty is critical to your reputation. No company wants to hire a thief
particularly for jobs as critical as application development and database adminis-
tration. If someone is willing to steal something as inexpensive as an e-book, how
can that person be trusted with billions of dollars in corporate accounts?
You are not allowed to share this book in any form with anyone else. You can-
not give or sell any information from this publication in any form to anyone else.
To purchase this book or other books: http://JerryPost.com/Books
To my parents.
v Preface
v
Preface
Managers and Information Technology
Today, everyone uses computers. But does everyone use them effciently? How
many business people turn to a spreadsheet when a database would be a better
tool? Do managers understand how information technology can solve business
problems? As a future manager, do you know about all of the technologies that
businesses are using? Can you spot a business problem and identify possible in-
formation technology solutions? Can you tell when a company is simply wasting
money on technology and not solving problems?
Over the past decade, technology has changed many jobs. Competition and an
economic downturn caused companies to cut costs wherever possible. In many
cases, that meant reducing the number of employees. In the past few years,
companies have used technology to alter and even eliminate management jobs.
Twenty years ago, new college graduates could get entry-level jobs as manag-
ers, often performing relatively simple analytical tasks or summarizing data. To-
day, software does those jobs and generates detailed information on demand for
executives.
If you want a job as a manager, you need to know how to use information tech-
nology. But it is not simply a matter of knowing how to use a word processor or
spreadsheet. You need to use the technology to collaborate with other workers, to
analyze data, and to fnd ways to improve your organization.
Continual changes in IT present two challenges: learning to use new technolo-
gies and fnding new opportunities to improve management. Most students have
taken a hands-on course that teaches them how to use a computer. Many expect
the introductory MIS course to be more of the samehands-on computer usage
tied to specifc needs. However, there are more complex and interesting problems
to be solved. Managers need to apply their knowledge of IT tools to solve man-
agement problems and fnd new opportunities to improve their organizations. The
focus of this book is to investigate the more complex question: How can informa-
tion technology be used to improve management and make companies more ef-
fcient or better than their competitors?
Learning Assessment
After fnishing the book, students should be able to evaluate common business
problems and identify information technology solutions that could help an orga-
nization. Students should be able to explain their choices and point out potential
problems or issues.
Anyone who teaches this material knows that this learning objective is diff-
cult to meetbecause of the huge number of possible issues and the fexibility
required in analyzing problems. To meet the objective, smaller, and more concrete
goals are presented in each chapter. Each of these is spelled out as a series of ques-
tions at the start of the chapter. By the end of each chapter, students should be able
to provide intelligent answers to the various questions.
The book provides several tools to achieve its objectives. The industry cases
and Reality Bytes show business problems and how organizations have attacked
them. The body of the text explains the problems in more detail and focuses on the
strengths and weaknesses of the various tools used to solve similar problems. The
Technology Toolboxes and chapter exercises show students how to apply specifc
tools and concepts to solve problems.
vi Preface
Organization
The organization of the text builds from basic computer concepts to teamwork and
strategy. Each section and chapter is focused on how managers can use informa-
tion technology to solve business problems. In particular, the frst section focuses
on the information technology infrastructurethe specifc tools and technologies
used to collect, transfer, and store data. These hardware and software tools form
the building blocks of any information system.
The second section explores how IT is used to support business integration and
teamwork. It begins by analyzing the importance of computer security when shar-
ing data, and includes chapters on enterprise resource planning (ERP) systems
and using the Internet for electronic business. The teamwork chapter examines the
role of recent tools for collaboration and teamworkcritical concepts in todays
business organizations. These tools constitute some of the most recent additions to
any companys toolbox. Any manager needs to be able to use these tools to work
with colleagues across the room and around the world.
The third section focuses on tools to analyze data and make decisions. As the
power of computers and software increases, more tasks get transferred to the ma-
chines. To adapt and grow, managers need to move to higher-level tasks including
evaluating the data, identifying strategies, and organizing new businesses.
The fourth section looks at issues directly affecting the management of infor-
mation technology resources. The chapters deal with how systems are developed
and the management issues of the development process. Organizing the resources,
particularly centralization and decentralization are also critical topics for manag-
ers who need to resolve conficts and determine the best ways to ft IT into an
organization. The last chapter looks at broader issues of how information technol-
ogy decisions affect society and how the political and social environments infu-
ence business technology decisions. Privacy, crime, jobs, and education are top-
ics that managers need to factor
into their business decisions.
The organization of the text
is based on two features. First,
each chapter emphasizes the
goal of the text: applying infor-
mation technology to improve
management and organizations.
Second, the text is organized
so that it begins with concepts
familiar to the students and
builds on them.
Each chapter is organized in
a common format: (1) the in-
troduction ties to the goal and
raises questions specifc to that
chapter, (2) the main discussion
emphasizes the application of
technology and the strengths
and weaknesses of various ap-
proaches, and (3) the applica-
Chapter 1: Introduction
Part 1: Information Technology Infrastructure
Chapter 2: Information Technology Foundations
Chapter 3: Networks and Telecommunications
Chapter 4: Database Management
Part 2: Business Integration
Chapter 5: Computer Security
Chapter 6: Transactions and ERP
Chapter 7: Electronic Business
Chapter 8: Teamwork
Part 3: Decisions and Strategies
Chapter 9: Business Decisions
Chapter 10: Strategic Analysis
Chapter 11: Entrepreneurship
Part 4: Organizing Businesses and Systems
Chapter 12: Systems Development
Chapter 13: Organizing MIS Resources
Chapter 14: Information Mgt. and Society
vii Preface
tion of technology in various real-world organizations is presented in the end-of-
chapter cases.
Chapter 1 (Introduction) remains an introduction to MIS and provides an ex-
planation of the goalsemphasizing the texts focus on how technology can help
managers perform their jobs and improve the companies they manage.
Chapter 2 (Information Technology Foundations) reviews the basic issues
in personal productivity and hardware and software. It emphasizes recent issues
such as the growing importance of wireless devices. It also discusses issues in
choosing computers used in e-business such as the importance of scalability in
servers.
Chapter 3 (Networks and Telecommunications) explains the role of net-
works in managing businesses. It also explains the foundations of the Internet, so
students can understand how problems can arise on the Internet and why certain
technologies have evolved to solve them.
Chapter 4 (Database Management) explains the importance of database sys-
tems in business. The focus remains on managers roles and uses of databases,
such as querying databases and building reports.
Chapter 5 (Computer Se-
curity) focuses on the business
problems and threats. It explains
the various tools and the fact
that business managers are criti-
cal in helping maintain computer
security.
Chapter 6 (Transactions and
Enterprise Resource Planning)
raises the main issues in opera-
tions and transaction processing.
It includes the role of account-
ing and HRM systems as well
as supply chain management
and customer relationship man-
agement, particularly payment
mechanisms. The goal is to show
managers how the systems are
used to solve common business
problems.
Chapter 7 (Electronic Busi-
ness) describes the various ways
that companies can use the Inter-
net to extend their businesses. It
includes traditional e-commerce
applications, as well as Web ser-
vices and mobile commerce.
Chapter 8 (Teamwork) ex-
plains the increasing importance
of teamwork and collaboration
tools. Managers need these tools
in almost any business, and al-
most no other textbooks even
Technology Toolbox
1 Choosing a Search Engine
Finding Information on the Internet
2 Voice Input
Creating Efective Charts
3 Creating Web Pages
Transferring Files on the Internet
4 Building Forms in Access
Creating Database Reports
5 Assigning Security Permissions
Encryption
6 Selecting an ERP System
Designing an EIS/Dashboard
7 Choosing Web Server Technologies
Paying for Transactions
8 Collaborating with SharePoint
Meeting Space and IM
9 Forecasting a Trend
Browsing Data with a PivotTable
10 Locating Customers with a GIS
Analyzing Businesses
11 Sending E-Mail Legally (CAN-
SPAM)
Creating a Business Plan
12 Creating Forms with InfoPath
Programming a New Function in Excel
13 Defning E-Mail Rules
Managing Projects
14 Privacy
Working in a Global Environment
viii Preface
talk about them. Here, an entire chapter ex-
plains the problems that need to be solved
and shows how the various tools support
communication, collaboration, and knowl-
edge management.
Chapter 9 (Business Decisions) begins
with the basic importance of using analyti-
cal tools to make decisions. It then explains
how basic tools help managers evaluate
data, from decision support systems to data
mining. Expert systems are introduced to
show how computers can make more ad-
vanced decisions. Specialized tools and
topics in artifcial intelligence research are
used to show how more intelligent soft-
ware can solve even relatively complex
problems.
Chapter 10 (Strategic Analysis) ex-
plores in detail how information systems
are used to support the functional business
areas to help gain a competitive advantage.
The chapter also explores how IT helps entrepreneurs create new businesses.
Chapter 11 (Entrepreneurship) examines how information technology is used
to start new companies and manage small businesses. By defnition, small busi-
nesses have few employees so it becomes critical for entrepreneurs to leverage
the technology to handle the thousands of details of managing a growing business.
Chapter 12 (Systems Development) looks at systems design and various de-
velopment alternatives. It examines the challenges faced in developing software
and the continuing movement to commercial off-the-shelf software.
Chapter 13 (Organizing MIS Resources) looks at the issues involved in the
organization and management of MIS resources. In examining MIS roles, it also
presents job opportunities. The chapter discusses how wireless, intranets, and
Web services are having important effects on the structure and management of IT
resources.
Chapter 14 (Information Management and Society) is an expanded discus-
sion of the impact of IT on societyparticularly the effects of the Internet. It
investigates the issue of privacy versus business, social, and governmental needs.
It examines the potential changes in a global society that is increasingly linked
online.
Features Tat Focus on Solving Problems
Why do you need a textbook? You have access to the Internet and you can fnd
millions of articles discussing technology, even online support for various soft-
ware tools. You can read several online magazines about information technolo-
gyfor free. Regardless of where you live, you can subscribe to manufacturer
press releases and watch the technology change. You can subscribe to the Wall
Street Journal and read about business, technology, governance, and host of other
enlightening subjects. And yes, if you are serious about business and informa-
tion technology, you should do all of these things. But you can still use a text-
Case focus: Industry
1 Fast Food
2 Computer Industry
3 Wholesale Suppliers
4 Pharmaceuticals
5 Professional Sports
6 Automobile Industry
7 Retail Sales
8 Package Delivery
9 Financial Services
10 Airline Industry
11 Entrepreneurship
12 Government Agencies
13 Energy Industry
14 Health Care
ix Preface
book. This textbook provides a structure to the information. It teaches you how
the many pieces ft together to solve business problems. It provides the context
and ideas on how to analyze the millions of tidbits of data foating on the Web.
Use the textbook to provide the foundation knowledge that describes the informa-
tion system discipline. Then when you read new facts and see new technologies
evolve, you can understand how to use them to improve your career.
Each chapter contains several unique features to assist in understanding the ma-
terial and in applying it to analyze and solve business problems. Each chapter
focuses on a specifc type of problem. These problems are highlighted by the in-
troduction and demonstrated in the business cases. The text dissects the problems
and explores how technology can be used to solve the problems.
What You Will Learn in This Chapter. A series of questions highlight the
important issues.
Lead Case. An introductory, real-world case illustrates the problems ex-
plored in the chapter.
Trends. Sidebar boxes present the major changes, brief history, or trends
that affect the topics in the chapter.
Reality Bytes. Brief applications, mini-cases, and discussions emphasize a
specifc point and highlight international issues, business trends, or ethics.
They also illustrate problems and solutions in the real world.
Technology Toolboxes. A short example and description of a software tool
that can be used to help managers solve specifc problems. They provide a
hands-on example of specifc projects. Students are encouraged to follow the
exercises and use the software tools to build the examples.
Chapter summary. A brief synopsis of the chapter highlightsuseful when
reviewing for exams.
A Managers View. A short summary of how the material in the chapter ap-
plies to building applications.
Key Words. A list of words introduced in the chapter. A full glossary is pro-
vided at the end of the text.
Website References. Web sites that provide discussions or links to useful
topics.
Review Questions. Designed as a study guide of the main topics in the
chapter..
Exercises. Problems that apply the knowledge learned in the chapter. Many
utilize common application software to illustrate the topics. Questions and
Exercises marked with a checkmark icon have at basic solutions available
online. Students can check their knowledge and progress by checking their
work on these exercises.
Additional Reading. References for more detailed investigation of the
topics.
Industry-Specifc Cases. In-depth discussion of the lead case and several
other companies. Each chapter highlights a specifc industry and compares
x Preface
different approaches
to the problems faced
by the frms..
Rolling Thunder Bi-
cycles Database Ap-
plication. A sample
company database
with integrated data
for several years. Use-
ful for demonstrating
transactions, creating
business queries, and
analyzing data.
Goals and Philosophy
All of the chapters emphasize the goal of understanding how information
technology can be used to improve management. The focus is on under-
standing the benefts and costs of technology and its application.
Emphasis is on the importance of database management systems. Increas-
ingly, managers need to retrieve data, and utilize a DBMS to investigate,
analyze and communicate.
Emphasis is also placed on the importance of communication, teamwork,
collaboration, and integration of data. Understanding information technol-
ogy requires more than knowledge of basic application packages. Students
need to use and understand the applications of groupware technologies.
In-depth cases illustrate the use of technology. By focusing each chapter
on a specifc industry, students can understand and evaluate a variety of ap-
proaches. Many cases illustrate companies varying over time, so students
can see the changes occurring in business and understand the evolving role
and importance of information technology.
The Rolling Thunder Database, a medium-size, detailed database application
of a small business, is available on disk. Specifc exercises are highlighted in
each chapter. The database contains data and applications suitable for oper-
ating a small (fctional) frm. It also contains data generation routines so that
instructors can create their own scenarios.
Tis Book Is Diferent from Other Texts
First, this book is a business text designed for an upper division or M.B.A. course,
so it does not have the hundreds of step-by-step instructions to show students how
to use a particular piece of software. It addresses the more diffcult question of
how to use information technology to solve business problems. Consequently, this
text focuses on business issues frst.
Second, this book is not simply a dictionary or encyclopedia that defnes tech-
nology terms in one or two sentences. Students need to understand the various
technology tools and see how they actually solve business problems. This book
uses detailed cases to show the business problems and the technological solutions
xi Preface
to illustrate each chapter. It also contains in-depth explanations of various technol-
ogy issues, showing their strengths and weaknesses. Where possible, these tools
are also demonstrated with hands-on applications, through the accompanying da-
tabases and through the Technology Toolboxes.
E-Book Edition
When Congress holds hearings about them you know that textbook prices have
become absurd. Simply applying the concepts in this subject and textbook it is
clear that e-books are the only viable answer. With this approach, prices are rea-
sonable and students can download the book anywhere in the world, 24-hours a
day. More important, students can keep the textbook for future reference. Yes,
some people still like paper. If you truly believe you prefer paper, go ahead and
print your own personal copy. But, before you kill a tree, check out the new tablet
PCs and the Sony e-book Reader or Kindle DX using the e-Ink technology.
Changes to the Sixth Edition
Updates
The sixth edition keeps the same overall structure as the ffth edition. All chapters
were revised and updated. The early chapters have more accurate and up-to-date
descriptions, along with more fgures describing the new technologies. All of the
data charts have been updated to the most current data. All examples are illus-
trated with Offce 2010 tools. There is a greater discussion of online tools. Almost
all of the Reality Bytes are new, and all cases have been updated with a few new
ones added. The data for Rolling Thunder has been improved and updated and
extended through 2011 to provide more realistic analyses. About one-third to one-
half of the exercises have been replaced or rewritten.
Newer topics have been added, including extensible business report language,
computer forensics, virtual machines, near-feld communications, telepresence,
augmented reality, e-discovery, bandwidth hogs, and search engine optimization.
A new section on cloud computing was added to each chapter. Cloud comput-
ing has been around for a few years, but more options and tools are available and
it is becoming popular, so managers need to understand the strengths and weak-
nesses of cloud computing. With the continued emphasis on mobile computing
using smartphones and tablets, cloud computing becomes more important.
Focus on Business Problems
MIS is a business class, so students need to begin with the business perspective
and then see how technology can solve the problems. The chapters emphasize this
focus by beginning with a series of questions. Specifc, real-world cases highlight
aspects of these problems so that students see the problems in context. Almost all
of the main cases have been replaced or updated. The chapter then addresses the
questions and demonstrates how technology can be used to solve the problems.
Each chapter begins with a set of questions that will be addressedproviding stu-
dents with a direct learning objective. The questions also serve to increase student
curiosity, by raising issues that they are not likely to have considered before. Sev-
eral chapters have been restructured and the overall book has been reorganized to
emphasize the business focus.
xii Preface
Technology Toolboxes
More details of technologies have been added. The goal is to build a stronger
bridge between the underlying technologies and hands-on tools to business appli-
cations and strategies. Students should be encouraged to understand the technical
as well as the business issues, and they should at least experiment with the tech-
nologies in the book. Chapters 2 and 3 include more technical details in particular.
Collaboration and Teamwork
Some of the biggest changes in software and technology in the last few years have
been designed to improve collaboration and teamwork. It is critical that manag-
ers be able to use these tools, and they are not taught in typical introductory tools
courses. This text covers these tools in Chapter 8 and uses Technology Toolboxes
to demonstrate the basic features. In addition, each chapter contains teamwork ex-
ercises designed for collaboration by a group of students. Ideally, students would
be able to use the collaboration tools while participating in these exercises.
New Cases and Reality Bytes
Most of the chapter cases and Reality Bytes examples have been replaced or re-
written. The book contains over 100 new Reality Bytes cases. All of the end-of-
chapter industry cases have been updated and are tied to the specifc problems in
each chapter.
Instructional Support
Instructors have access to the following resources for course presentation and
management. All the instructor supplements were created by the author, except
the test bank:
Instructors Manual includes answers to all end-of-chapter review questions,
exercises, and teaching notes for the industry-specifc cases. Teaching tips
and ties to the PowerPoint slides are included for each chapter.
A test bank contains true/false, multiple choice, and short answer questions.
Lecture notes are available as slide shows in Microsoft PowerPoint for-
mat. The slides contain all of the fgures along with additional notes. The
slides are organized into lectures and can be rearranged to suit individual
preferences.
Several databases and exercises are available online. The instructor can add
new data, modify the exercises, or use them to expand on the discussion in
the text.
The Rolling Thunder database application is available in Microsoft Access
format. It is a self-contained application that illustrates many of the concepts
and enables students to examine any facet of operating a small company.
The Instructors Manual includes further guidance on how to incorporate
this innovative tool into your course.
The books Web site at JerryPost.com provides resources for instructors and
students using the text.
xiii Preface
Te Online System
To students, the most important change in the ffth and sixth edition is placing
everything online. The main reason for this move is cost. The main textbook was
rewritten and expanded. The costs and student prices for the print book was out of
line. Electronically, it is possible to make the books available for an almost trivial
fee.
E-books provide additional benefts, including advanced search capabilities.
Students can also set bookmarks and highlight sections. More importantly, they
get to keep the books, instead of being forced to sell them back at the end of the
term. Database application development is an important topic, and the examples,
comments, and tips in the books will be valuable to students throughout their
careers.
xiv
Brief Contents
1 Introduction
Part One: Information Technology
Infrastructure
2 Information Technology Foundations
3 Networks and Telecommunications
4 Database Management
Part Two: Business Integration
5 Computer Security
6 Transactions and Entreprise
Relationship Planning
7 Electronic Business
8 Teamwork
Part Three: Decisions and
Strategies
9 Business Decisions
10 Strategic Analysis
11 Entrepreneurship
Part Four: Organizing Businesses
and Systems
12 Systems Development
13 Organizing MIS Resources
14 Information Management and Society
xv Contents
Contents
Managers and Information Technology, v
Learning Assessment, v
Organization, vi
Features That Focus on Solving Problems, viii
Goals and Philosophy, x
This Book Is Different from Other Texts, x
E-Book Edition, xi
Changes to the Sixth Edition, xi
Updates, xi
Focus on Business Problems, xi
Technology Toolboxes , xii
Collaboration and Teamwork, xii
New Cases and Reality Bytes, xii
Instructional Support, xii
The Online System, xiii
Introduction, 1
Introduction, 2
The Scope of MIS, 4
The Importance of Information Technology, 5
Productivity, 6
Teamwork and Communication, 7
Business Operations and Strategy, 7
The Role of the Internet in Business, 8
Technology Excesses, 9
So You Want to Be a Manager, 11
Traditional Management and Observations,
11
Making Decisions, 13
Business and Technology Trends, 14
Changes in Organizational Structure, 15
Business Trends, 16
Reengineering: Altering the Rules, 25
Management and Decision Levels, 27
Operations, 28
Tactics, 29
Strategy, 31
An Introduction to Strategy, 32
Searching for Ideas, 32
Strategy Example: Baxter Healthcare, 33
Cloud Computing, 35
Summary, 35
Key Words, 36
Web Site References, 37
Review Questions, 38
Exercises, 38
Additional Reading, 41
Cases: The Fast-food Industry, 41
Information Technology Infrastructure,
64
Information Technology Foundations,
65
Introduction, 66
Types of Data, 69
Object Orientation, 70
Numbers and Text, 72
Pictures, 74
Color, 78
Style Sheets, 79
Sound, 81
Video, 82
Size Complications, 82
Data Compression, 83
Hardware Components, 84
Processors, 86
Input, 92
Output, 95
Secondary Storage, 95
Operating Systems, 97
Computers in e-Business, 99
What Is a Browser?, 100
What Is a Server?, 102
Virtual Machines, 104
Application Software, 104
Research: Databases, 105
Analysis: Calculations, 105
Communication: Writing, 107
Communication: Presentation and Graphics,
107
Communication: Voice and Mail, 108
Organizing Resources: Calendars and
Schedules, 108
Augmented Reality, 109
The Paperless Offce?, 110
Open Software, 110
Cloud Computing, 111
Summary, 113
Key Words, 114
xvi Contents
Web Site References, 115
Review Questions, 115
Exercises, 116
Additional Reading, 120
Cases: The Computer Industry, 121
Networks and Telecommunications, 132
Introduction, 133
Network Functions, 134
Sharing Data, 135
Sharing Hardware, 142
Sharing Software, 144
Components of a Network, 145
Computers, 145
Transmission Media, 147
Connection Devices, 157
Network Structure, 159
Network Packets, 159
Shared Connections, 160
Managing Shared Networks, 163
Standards, 166
The Need for Standards, 166
A Changing Environment, 167
Internet TCP/IP Reference Model, 167
The Internet, 171
How the Internet Works, 172
Video and Heavy Use Complications, 174
Telephones and The Internet, 175
Internet Addresses, 177
Domain Names, 179
Internet Committees, 181
Internet 2, 181
Wireless Networks and Mobile Commerce,
183
Cloud Computing, 185
Global Telecommunications, 186
Technical Problems, 186
Legal and Political Complications, 187
Cultural Issues, 188
Summary, 188
Key Words , 190
Web Site References, 190
Review Questions, 191
Exercises, 191
Additional Reading, 195
Cases: Wholesale Suppliers, 196
Database Management, 210
Introduction , 211
Relational Databases, 213
Tables, Rows, Columns, Data Types, 214
Data Quality, 215
Data Integrity, 216
Multitasking, Concurrency, and Integrity, 217
Data Volume, 218
The Database Management Approach, 218
Focus on Data, 219
Data Independence, 219
Data Integrity, 219
Speed of Development, 220
Control over Output, 221
Queries, 221
Single-Table Queries, 222
Different Types of Conditions, 230
Computations, 233
Computing Subtotals, 238
Joining Multiple Tables, 241
Examples, 241
Multiple Tables, GROUP BY, and WHERE,
243
Views, 247
Converting Business Questions to Queries,
248
Designing a Database (optional), 250
Notation, 252
First Normal Form, 252
Second Normal Form, 254
Third Normal Form, 254
Database Applications, 257
Data Input Forms , 257
Reports, 259
Putting It Together with Menus, 261
Database Administration, 262
Standards and Documentation, 263
Testing, Backup, and Recovery, 264
Access Controls, 264
Databases and e-Business , 264
Cloud Computing, 266
Summary, 268
Key Words, 269
Web Site References, 269
xvii Contents
Review Questions, 269
Exercises, 270
Additional Reading, 275
Cases: Pharmaceuticals, 276
Business Integration, 292
Computer Security, 293
Introduction, 294
Threats to Information, 295
Disasters, 297
Employees and Consultants, 299
Business Partnerships, 301
Outsiders, 302
USB Drives, 303
Threats to Users, 303
Virus/Trojan Horse , 304
Phishing: Fake Web Sites, 306
Updates and Patches, 307
Intercepted Data, 308
Computer Security Controls, 310
User Identifcation, 311
Access Control, 313
Administrator Access Rights, 314
Single Sign-On and Lack of Standards, 314
Encryption, 315
Single Key, 316
Public Key Infrastructure, 318
Additional Security Measures, 322
Audits, 322
Physical Access, 323
Monitoring, 323
Hiring and Employee Evaluation, 325
Computer Forensics, 325
E-Commerce and Cloud Computing Security
Issues, 326
Theft of Data from Servers, 327
Firewalls, 328
Intrusion Detection and Prevention, 329
Denial of Service, 330
Privacy, 332
Summary, 333
Key Words, 334
Web Site References, 334
Review Questions, 334
Exercises, 335
Additional Reading, 337
Cases: Professional Sports, 339
Transactions and Enterprise Resource
Planning, 350
Introduction, 352
Data Capture, 353
Point of Sale, 354
POS Advantages, 358
Process Control, 359
Electronic Data Interchange (EDI), 360
Extensible Business Reporting Language
(XBRL), 364
Elements of a Transaction, 366
Vendor Perspective, 366
Customer Perspective, 366
Transaction Fees, 367
Government Perspective, 368
International Issues, 369
The Role of Accounting, 370
Input and Output: Financial Data and Reports,
371
Purchases, Sales, Loans, and Investments,
372
Inventory, 372
The Accounting Cycle, 373
Process: Controls, Checks, and Balances, 375
Human Resources and Transaction Processing,
375
Input: Data Collection, 376
Output: Reports, 377
Process: Automation, 377
Production Management, 378
Production Issues, 379
Distribution and Inventory Control, 380
Integration in Business, 382
Enterprise Resource Planning, 385
International Environment, 387
Financial Accounting, 387
Logistics, 388
Human Resource Management, 388
Integration, 389
Supply Chain Management, 390
SCM Changes the Focus, 391
SCM Challenges, 392
Integration across Systems, 394
Customer Relationship Management, 395
xviii Contents
Multiple Contact Points, 395
Feedback, Individual Needs, and Cross
Selling, 396
CRM Packages, 397
Summarizing ERP Data, 398
Digital Dashboard and EIS, 399
How Does an EIS Work?, 400
Advantages of an EIS, 401
Transaction Accuracy: Sarbanes-Oxley, 402
Cloud Computing, 403
Summary, 404
Key Words, 406
Web Site References, 406
Review Questions, 407
Exercises, 407
Additional Reading, 410
Cases: Automobile Industry, 411
Electronic Business, 428
Introduction, 429
Selling Products Online, 432
Business to Consumer, 433
Business to Business, 438
The Production Chain and Disintermediation,
440
Three Stages of a Purchase, 443
Price Competition, 444
Services and Web 2.0, 446
Social Networking and Consumer Services,
446
Digital Products, 448
Business Services, 449
Network Services, 451
Search Engines, 454
Payment Mechanisms and Risk Mitigation in
e-Commerce, 454
Payment Risks, 455
Payment Mechanisms, 456
Advertising, 460
Traditional Media and Name Recognition, 461
Web Advertisements, 461
Privacy, 466
Developing and Hosting Web Sites, 467
Simple Static HTML, 468
Web Auctions, 470
Amazon WebStore, 471
Auction versus WebStore, 472
Web Commerce Servers, 472
Content Management Systems, 473
Application Service Providers, 474
Web Hosting Summary, 474
Mobile Commerce, 476
Taxes, 477
Global Economy, 478
Cloud Computing, 479
Summary, 480
Key Words, 481
Web Site References, 481
Review Questions, 482
Exercises, 482
Additional Reading, 484
Cases: Retail Sales, 485
Teamwork, 505
Introduction, 506
Communication, 507
e-Mail, Instant Messaging, and Voice Mail, 509
Web Pages and Blogs, 511
Scheduling and Project Management, 512
Conferences and Meetings, 513
Peer-to-Peer Network Complications, 515
Mobile Systems, 516
Collaboration, 516
Documents and Changes, 517
Version Control, 518
Wikis and Online Applications, 520
Information Rights Management, 521
Workfow, 522
Group Decision Support Systems, 523
Knowledge Management, 525
Organizational Memory, 526
Service Processes, 527
Microsoft SharePoint, 528
Communication and Scheduling, 528
Collaboration, 532
Workfow, 535
SharePoint Confguration, 537
Peer-to-Peer Collaboration, 540
Sharing Documents, 540
Immediate Interaction: Microsoft SharedView,
542
xix Contents
Sharing with Multi-Touch Panels, 544
File Formats and Standards, 545
Cloud-Based Collaboration, 546
Summary, 549
Key Words, 550
Web Site References, 550
Review Questions, 551
Exercises, 551
Additional Reading, 554
Cases: Package Delivery, 555
Decisions and Strategies, 575
Business Decisions, 576
Introduction, 577
It is Hard to Make Good Decisions, 578
Human Biases, 581
Models, 584
Data Warehouse, 589
Online Analytical Processing (OLAP), 590
Decision Support System, 594
Marketing Forecasts, 594
Human Resources Management, 596
Geographical Information Systems, 597
Maps and Location Data, 599
Example, 601
Data Mining, 602
Expert Systems, 606
Specialized Problems, 608
Diagnostic Problems, 608
Speedy Decisions, 609
Consistency, 610
Training, 611
Building Expert Systems, 612
Knowledge Base, 613
Rules, 613
Creating an ES, 614
Limitations of Expert Systems, 615
Management Issues of Expert Systems, 616
Specialized Tools, 616
Pattern Recognition and Neural Networks, 617
Machine Vision, 619
Language Comprehension and Translation,
620
Robotics and Motion, 621
Machine Intelligence, 623
DSS, ES, and AI, 623
The Importance of Intelligent Systems in
e-Business, 625
Agents, 625
Support and Problem-Solving Applications,
627
Cloud Computing, 628
Summary, 628
Key Words, 630
Web Site References, 630
Review Questions, 630
Exercises, 631
Additional Reading, 635
Cases: Financial Services Industry, 636
Strategic Analysis, 653
Introduction, 654
The Competitive Environment, 656
External Agents, 658
Buyers, 658
Suppliers, 660
Rivals, New Entrants, and Substitutes, 660
Government Regulations, 662
IS Techniques to Gain Competitive Advantage,
662
Barriers to Entry, 662
Distribution Channels, 664
Switching Costs, 666
Lower Production Costs, 667
Product Differentiation and New Products, 667
Quality Management, 669
The Value Chain, 670
The Search for Innovation, 671
Research, 672
Engineering and Design, 673
Manufacturing, 673
Logistics and Supply, 674
Marketing, 674
Sales and Order Management, 676
Service, 676
Management, 676
Costs and Dangers of Strategies, 678
High Capital Costs, 678
When the Competition Follows, 679
Changing Industry, 679
Sharing Data, 680
xx Contents
Government Intervention, 681
The Role of Economics, 682
Challenges of Strategy, 683
Sustainability, 685
Leader or Follower, 686
Change Agents, 688
Cloud Computing, 689
Summary, 690
Key Words, 691
Web Site References, 691
Review Questions, 691
Exercises, 692
Additional Reading, 695
Cases: The Airline Industry, 696
Entrepreneurship, 715
Introduction, 716
Small Business Constraints, 717
Money, 718
Workers and Specialists, 720
Information Technology Expertise, 721
Strategic Power, 723
Information Tasks, 724
Operations and Transactions, 724
Tactics and Decisions, 727
Strategies, 728
Selecting Technology Levels, 729
Managing Consultants, 730
Internationalization, 731
Entrepreneurship, 731
Idea, 732
Strategy, 732
Research, 734
Plan, 736
Strategy, Competition, and Market Analysis,
738
Forecasts, Cash Flow, and Investment
Budget, 738
Marketing, 740
Online Advertising, 741
Organization and Timetable, 742
Implementation, 742
Ownership Structure, 743
Financing, 744
Accounting and Benchmarks, 747
Starting an e-Commerce Firm, 748
Analysis of Dot-Com Failures, 749
Pure Internet Plays, 749
Proft Margins, 750
Advertising Revenue, 751
Cloud Computing, 752
Summary, 752
Key Words, 754
Web Site References, 754
Review Questions, 755
Exercises, 755
Additional Reading, 757
Cases: Entrepreneurship, 758
Organizing Businesses and Systems, 771
Systems Development, 772
Introduction, 773
Building Information Systems, 776
Custom Programming, 777
Outsourcing and Contract Programmers, 778
Assemble Applications from Components, 779
Purchase an External Solution, 780
Computer Programming, 781
Programming Logic, 781
Events, 783
Object-Oriented Programming, 785
From Programming to Development, 787
Systems Development Life Cycle, 788
Introduction to SDLC, 789
Feasibility and Planning, 789
Systems Analysis, 791
Systems Design, 792
Systems Implementation, 793
Maintenance, 796
Evaluation, 797
Strengths and Weaknesses of SDLC, 798
Alternatives to SDLC, 799
Prototyping or Iterative Development, 800
Extreme Programming and Agile
Development, 800
Developing Systems Requires Teamwork:
JAD and RAD, 802
Communication, 806
Object-Oriented Design, 806
Open Source Development, 807
End-User Development, 808
Development Summary, 809
xxi Contents
Process Analysis, 810
Input, Process, Output, 810
Divide and Conquer, 812
Goals and Objectives, 813
Diagramming Systems, 814
Summary: How Do You Create a DFD?, 818
Object-Oriented Design, 818
Distributed Services, 819
Cloud Computing, 820
Summary, 821
Key Words, 823
Web Site References, 823
Review Questions, 823
Exercises, 824
Additional Reading, 828
Cases: Government Agencies, 829
Organizing MIS Resources, 860
Introduction, 861
Managing the Information Systems Function, 862
Managing Workers, 863
Planning and Integration, 864
Evaluation, Oversight, and Control, 865
MIS Roles, 867
Hardware Administration, 867
Software Support, 868
Network Support, 869
Software Development, 869
Support for End-User Development, 869
Corporate Computing Standards, 870
Data and Database Administration, 871
Security, 872
Advocacy Role, 873
MIS Jobs, 873
Outsourcing, 875
MIS Organization: Centralization and
Decentralization, 880
Hardware, 884
Software and Data, 886
Personnel, 888
Recentralization with Cloud Computing, 889
Networks, 890
Hardware, 893
Data, 893
Confict Management, 894
Summary, 896
Key Words, 897
Web Site References, 897
Review Questions, 898
Exercises, 898
Additional Reading, 902
Cases: The Energy Industry, 903
Information Management and Society,
916
Introduction, 917
Individuals, 918
Privacy, 919
Privacy Laws and Rules, 930
Anonymity, 931
Jobs, 932
Loss of Jobs, 932
Physical Disabilities, 934
Telecommuting, 934
Business: Vendors and Consumers, 936
Intellectual Property, 936
Digital Rights Management, 940
Balance of Power, 942
Education and Training, 944
Social Interactions, 945
Social Group Legitimacy, 945
Access to Technology, 948
e-Mail Freedom, 949
Liability and Control of Data, 949
Government, 950
Government Representatives and Agencies,
950
Democracy and Participation, 950
Voting, 951
Information Warfare, 953
Rise of the World-State?, 955
World Government Cases, 956
Crime, 959
Police Powers, 959
Freedom of Speech, 960
Gambling, 961
Responsibility and Ethics, 962
Users, 962
Programmers and Developers, 963
Companies, 964
Governments, 964
xxii Contents
Some Computer-Related Laws, 965
Property Rights, 965
Privacy, 968
Information Era Crimes, 971
Cloud Computing, 972
Data in Multiple Countries, 973
Threats to Shared Servers, 974
Subcontractors, 975
Summary, 976
Key Words, 977
Web Site References, 978
Review Questions, 978
Exercises, 979
Additional Reading, 982
Cases: Health Care, 983
1
What You Will Learn in This Chapter
How can MIS help you in your job?
What is MIS?
Why is information technology important? Why do all business majors need to study it?
How important is the Internet in retail sales?
Do you have too much technology?
Do you know what a manager does?
Do you know what a successful manager will do in the future?
How is business changing? What will managers need to know in the future?
Does technology alone improve a business?
How do you break businesses into smaller pieces to analyze them?
Why are strategic decisions so diffcult?
How do you begin searching for competitive advantage?
Chapter Outline
Introduction
1
Chapter
Introduction, 2
The Scope of MIS, 4
The Importance of Information Technology,
5
Productivity, 6
Teamwork and Communication, 7
Business Operations and Strategy, 7
The Role of the Internet in Business, 8
Technology Excesses, 9
So You Want to Be a Manager, 11
Traditional Management and
Observations, 11
Making Decisions, 13
Business and Technology Trends, 14
Changes in Organizational Structure, 15
Business Trends, 16
Reengineering: Altering the Rules, 25
Management and Decision Levels, 27
Operations, 28
Tactics, 29
Strategy, 31
An Introduction to Strategy, 32
Searching for Ideas, 32
Strategy Example: Baxter Healthcare,
33
Cloud Computing, 35
Summary, 35
Key Words, 36
Web Site References, 37
Review Questions, 38
Exercises, 38
Additional Reading, 41
Cases: The Fast-food Industry, 41
2 Chapter 1: Introduction
McDonalds
Introduction
How can MIS help you in your job? This is the ultimate question that
you must continually ask and answer as you pursue a management career. This
book explores many variations of this question and some useful answers. Infor-
mation technology offers two main features to managers: (1) productivity and (2)
innovation.
Productivity is the ability to accomplish more with fewer resources; and tech-
nology is often used to reduce costs. On a personal level, you are probably famil-
iar with the basic personal tools such as a word processor, e-mail, spreadsheet, and
Internet searches. All of these technologies improve your individual productivity.
What do customers want? McDonalds Corporation has sold billions of hamburgers.
Beginning in 1955 with a single drive-in in Des Plaines, Illinois, McDonalds has
grown to todays system of more than 25,000 restaurants across 115 countries. As
a brand, McDonalds is synonymous with a quality product at a reasonable price.
Equally important, McDonalds markets itself as more than a place to get a ham-
burger. Ronald McDonald, Happy Meals, the clean restaurants, and each new prod-
uct or promotional theme add to the fun that brings more than 40 million customers
of all ages to its restaurants around the world each day.Eighty percent of worldwide
McDonalds are franchiseyd. Each restaurant must meet strict requirements to make
it the same as all others. This ensures that each time you drive or walk into a McDon-
alds, no matter where you are, the Big Mac that you order will always be the same
taste, size, weight, and quality. It will also be competitively priced.
Eighty percent of worldwide McDonalds are franchised. Each restaurant must
meet strict requirements to make it the same as all others. This ensures that each time
you drive or walk into a McDonalds, no matter where you are, the Big Mac that you
order will always be the same taste, size, weight, and quality. It will also be competi-
tively priced.
Legal contracts, quality standards, and performance specifcations direct the in-
dividual restaurants in the effort to keep all the food orders the same. What most
individuals do not think about when they walk or drive into McDonalds is that Mc-
Donalds management information system (MIS) plays a critical role in ensuring
the quality and consistency of each sandwich. McDonalds Corporation maintains
a strict requirement that food be fresh and not stored more than a limited amount of
time. MIS applications direct managers in the management of employees and the
ordering and tracking of hamburgers, buns, potatoes, and soft drinks.
Competition is ferce in the fast food industry. The top chains have been strug-
gling over the last several years to fnd a way to attract new customers. McDonalds
experimented with changing menus. It altered its in-store system to focus on the
Made for You campaign. Concerns about healthy food have led the company to try
new foods and new ways of cooking. Following in the footsteps of Starbucks, Mc-
Donalds is offering wireless Internet access to customers for a fee. But is that what
McDonalds customers really want? Will you go to McDonalds, pay money for a
connection to the Internet, and then hang around to buy more food?
3 Chapter 1: Introduction
In the business world, these tools have largely eliminated the personal assistant,
reducing costs and improving the response time. But, MIS goes way beyond these
basic tools and the individual. As you will see, several technologies exist to help
teams and the entire organization improve productivity.
Innovation is the creation of new thingsnew services and products, new mar-
kets, new business methods, and even new industries. Instead of cutting costs,
information technology is used to open up new sources of revenue for business-
es. Think about companies like Google (and the frms it bought), Amazon, and
Match.com. These companies used information technology to create new ways to
make money. Although less radical, many existing frms have found new ways to
expand markets and make money with technology.
Innovation is sexier and more fun, but fnding innovative ideas is considerably
harder than using technology to increase productivity and reduce costs. These is-
sues are part of the challenge of business strategy. Leaders and managers need to
choose how their organization will view technology. Innovative uses require cre-
ativity and cost money, but can lead to gains against the competition.
As a manager, how can you use information technology to improve your busi-
ness, increase sales, and gain an edge on your competitors? Keep in mind that
technology changes rapidly. How do you know what tools to buy? Is it worth the
money and risk to buy the latest technology? Can you rebuild your company to
use the technologies? What do the customers want and how will they respond to
technology? These are questions that managers face every day. The questions are
challenging and the answers are hard to fnd. This book lays out a framework for
analyzing your business problems and evaluating technology solutions.
Trends
Economies, businesses, people, and societies all change over time. A cen-
tury ago, people were farmers and laborers. Most businesses were small.
Technologies changed and people moved to cities and manufacturing jobs.
Technology changed again, and the importance of the service sector grew.
Although digital computers were invented in the early 1940s, it was not until
the 1960s and 1970s that they became affordable for most businesses. At
frst, most companies used information technology to solve easy problems:
transaction processing. Before computers, companies needed hundreds of
bookkeepers in the back offce tracking sales, updating ledgers, and sum-
marizing data by hand. As hardware prices dropped in the 1980s and 1990s,
businesses integrated personal computers into management. Networksand
today, the Internetmade it easier to share data and communicate. Informa-
tion technology not only changes jobs, but also changes the way companies
are organized. If you want a job in business, you need to know how to use
these technologies to become a better manager and to improve the business.
Remember that technology can perform amazing tasks. Businesses no lon-
ger need people to perform many of the menial middle-management tasks.
Instead, businesses need managers who can think, adapt, and creatively fnd
new solutions.
4 Chapter 1: Introduction
Te Scope of MIS
What is MIS? You probably have some experience with using computers and
various software packages. Yet computers are only one component of a manage-
ment information system (MIS). As shown in Figure 1.1, an MIS consists of fve
related components: hardware, software (applications), people, procedures, and
collections of data. More importantly, an MIS is designed to solve problems for
the entire business. The term information technology (IT) represents the various
types of hardware and software used in an information system, including comput-
ers and networking equipment.
The physical equipment used in computing is called hardware. The set of in-
structions that controls the hardware is known as software. In the early days of
computers, the people directly involved in MIS tended to be programmers, design
analysts, and a few external users. Today, almost everyone in the frm is involved
with the information system, but some specialized MIS employees are needed to
create and manage the information systems. Procedures are instructions that help
people use the systems. They include items such as user manuals, documentation,
and procedures to ensure that backups are made regularly. Databases are collec-
tions of related data that can be retrieved easily and processed by the computers.
As you will see in the cases throughout the book, all of these components are vital
to creating an effective information system.
So what is information? One way to answer that question is to examine the use
of information technology on three levels: (1) data management, (2) information
Figure 1.1
MIS Components. Information technology consists of the hardware and software,
which includes networks. Information systems exist to process data. It takes people
and procedures to create and run an information system. Information systems need to
support users to help them make decisions.
Backup data
Restart job
Virus scan
Hardware
Software
People
Procedures
Data
5 Chapter 1: Introduction
systems, and (3) knowledge bases. Data consists of factual elements (or opinions
or comments) that describe some object or event. Following the comments by
Max Hopper (an early IT visionary at American Airlines) Data can be thought of
as raw numbers, text, images, or even video. Data management systems focus on
data collection and providing basic reports. Information represents data that has
been processed, organized, and integrated to provide insight. Information systems
are designed to help managers analyze data and make decisions. From a decision
makers standpoint, the challenge is that you might not know ahead of time which
information you need, so it is hard to determine what data you need to collect.
Knowledge represents a higher level of understanding, including rules, patterns,
and decisions. Knowledge-based systems are built to automatically analyze data,
identify patterns, and recommend decisions. Humans are also capable of wisdom,
where they put knowledge, experience, and analytical skills to work to create new
knowledge and adapt to changing situations. To date no computer system has at-
tained the properties of wisdom.
Information systems continue to change over time. Computer hardware has ad-
vanced rapidly for several decades. As you will see in Chapter 2, these changes
have enabled computers to handle increasingly complex data at faster speeds and
lower prices. Similar improvements in data storage and transmission (networks)
have opened up new options and methods of doing business. This increasing pen-
etration of technology in business continues to cause changes in how companies
operate. But, someone has to be in charge of the technology, evaluate the options,
and keep everything running. The role of the people managing the information
systems cannot be overemphasized. Many good careers exist in MIS and they are
explored in Chapters 12 and 13. Most of them require business knowledge and
skillsyou do not need to be a techie or geekand the pay has been relative-
ly good, so as you read the chapters, try picturing yourself in one of these roles.
Te Importance of Information Technology
Why is information technology important? Why do all business
majors need to study it? Productivity is the bottom-line issue in informa-
Reality Bytes: Data, Information, Knowledge, and Wisdom
Consider the case of a retail store that is trying to increase sales. Some of the data
available includes sales levels for the last 36 months, advertising expenses, and cus-
tomer comments from surveys. By itself, this data may be interesting, but it must be
organized and analyzed to be useful in making a decision. For example, a manager
might use economic and marketing models to forecast patterns and determine rela-
tionships among various advertising expenses and sales. The resulting information
(presented in equations, charts, and tables) would clarify relationships among the
data and would be used to decide how to proceed.
It requires knowledge to determine how to analyze data and make decisions. Edu-
cation and experience create knowledge in humans. A manager learns which data to
collect, the proper models to apply, and ways to analyze results for making better
decisions. In some cases, this knowledge can be transferred to specialized computer
programs (expert systems).
6 Chapter 1: Introduction
tion technology. Workers are expensive, diffcult to manage, and hard to remove.
Information technology continues to decline in price with increased power and
capabilities. Programmers are more creative, and new tools are being developed
to solve more complex problems. Organizations that use information technology
to reduce costs and provide better service can thrive. If you want a job in manage-
ment, you must learn to use the technologies. But it is not as simple as knowing
how to use a spreadsheet and a word processor. You have to understand how busi-
nesses work and determine how technology can be used to improve the business.
Productivity
Figure 1.2 shows the productivity index for U.S. non-farm workers. In the seven
years from 2000-2006, productivity grew at an average annual rate of 2.9 percent,
but it was closer to 5 percent at the start of the century. Over about 15 years, pro-
ductivity increased by about 47 percent. The other way to look at productivity is
that each year, a frm needs fewer workers to produce the same level of service
which means it can operate at lower costs. Basically, the only way to achieve this
continued growth in productivity is for workers to become more effcienteither
through learning or improved use of technology.
As a manager, it is critical that you understand two implications of this trend.
First, you have to use information technology to stay competitive. Today, comput-
ers are almost always cheaper than people. Second, at an average productivity rate
of about 3 percent per year, productivity will increase by 34 percent in a decade.
Firms would be able to produce the same output with 34 percent fewer workers.
What happens to those workers? Chapter 14 addresses the economic issue in more
Figure 1.2
Productivity is an index of the amount of work per employee. There is a 33
percent increase in output over the decade from 1996-2006, with an average
annual growth rate of 2.7 percent. Source: http://data.bls.gov/PDQ/servlet/
SurveyOutputServlet?request_action=wh&graph_name=PR_lprbrief.
0
20
40
60
80
100
120
1
9
9
4
-
Q
1
1
9
9
4
-
Q
4
1
9
9
5
-
Q
3
1
9
9
6
-
Q
2
1
9
9
7
-
Q
1
1
9
9
7
-
Q
4
1
9
9
8
-
Q
3
1
9
9
9
-
Q
2
2
0
0
0
-
Q
1
2
0
0
0
-
Q
4
2
0
0
1
-
Q
3
2
0
0
2
-
Q
2
2
0
0
3
-
Q
1
2
0
0
3
-
Q
4
2
0
0
4
-
Q
3
2
0
0
5
-
Q
2
2
0
0
6
-
Q
1
2
0
0
6
-
Q
4
2
0
0
7
-
Q
3
2
0
0
8
-
Q
2
2
0
0
9
-
Q
1
2
0
0
9
-
Q
4
2
0
1
0
-
Q
3
Output per Person
7 Chapter 1: Introduction
detail, but you are going to be better off if you are one of the workers who under-
stands and uses the technology to keep your job.
Teamwork and Communication
Teamwork is a key element in business. Teamwork means that tasks are divided
among team members. You are responsible for completing specifc items. You are
also responsible for helping the other members of the team to fnd the best solu-
tion to the problems. Teamwork requires cooperation, but with technology, it no
longer means that the teams have to work in the same room. Your team members
may participate from around the world. Even if everyone is in the same room, you
need technology to organize and share the contributions.
At a minimum, you already know how to use a word processor and a spreadsheet
to write reports and analyze data. Do you know what changes have been made
to these tools in the last few versions? The most important changes have been
support for collaboration tools that make it easier to share documents and work
as teams. Working on a team is diffcult. Not only do you have to produce your
own work, but you also have to communicate closely with the group to see what
problems and answers they have encountered and determine how to integrate all
of the pieces. Chapter 9 explores these problems and examines some of the tools
available to help you.
Business Operations and Strategy
Information technology is increasingly critical to the daily operations of a busi-
ness. Obviously, online businesses cannot live without technology, but neither can
the local grocery store, bank, or many other businesses. Computers process sales,
handle payments, and place new orders. They also analyze the sales data and help
set prices and predict trends. Information technology is also used to create new
Reality Bytes: Jobs
CareerCast.com a career Web site annually rates jobs on the basis of several factors
including income, stress, and job outlook. In 2011, based on a study of 200 jobs, the
top career was: software engineer. Jesse Severe is a software engineer in San Diego
working for ProFlight, LLC designing fight training software. He says My jobs
fexible, pays well and gives [me] a lot of job satisfaction. Typical salaries for soft-
ware engineers average about $87,000 up to $132,000. Many jobs exist for program-
mers across the U.S. and opportunities exist for entrepreneurs to develop their own
software and companies. One of the challenges with programming is that technol-
ogy, both hardware and software, continue to change. Consequently, the job requires
constant education. Mr. Severe observes that You cant think that youll learn a skill
and that it will be relevant in six months. Most people in the feld look on technol-
ogy change as a positive aspect. Tomorrow or next year there will be new tools and
new challenges. The top fve jobs on the list in 2011 were: (1) Software Engineer, (2)
Mathematician, (3) Actuary, ($) Statistician, (5) Computer Systems Analyst. Note
that all of them involve data and require analytical skills. The worst job on the list
was roustabout--typically handling entry-level work on oil rigs and pipelines.
Adapted from Adapted from Joe Light, The Best and Worst Jobs, The Wall Street
Journal, January 5, 2011.
8 Chapter 1: Introduction
products and services or to provide unique features to existing products. These
new features can give your company a strategic advantage and help the company
grow.
Te Role of the Internet in Business
How important is the Internet in retail sales? Today, almost every-
one is aware of the Internet and many of its opportunities. But, how important is
the Internet for sales? Electronic commerce, or e-commerce (EC), denotes the
selling of products over the Internet. These sales can be from a business to con-
sumers (B2C) or from one business to another (B2B). For a while in 1999, some
people believed that e-commerce would become the dominant form of business
where everyone bought all items over the Internet. Thousands of frms and Web
sites were created, trying to become the dominant frm in some niche. The group
was called dot-coms because almost all had an Internet address of something.
com. Many of the frms received huge amounts of funding from venture capital-
ists and experienced surprisingly high prices for their stock. Some foolish people
predicted a new economic world. But beginning in mid-2000, thousands of these
frms failed. Most had enormous expenses and huge losses. Many had been tak-
ing losses on every item they sold. And foolish people predicted the end of e-
commerce. Figure 1.3 shows the U.S. statistics collected by the census bureau.
The chart is somewhat misleading because EC sales are shown on the right-hand
y-axis, versus total retail sales on the left. These scales make it possible to see the
details in the EC data, but in reality, EC represents only about 5 percent of the
Figure 1.3
Retail and B2C e-commerce data in the United States. Although e-commerce sales
are only 5 percent of the total, the percentage has been steadily increasingdespite
the crash of the dot-coms in 2000 and 2001. Notice the seasonal peak in the fourth
quarteras more people go online to purchase holiday gifts. Source: http://www.
census.gov/retail/index.html#ecommerce.
0
10
20
30
40
50
60
0
200
400
600
800
1000
1200
1
9
9
9
-
4
2
0
0
0
-
2
2
0
0
0
-
4
2
0
0
1
-
2
2
0
0
1
-
4
2
0
0
2
-
2
2
0
0
2
-
4
2
0
0
3
-
2
2
0
0
3
-
4
2
0
0
4
-
2
2
0
0
4
-
4
2
0
0
5
-
2
2
0
0
5
-
4
2
0
0
6
-
2
2
0
0
6
-
4
2
0
0
7
-
2
2
0
0
7
-
4
2
0
0
8
-
2
2
0
0
8
-
4
2
0
0
9
-
2
2
0
0
9
-
4
2
0
1
0
-
2
2
0
1
0
-
4
R
e
t
a
i
l
B
i
l
l
t
o
n
$
U.S. Retail and E-Commerce Sales
Retail
Ecommerce
9 Chapter 1: Introduction
total retail sales. The main point of the chart is that although small, EC sales are
increasing at a faster rate than total sales. The second point to notice is the strong
seasonal effect in the salesparticularly in EC. Year-end holiday sales provide a
35 percent boost to the EC numbers. This large number indicates that EC is still
heavily used for gift and specialty items, instead of routine day-to-day purchases.
E-business is a more general term that encompasses e-commerce but also in-
cludes using the Internet for other business tasks, such as teamwork, communica-
tion, and new business services. As Internet technologies improve, more frms are
offering e-business servicessuch as digital maps, remote data backup, and sup-
ply chain management. Chapter 8 discusses e-commerce and e-business in more
detail.
Technology Excesses
Do you have too much technology? To some people (and organizations),
technology becomes a goal by itself. They strive to be the leaders in acquiring
technology and revel in the latest gadgets. The cell phone market is a leading
example. Check out the offerings of the major carriers, the constant changes, and
multitude of features. Now look around and notice that some people insist on hav-
ing the most recent, fanciest, and often largest cell phones. Perhaps it is the bling
factor, but do you really need to spend money to have the latest releases of tech-
nology? Bear in mind that most IT devices are most expensive when they are
released, with prices often dropping rapidly over time. Figure 1.4 illustrates the
common pattern in the release of new information technology. Prices decline over
time and a new model is released with additional features. The rate of decline
and the time frame (weeks, months, or years) depends on the specifc technology.
In all cases, you need to decide when you should purchase new technology. The
answer should depend on a careful assessment of your needs, the features offered,
Reality Bytes: You are Already Too Old for This Job
Digital advertising is a new frontier, for consumers, companies, and advertising
agencies. The big advertising agencies (Madison Avenue) have struggled to fnd ex-
perienced workers with knowledge of people who live and buy online. Jeff Tritt, an
HRM executive at Leo Burnett, a large Chicago-based marketing frm, noted that
The demand is greater than the supply so there is a big war for digital talent right
now. Some, such as WPP PLCs direct marketing unit Wunderman, are signing ap-
prenticeship agreements with schoolsgetting students to work for pay or credit.
Leo Burnett created a group of 35 young adults to function as a SWAT team to assist
on accounts that need advice concerning the digital world. In a different twist, JWT,
an ad frm of WPP created a reverse-mentor program where children ages 9 to 14 of
JWT employees were brought in to work on client projects. In a project for Nestle,
the kids feedback led to the development of a mobile game to be used to promote
items for the food giant. Beyond the children, the new workers not only need to
understand the technology, they have to be able to use it. Wunderman brought in
students to create a video to promote graphic design software from Microsoft. The
students were able to complete the task in three daysinstead of three weeks.
Adapted from Suzanne Vranica, Kids Lend a Digital Hand, The Wall Street Jour-
nal, January 10, 2011.
10 Chapter 1: Introduction
and your budget. This analysis is the same for computers, enterprise software,
and cell phones. But, with lower-priced items such as cell phones, the bling factor
(and marketing) can override the judgment of consumers.
Consider a simple cell-phone example. New cell phones are constantly being
introduced, and there might be a six-month (or year) lag in the release of new
technologies. If you purchase a new phone every six months, you will spend at
least $600 over the course of two years ($200 a phone but the frst one is often
free). If you keep the original phone and replace it every two years, you can gener-
ally get the phones free, or close to free. How many new features were introduced
over two years? Is it worth $300 a year (or more) to have the most recent phone?
Maybe it isparticularly when IT becomes a fashion accessory. But what about a
$2,000 laptop for business? Should every person get a new laptop every year? The
point is that these decisions depend on the individual. Until you need to evaluate
the purchases for an entire organization. If you need to make the same decision for
your company, you need to look at the true benefts to justify the additional costs.
To make those decisions, you need to understand the technology and how it adds
value to your frm. A key point in this book is that you need to begin thinking as a
managerresponsible for analyzing decisions for the entire frmnot just your-
self as an individual.
Another potential risk with information technology is that individuals might
isolate themselves and rely on e-mail and text messages, avoiding interperson-
al contact. Sometimes you need to meet face-to-face to get a true picture. Some
Figure 1.4
Information technology is often characterized by declining prices and new models.
You can lead everyone and spend large amounts of money to buy new models
whenever they are released, or you can keep technology until you truly need a new
model.
0
100
200
300
400
500
600
700
800
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18
price
time
Typical Price Declines
11 Chapter 1: Introduction
communications are probably too important to use technology. Even in business,
you need to be aware of the different preferences of people and know when to use
technology and when to use a more personal approach.
So You Want to Be a Manager
Do you know what a manager does? Do you know what a suc-
cessful manager will do in the future? Answer: The good ones work
their tails off. But what exactly does a manager do? Managers actually have many
tasks, and the roles depend on the culture of the organization, the style of top
managers, and the skills of the individual manager. At one level managers are in
charge of other employees, so they must organize tasks, set schedules, direct the
processes, and communicate with other managers. On the other hand, managers
often have to help with the ongoing operations. For example, an accounting man-
ager also performs accounting tasks, and fnance managers continue to analyze
data. Finally, managers spend time communicating with others in the organiza-
tionboth formally and informally. You always need to know what is happening
in the company and how it will affect you.
Traditional Management and Observations
If you think of a traditional manager, you would consider tasks such as organiz-
ing work, planning jobs, and controlling workers. (Joe, go peel those potatoes.)
However, when observed at their jobs, managers appear to spend most of their
time in meetings, talking on the phone, reading or preparing reports, discussing
projects with their colleagues, explaining procedures, and participating in other
activities that are diffcult to ft into the traditional framework.
Henry Mintzberg, a psychologist who studies management, classifes manage-
rial tasks into three categories: (1) interpersonal, (2) informational, and (3) deci-
sional. Interpersonal roles refer to teaching and leading employees. Informational
Reality Bytes: Hidden Data
Managers need information to make decisionsand sometimes they spend consider-
able time searching for information. A study of 1,000 middle managers at large com-
panies by Accenture revealed that managers of American and English companies
spent an average of two hours a day in their searches. But then, over half the data
they fnd is worthless. Almost 60 percent said they had to use multiple sources to
fnd data, and they typically needed three different sources. Almost half (42 percent)
said they end up using the wrong data at least once a week. Much of the data, and
the problems, are stored within the company. Most of the problems arise between
managers. Almost half (40 percent) said that other managers are unwilling to share
information. But, the respondents did help matters. Most of them said they store their
most valuable information on their local computers and in their e-mail folders. It is
hard to blame the problem on searching skills. The IT workers surveyed were the
ones who most reported the data they found was worthless and they spent the most
time looking for it. As much as 30 percent of their time was spent searching for data.
Adapted from Justin Lahart, For Small Businesses, Big World Beckons, The Wall
Street Journal, January 26, 2011.
12 Chapter 1: Introduction
Technology Toolbox: Choosing a Search Engine
Problem: How do you fnd infor-
mation on the Internet? The Inter-
net is huge and getting bigger. It
contains an enormous number of
pages. Content is provided by mil-
lions of organizationseach using
different formats and terms.
Tools: Internet search engines
were created specifcally to crawl
the Web and capture key words
from the billions of pages they
fnd.
Choosing the right starting
point can be critical to a success-
ful search. Obtaining the most
number of hits is not as important
as a site that returns accurate re-
sults. The main search companies
constantly refne their methods to
improve the accuracy. Remember
the following hints when you are
searching:
1. Google is currently the most popular search site and often returns the most hits.
Bing and Yahoo are also good and sometimes the results are easier to read.
2. Some sites, such as Yippy, organize the results into categories.
3. Sometimes it is best to search an encyclopedia (wikipedia.org), dictionary (Wik-
tionary.com), a phone book (switchboard.com), the CIA World Factbook (www.
cia.gov/cia/publications/factbook), or government statistics (fedstats.gov).
4. Check specialist magazine sites for targeted information. For example, use for-
tune.com to fnd information on the largest companies.
5. The most accurate sources are not free. University libraries provide access to
huge commercial databases.
Quick Quiz: Where would you begin your search to answer the following ques-
tions?
1. Under the proposed IAU defnition, which planetoid falls between Mars and Ju-
piter?
2. By revenue, which was the largest company in the world in 2010?
3. Find the best price on a 512 GB SSD.
4. Which U.S. professional basketball team had the fewest wins in the 2010-2011
season?
5. Which celebrities are still alive? Sophia Loren, Harman Killebrew, Phyllis Diller,
Nancy Reagan, I.M. Pei.
General purpose search engines
Google, Bing, Yahoo
Meta-searches across multiple engines
Dogpile, Yippy
Encyclopedia
Wikipedia.org
Dictionary
Wiktionary
Phone book
Switchboard, Superpages
Products
Mysimon, Cnet
Government data
CIA.gov (World Factbook)
Fedstats.gov (main data source)
SEC.gov (EDGAR corporate flings)
Other
Your library databases
www.wolframalpha (math and data)
13 Chapter 1: Introduction
tasks are based on the transfer of information throughout the organization, such as
relaying information to subordinates or summarizing information for executives.
Decisions involve collecting information, evaluating alternatives, and choosing
directions that beneft the frm.
Other researchers have studied managers and developed alternative classifca-
tions. Fred Luthans uses three classifcations of management activities. He indi-
cates that approximately 50 percent of a managers time is spent on traditional
management activities (planning, organizing, and controlling), 30 percent in for-
mal communications, and 20 percent in informal networking. Formal communica-
tions include attending meetings and creating reports and memos. Informal net-
working consists of contacts with colleagues and workers that tend to be social in
nature but often involve discussions regarding business and jobs.
Making Decisions
In many ways managers expend a lot of their effort in making decisions or con-
tributing information so others can make decisions. When you look at courses
offered for future managers, you will fnd a focus on administration, human be-
havior, quantitative modeling and problem solving, decision theory, and elements
of business ethics and globalization. Typically, these courses are designed to help
managers solve problems and make decisions. However, if you ask managers how
much time they spend making decisions, they are likely to say that they seldom
make decisions. That seems like a contradiction. If managers and executives do
not make decisions, who does?
In many organizations, day-to-day decisions are embodied in the methodol-
ogy, rules, or philosophy of the company. Managers are encouraged to collect data
and follow the decisions that have resulted from experience. The managers are
Reality Bytes: Bicycles are Getting Expensive
Avid bicyclists have noticed huge increases in prices of high-end bicycles starting
around 2005. Lightweight bicycles with carbon fber or titanium frames could be
purchased for $3,000-$5,000. By 2007, similar bikes from top-line manufacturers
were commonly listed for $9,000-$10,000 or more. The pattern exists in road and
mountain bikes. News in 2006 indicated that prices would continue increasing
this time because of shortages of raw materials. In particular, carbon fber prices
increased by 25 percent. Demand for the material along with titanium skyrocketed
as airplane manufacturers increased production. Zsolt Rumy, CEO of carbon fber
manufacturer Zoltek Companies, Inc. in St. Louis said he was favoring his large cus-
tomers (airplane manufacturers) to keep them happy. He passed on most of the 60-
100 percent price increases to the sporting-goods customers, noting we really jack
up the price, for smaller customers. Titanium is relatively rare and in high demand,
driving prices to more than $32,000 a toncompared to $1,000 a ton for carbon
steel. Still, 19.8 million bicycles were sold in North America in 2005an 8.2 per-
cent increase from 2004. Manufacturers estimate that 30,000 cyclists a year spend
$3,000 or more on a bike.
Adapted from Paul Glader, Why Bike Prices Are Shifting Higher, The Wall Street
Journal, August 1, 2006.
14 Chapter 1: Introduction
directly involved in the decision process, even though they may not think they are
making the fnal choice.
The broader decision process involves collecting data, identifying problems,
and making choices. Making a decision also requires persuading others to accept
the decision and implement a solution. With this broader defnition, many of the
tasks performed by managers are actually steps in the decision process. Meet-
ings, phone calls, and discussions with colleagues are used to collect data, iden-
tify problems, and persuade others to choose a course of action. Each of these
steps may be so gradual that the participants do not think they are actually making
decisions.
Because of the subtlety of the process and the complexity of the decisions, it
is often diffcult to determine what information will be needed. Decisions often
require creativity. Because data generally need to be collected before problems
arise, it is challenging to design information systems to support managers and
beneft the organization. One important job of management is to examine the need
for information and how it can be used to solve future problems.
Business and Technology Trends
How is business changing? What will managers need to know
in the future? A key issue in management is that you must always work in the
future. If you spend all of your time running around trying to solve todays prob-
lems by putting out fres, you will never succeed. You must plan for tomorrow and
build the structure and processes to handle the day-to-day tasks.
Figure 1.5
In a traditional organizational structure, lower-level managers deal with customers
and collect basic data. Middle-level managers analyze the data, create reports,
and make suggestions to upper-level managers. The higher-level managers make
decisions and set rules to guide the other managers.
CEO
VP
Finance
VP
Marketing
VP
Accounting
VP
HRM
VP
MIS
Layers of middle managers
Customers
Commands
Analyze data
Condensed reports
Collect
data
15 Chapter 1: Introduction
Changes in Organizational Structure
Even without the Internet, management and companies are changing. The most
important change is the move away from the traditional hierarchical structure to a
team-based approach. Most of todays large companies developed years ago when
communications were limited and there were no computers. Most adopted a mil-
itary-inspired hierarchical command structure shown in Figure 1.5. The top-level
managers set policy and directed the vice presidents to carry out the mission of the
company. Sales staff dealt directly with customers, collected data, and passed it to
middle managers. The middle managers organized and summarized the data and
passed it up the chain. Little data was shared among the middle and lower levels.
In contrast, because it is easy to share data, information technology offers the
ability to alter the way companies are organized and managed. Figure 1.6 shows
the new approach. This method focuses on teamwork and a shared knowledge
of all relevant data. Some teams, like sales and accounting, will have ongoing
tasks. Other task forces will be formed to solve new problemsoften created
from managers across the company. Managers can expect to participate in many
teams, essentially at the same time. Data can be obtained and shared through the
information system, meetings can be held online, documents and comments can
be circulated electronically.
This structure enables companies to be run with a smaller number of managers.
Each manager is more productive because of the tools and the ability to perform
many jobs. Another strength of this approach is that it is easy to use consultants
Figure 1.6
In the last few years, many companies have moved toward a more decentralized
form of management. They have removed the middle layers of management and
replaced them with smaller teams. Franchises and smaller teams have become the
primary service contact with customers. Information sharing becomes crucial in this
environment. Teams communicate directly and share data across the company.
Management Team
CEO
Finance
Team
Marketing
Team
Accounting
Team
HRM
Team
Sales
Team
Franchise
Strategy
Methodology/Rules
Customers
Corporate
Database
&
Network
VP
Fin
VP
Mrkt
VP
Acct
VP
HRM
VP
MIS
16 Chapter 1: Introduction
and temporary workers for short-term projects. In todays legal climate, it is ex-
ceedingly diffcult to fre workers, so frms often use temporary workers for in-
dividual projects. Permanent workers, supplemented with specialized temporary
talent, can organize a team. The team disbands when the project is fnished.
Business Trends
As described in Figure 1.7, seven fundamental trends have been driving the econ-
omy and changing businesses: (1) specialization, (2) management by methodolo-
gy, (3) mergers, (4) decentralization and small business, (5) reliance on temporary
workers, (6) internationalization, and (7) the increasing importance of service-ori-
ented businesses. These trends will be discussed throughout the text to illustrate
how they affect the use of information systems and how managers can use infor-
mation systems to take advantage of these trends. Tightening job markets also
means that managers must continually work on self-improvement. To survive, you
must provide value to the organization.
Business Trend Implications for Technology
Specialization Increaseddemandfortechnicalskills
SpecializedMIStools
Increasedcommunication
Methodology and
franchises
Reductionofmiddlemanagement
Increaseddatasharing
Increasedanalysisbytopmanagement
Computersupportforrules
Reengineering
Mergers Fourorfvebigfrmsdominatemostindustries
Needforcommunication
Strategictiestocustomersandsuppliers
Decentralization
and small business
Communicationneeds
Lowercostofmanagementtasks
Lowmaintenancetechnology
Temporary workers Managingthroughrules
Findingandevaluatingworkers
Coordinationandcontrol
Personaladvancementthroughtechnology
Security
Internationalization Communication
Productdesign
Systemdevelopmentandprogramming
Salesandmarketing
Service orientation Managementjobsareinformationjobs
Customerservicerequiresbetterinformation
Speed
Figure 1.7
Changes occurring in the business world affect the use of information technology.
These trends and the implications are discussed throughout the book. Managers
who understand these trends and their relationship with technology will make better
decisions.
17 Chapter 1: Introduction
Specialization
Adam Smith described the advantages of specialization and division of labor in
manufacturing more than 230 years ago. The concepts are now being applied to
managers. As functional areas (such as marketing or fnance) become more com-
plex, they also become more specialized. Area managers are expected to under-
stand and use increasingly sophisticated models and tools to analyze events and
make decisions. As a result, the demand for managers with specifc technical skills
is increasing, while the demand for general business managers is declining. First
you get a job as an accountant (or whatever our specialty is), then you become a
manager. This trend is refected in MIS by the large number of specialized tools
being created and the increased communication demands for sharing information
among the specialists.
Management by Methodology and Franchises
Specializations advantage is that it reduces management tasks to smaller prob-
lems. Using specialization coupled with technology, frms have reduced many
management problems to a set of rules or standard operating procedures. Day-
to-day problems can be addressed with a standard methodology. For example,
the managers guidebook at Wal-Mart or McDonalds explains how to solve or
prevent many common problems. These rules were created by analyzing the busi-
ness setting, building models of the business, and then creating rules by anticipat-
ing decisions and problems. This approach gives less fexibility to the lower-level
managers but encourages a standardized product, consistent quality, and adher-
ence to the corporate philosophy.
Management by methodology also allows frms to reduce their number of mid-
dle managers. By anticipating common problems and decisions, there is no need
to call on trained managers to solve the daily problems. Franchises like McDon-
alds carry this technique one level further by making the franchisee responsible
for the fnancial performance of individual units. The common management tasks,
however, are defned by the central corporation.
Reality Bytes: American Workers Must be Crazy
The Center for Work-Life Policy surveyed 1,600 workers who earned more than
$75,000 a year. In 2007, almost half of those workers put in 60 hours a week and 10
percent were working more than 80 hours a week. Many of the workers (28 percent)
in banking and fnance had extreme jobs working more than 60 hours a week with
unpredictable demands, travel, and tight deadlines. Most of the workers putting in
over 60 hours a week said they loved their jobs. But half of those with extreme
jobs said they wanted to quit within a year. Still, in a different online survey, 29 per-
cent of 510 respondents said they would work more than 100 hours a week for their
dream job. Remember that a week has only 168 hours. In other studies, American
workers rarely use their full vacation allotment.
Adapted from Kyle Stock, Would You Work 100 Hours a Week for Your Dream
Job? The Wall Street Journal, March 29, 2011.
18 Chapter 1: Introduction
Technology Toolbox: Finding Government Data
Problem: Many business problems require data, particularly regarding demograph-
ics and the economy.
Tools: The federal government collects a huge amount of data; much of it is now
available online. The data is maintained by individual agencies and it helps if you
know what types of data are provided by each agency. However, the main site www.
fedstats.gov contains links to all of the agencies.
Agency Main Types of Data Site
Labor (BLS) Employment and Prices www.bls.gov/data
Census Demographic and maps www.census.gov
Economic Analysis (BEA) Economic summaries www.bea.gov
Transportation Statistics Airline, rail, and road www.bts.gov
Justice Statistics Crime and courts bjs.ojp.usdoj.gov
Economic Research (Ag) Food and farm economics www.ers.usda.gov
Health (CDC) Health and Healthcare www.cdc.gov.nchs
Securities and Exchange (SEC) Business flings www.sec.gov (EDGAR)
Most of the federal Web sites have the ability to download historical data, typi-
cally into spreadsheets. Some, as the BLS have search forms where you can select
exactly which data you want to download. At all of the sites it is important that you
read the descriptions carefully because there can be subtle but important differences
in the series.
In the past couple of years, the government agencies have opened their databases
to some of the search engines. In particular, Google and WolframAlpha can automat-
ically search the databases and retrieve the data. In most cases, the data is returned
as a chart, so if you truly want the underlying data, you might still have to go to the
government Web site. But sometimes it is helpful to use the search engines to fnd
the specifc agency.
Quick Quiz:
1. What was the U.S. monthly unemployment rate for the last year?
2. What is the current population of the U.S.?
3. What was the value of the U.S. trade defcit for the last year?
19 Chapter 1: Introduction
Merger Mania
Up to the late 1800s and early 1900s, most businesses were small, having markets
limited to small geographic regions. A brief history of industrial organization re-
veals four waves of mergers in the United States: (1) the horizontal mergers of the
late 1800s epitomized by the oil and banking industries; (2) the vertical integration
of the early half of the 20th century, illustrated by the oil, steel, and automobile
companies; (3) conglomerate mergers of the 1950s and 1960s, in which frms like
IT&T (an international telecommunications giant) acquired subsidiaries in many
different industries (including a bakery!); and (4) giant horizontal mergers at the
turn of the 21
st
century. All of these mergers arose to take advantage of economic
power, but technology made them possible. Without communication (telegraph
and telephones earlier, computer networks later), frms could not grow beyond a
certain size because managers could not monitor and control lower-level workers.
The most recent mergers have been impressive in terms of the size of the frms
and the sectors involved. The banking industry was one of the frst to begin con-
solidation. Relaxation of federal restrictions quickly led to large regional and na-
tional banks. The telecommunications industry also experienced several changes,
such as the ABC-Disney and AOL-Time/Warner merger between telecommunica-
tions and entertainment industries. Telephone, Internet, and cable companies also
were fertile ground for mergers, such as MCI and WorldCom or AT&T, TCI, and
the reconsolidation of the telephone companies. The horizontal mergers in the pe-
troleum, food production, automobile, and grocery industries represented major
consolidations of operations as well. Some of these combinations crossed interna-
tional boundaries (e.g., Daimler and Chrysler or Chrysler and Fiat). Some of these
trends were fueled by the high stock market valuations, which provided capital to
the successful frms and punished the weaker ones.
One of the important keys to these mergers was the improved capability of
information and communication technology. Without the IT structure, it would be
exceedingly diffcult to manage these combined frms. Most of the combinations
also resulted in a loss of middle-management jobs. The remaining workers relied
on technology to improve their productivity. The newly centralized frms also re-
lied on communication technology to provide customer service across the country
and around the world.
Decentralization and Small Business
Strangely, businesses today are becoming both larger and more decentralized. The
goal of decentralization is to push the decision-making authority down to the level
that deals with the customer. The top managers set strategy and establish projects
across the organization. The lower-level managers and salespeople solve prob-
lems and make decisions to improve sales and negotiate with customers. The gap
between these groups is bridged by information technology. Companies no longer
need hundreds of middle-level managers to organize data and interpret top man-
agement commands. In the past, with limited information technology, small divi-
sions were expensive to maintain because of the cost of collecting and processing
the basic accounting and operating data.
Within a frm, operations can be decentralized into teams of workers. In this
situation, departments operate relatively independently, selling services to other
departments by competing with other teams. They often perform work for outside
frms as wellessentially operating as an independent business unit within the
corporation. The main goal of decentralization is to push the decisions and the
20 Chapter 1: Introduction
work down to the level of the customer, to provide better customer service and
faster decisions. Information systems enable executives to gather and manipulate
information themselves or with automated systems. As a result, there is less need
for middle managers to prepare and analyze data.
At the same time that large business have consolidated and shed managers,
many of these people have started their own small companies. Sometimes work-
ers have become consultantsperforming tasks similar to the jobs they left, but
working part time for a variety of frms.
Temporary Workers
So what happens to the people who are no longer needed as middle-level manag-
ers? At various times in the past, some companies provided a form of lifetime em-
ployment for their workers. As long as workers continued to do their job and re-
mained loyal to the company, their jobs were secure. Even in more diffcult times,
when employees were laid off, they were often encouraged (through extensions
of unemployment benefts) to wait until the economy improved and they could be
rehired. Companies in other nations, especially Japan, had stronger commitments
to workers and kept them on the payroll even in diffcult times.
Today, in almost every industry and in many nations (including Japan), all jobs
are at risk. To compensate, companies increasingly rely on a temporary work-
force. Individuals are hired for specifc skills and tasks. When these basic tasks
are completed, the employees move on to other jobs. Increasingly, even execu-
tives are hired because of their specifc expertise. Consultants and other profes-
sionals are hired on a contract basis to solve specifc problems or complete special
assignments.
In many ways, it is more diffcult to manage a company that relies on temporary
workers. Special efforts must be made to control quality, keep employees work-
ing together, and ensure that contract provisions are met. Technology can play an
Reality Bytes: Visual Search
http://www.bing.com/visualsearch
http://image-swirl.googlelabs.com/
http://www.google.com/mobile/goggles/#text
http://images.google.com (Use Google Chrome)
Humans do not often remember items by name. People often visualize items and
remember things by association. So it would be useful to have search engines that
can fnd things based on images. The challenge is that computers are relatively weak
at image recognition. The code is getting better, but search results based on actual
photos are still relatively generic. Microsoft and Google both have tools to search
for collections of images based on word tags. The Microsoft Bing engine has some
useful collections, such as dog and cat breeds. Google tends to rely on images that
are tagged by other users. Google Goggles is an early version of a search engine that
uses an uploaded photo or a photo taken with a Smartphone to search for information
related to the object.
Adapted from Katherine Boehret, In Search Of...Images Worth 1,000 Results, The
Wall Street Journal, January 12, 2010.
21 Chapter 1: Introduction
important role in these situations. It can improve communications, maintain easy
(but controlled) access to data and contracts, and help to institute corporate stan-
dards. The Internet is beginning to play this management rolefnding contract
workers, negotiating the work, and distributing the fnished products.
To you as a worker, the loss of middle-management jobs and reliance on tem-
porary workers should be scary. It means more competition for jobsparticularly
higher-level careers. To obtain higher-level jobs, you will need to possess more
analytic skills than other potential employees. Even as a manager, you will need
your own competitive (professional) advantage. Along with additional education,
your use and knowledge of technology can give you an advantage.
The issue of contract workers is particularly critical with computer program-
mers and developers. Many frms want to hire contract programmers because they
will no longer be needed after an initial application is developed. This approach
works until the economy booms, then it becomes exceedingly diffcult to fnd
workers. In the end some companies fnd they have to hire permanent workers
simply to avoid the problems of trying to fnd new contractors every couple of
years.
Internationalization
Several events of the early 1990s demonstrated the importance of international
trade: closer ties forged with the European Union, creation of the North Ameri-
can Free Trade Area (NAFTA), and the continued relaxation of trade restrictions
through the General Agreement on Tariffs and Trade (GATT) and the World Trade
Organization (WTO). Although barriers to trade remain, there is no doubt that the
Reality Bytes: IT Spending
Forrester Research is a consulting frm that tracks trends and details in information
technology. The company regularly reports on IT spending. Note that software and
telecommunication services (phones and Internet) are the largest component of costs.
Although, combining hardware and network equipment into a single category makes
it about equal to the software costs.
Adapted from The Wall Street Journal, Where the Money Goes, April 25, 2011
22 Chapter 1: Introduction
international fow of trade and services plays an increasingly important role in
many companies. Even small frms are buying supplies from overseas and selling
products in foreign markets. Trade also brings more competition, which encour-
ages frms to be more careful in making decisions.
As Figure 1.8 shows, the role of exports and imports has expanded rapidly
in the United States since 1970. In European nations, international trade is even
more important. Today, internationalization is a daily fact of life for workers and
managers in almost every company. Even small businesses have links to frms in
other nations. Many have set up their own production facilities in other nations.
Much of this global expansion is supported by technology, from communication
to transportation, from management to quality control.
Communication facilities are one of the most prominent uses of information
technology to support the move to international operations. Communication tech-
nology is especially important for service industries such as consulting, program-
ming, design, marketing, and banking. Several years ago, services were often con-
sidered to be nontradable goods because they tended to have high transportation
costs, making them diffcult to export. Today, improved communication facilities
through the Internet have made certain types of services easy to export. For exam-
ple, fnancial institutions now operate globally. Today, software development has
a growing international presence. Many U.S. frms are turning to programmers in
Ireland, India, and Taiwan. Through the use of programmers in India, for example,
a U.S.-based frm can develop specifcations during the day and transmit them to
India. Because of the time difference, the Indian programmers work during the
U.S. night and the U.S. workers receive updates and fxes the next morning.
Figure 1.8
By almost any statistic, in almost every nation, the level of international trade has
increased dramatically during the last 20 years. International trade brings more
choices, more competition, more data, more complexity, and more management
challenges. Source: http://www.bea.gov/national/nipaweb/Index.asp.
0
0.02
0.04
0.06
0.08
0.1
0.12
0.14
0.16
0.18
0.2
P
e
r
c
e
n
t
Year
U.S. Trade Imports/GDP
Exports/GDP
23 Chapter 1: Introduction
Internationalization also plays a role in selling products. Groups of countries
have different standards, regulations, and consumer preferences. Products and
sales techniques that work well in one nation may not transfer to another culture.
Information technology can track these differences, enabling more fexible manu-
facturing systems that can customize products for each market.
Figure 1.9 shows one way to look at internationalization on the Web. It shows
the percentage of Web browsers confgured for the top ten languages in 2010.
English is still at the top of the list, but it is followed closely by Chinese. These
numbers are relatively accurate because servers can be confgured to recognize
the language of the client browser and the statistics are collected automatically.
Figure 1.10 shows a broader picture by counting the number of Internet users
in each geographical region. These numbers are somewhat more subjective be-
cause someone (typically the Nielsen agency) has to estimate the number of peo-
ple in each nation and region who use the Internet on a regular basis. This survey
approach can miscount peopleparticularly those who get access through work
or school. Still, it shows the international character of the Internet. It does not take
a high percentage of users for regions with large populations to dominate. Asias
825 million users is only about 30 percent of the people versus about 75 percent
for North America Do the statistics mean that you can create a Web site and begin
selling items to the hundreds of millions of Chinese and Indian Web users? Based
Figure 1.9
Internationalization of the Web. Percent of user languages estimated from Web
browser settings. Source: http://www.internetworldstats.com/stats7.htm (2010).
English, 27.3
Chinese, 22.6
Spanish,
7.8
Japanese, 5
Portuguese,
4.2
German, 3.8
Arabic, 3.3
French, 3
Russian, 3
Korean, 2
Other, 17.8
Web Users (Language)
24 Chapter 1: Introduction
on the fact that businesses have been attempting to expand into Asia for decades
since Nixons trade mission in 1973, it will probably take a while. Keep in mind
that per capita income is still lower in those nations, and much of the infrastruc-
ture developed for the Western world is not yet in place in Asiaincluding ship-
ping and payment methods.
The increased competition created by internationalization and decentralization
requires corporations to be more fexible. Flexibility is needed to adapt products
to different markets, choose suppliers, adopt new production processes, fnd inno-
vative fnancing, change marketing campaigns, and modify accounting systems.
Firms that attain this fexibility can respond faster to market changes, catch op-
portunities unavailable to slower frms, and become more proftable.
Service-Oriented Business
Another trend facing industrialized nations is the move toward a service-oriented
economy. As shown in Figure 1.11, in 1920 the U.S. census showed 29 percent of
the employed were in farming. By 2000, that fgure had fallen below 1 percent.
In the early 1900s, people were afraid that this trend would cause food shortages
throughout the United States and the world. Improvements in technology in the
form of mechanization, transportation, growing techniques, chemicals, and crop
genetics proved them wrong.
A similar trend in manufacturing has produced the same consternation. Al-
though the number of workers employed in manufacturing has varied over time,
it is clear that the largest increase in jobs has been in the management, clerical,
and service sectors. In 2010, 11 percent of the jobs were in manufacturing, with
Figure 1.10
Internationalization of the Web. Number of users by geographic region. Source:
http://www.internetworldstats.com/stats.htm (2010).
Asia, 825.1
Europe,
475.1
North
America,
266.2
Latn
America/
Caribbean,
204.7
Africa, 110.9
Middle East,
63.2
Oceania/
Australia,
21.3
Million
Users
25 Chapter 1: Introduction
88 percent in service and management jobs. The largest increase in new jobs has
been in the management, clerical, and service sectors.
These trends represent changes in the U.S. economy and in demographics such
as age characteristics of the population. The importance of the management, cleri-
cal, and service sectors has to be considered when examining how MIS can ben-
eft a frm and its workers. The goal is to gain a competitive advantage through
better customer service. Even manufacturing companies are beginning to focus
their efforts around the concept of providing services to the customer.
Reengineering: Altering the Rules
Does technology alone improve a business? Many companies are
managed by rules and procedures. It would be virtually impossible to do other-
wisethe cost of an intense evaluation of every single decision would be over-
whelming. Hence, upper-level managers establish procedures and rules and an
organizational structure that automatically solve typical problems. More complex
problems are supposed to be identifed by managers and forwarded up the chain
of command for answers.
This type of management creates a fxed approach to operations and to solv-
ing problems. However, the business environment rarely remains constant. Over
time, new technologies are introduced, new competitors arrive, products change,
old markets shrink, and frms merge. At some point, frms that have been guided
by relatively static methodologies fnd their methods no longer match the market-
place. Hence, they decide to reengineer the company: beginning from scratch,
they identify goals along with the most effcient means of attaining those goals,
and create new processes that change the company to meet the new goals. The
Figure 1.11
Over time, Americans have moved from agricultural to manufacturing to service and
management jobs. Management and service jobs are often dedicated to collecting and
analyzing data. Just as the decline of workers in agriculture did not create a shortage
of food, the relative decline in manufacturing did not create a shortage of products.
0
20
40
60
80
100
120
140
1920 1930 1940 1950 1960 1970 1980 1990 2000 2010
M
i
l
l
i
o
n
W
o
r
k
e
r
s
U.S. Employment Paterns
Service
Management
Manufacturing
Farm
26 Chapter 1: Introduction
term reengineering and its current usage were made popular in 1990 by manage-
ment consultants James Champy and Michael Hammer. Many of the underlying
concepts have been in use for years.
Sometimes reengineering is undertaken by internal management as a means to
improve the company. For example, in the early 1990s, Compaq Computer al-
tered its strategy and reengineered its operations and management to cut millions
of dollars in costs and save the company. But in 2000, Dell Computers just-in-
time and made-to-order production system dominated the industry. Unable to alter
the company fast enough, Compaq was ultimately purchased by Hewlett-Packard.
Sometimes reengineering is forced on the company when it is taken over by
another corporation. In a few rare cases, managers continually evaluate the frm to
make several small changes instead of relying on a major overhaul.
Reengineering can be a highly complex process, requiring thousands of hours
of time to analyze the company and its processes. In addition to the complexity,
reengineering often faces resistance because it results in a change in the organiza-
tions structure, which affects the authority and power of various managers.
Like any management technique, reengineering is not guaranteed to work. A re-
port by CSC Index, a major reengineering consulting company, that surveyed 497
large companies in the United States and 124 in Europe, noted that 69 percent of
the American and 75 percent of the European companies have already undertaken
reengineering projects. Several of these projects have not been successful. CSC
Index notes that three factors are necessary for success: (1) overcome resistance
by managers who are afraid of losing jobs or power, (2) earn strong support by
upper management, and (3) aim high and go for major changes instead of small
rearrangements.
Often, the point of reengineering is to rebuild the company so that it can make
better use of technology. Simply placing computers into a frm, or just buying re-
placement computers, does not provide many advantages. The key to technology
is to restructure the operations and management to reduce costs and make better
Reality Bytes: Driptech with 20 Employees Goes International
Peter Frykman is the owner of Driptech, a small irrigation equipment company head-
quartered in Palo Alto, California. The frm has 20 employeesbut seven of them
are located in China and India. Mr. Frykman was part of a group of Stanford Uni-
versity graduate students who designed a method to make drip irrigation systems
inexpensively. The group tested the equipment in Ethiopia, formed the startup com-
pany, and raised $900,000 in funding. After a pilot project in India kicked off sales
in Asia in 2009, Chinese offcials became interested in the technology. Driptech set
up offces in Mumbai and Beijing, and Mr. Frykman soon expects half his employees
to be overseas. He notes that having offces in three countries is diffcult, but with
modern communication technology he is able to pass work around the world and
have engineers working continuously. He notes that If you get the rhythm right, you
can really be working around the clock as an organization. A few other companies
also work internationally, but the U.S. Census Bureau notes that only two percent of
small companies (fewer than 100 employees) sell their products in overseas markets.
Adapted from Justin Lahart, For Small Businesses, Big World Beckons, The Wall
Street Journal, January 26, 2011.
27 Chapter 1: Introduction
decisions. For example, in the 1980s, replacing a secretarys typewriter with a per-
sonal computer had some benefts. But frms ultimately gained more benefts by
giving personal computers to managers and eliminating the secretary. Today, you
might consider simply updating those personal computers. However, building an
information system that provides easy-to-read up-to-the-minute data to top man-
agement makes it possible to eliminate the lower-level managers and still make
better decisions.
One of the challenges of reengineering is that the proposals can seem drastic.
What do you mean you want to eliminate half of the corporate-level employees!?
But being driven out of business by a leaner, lower-cost competitor is always a
worse situation.
Management and Decision Levels
How do you break businesses into smaller pieces to analyze
them? To understand management, reengineering, and information systems, it
helps to divide the organization into three decision levels: strategy, tactics, and
operations. Each level has unique characteristics, which use different types of sup-
port from information technology. These levels were explained by Robert Antho-
ny in 1965. In 1971, Gorry and Scott Morton added a detailed explanation of how
information systems at that time could support the various levels of management.
However, the terms and characteristics are largely taken from military terms.
Throughout history, in most nations the military has been the largest organization
in terms of the number of employees. Figure 1.12 is an updated picture of the
typical pyramid shape of most organizations involving operations and tactical and
strategic decisions. As is typical with most management models there are many
gray areas and the lines are not absolute.
Figure 1.12
There are three primary levels of decisions in business. Business operations consist
of tasks to keep the business operating on a day-to-day basis. Tactical decisions
involve changes to the frm without altering the overall structure. Strategic decisions
can alter the entire frm or even the industry. Information system tools exist to help
with each type of decision.
Operations
Tactics
Strategy
E
I
S
E
R
P
E
S
D
S
S
T
e
a
m
w
o
r
k
T
r
a
n
s
a
c
t
i
o
n
P
r
o
c
e
s
s
C
o
n
t
r
o
l
28 Chapter 1: Introduction
The power of the model is that it makes it easier to solve business problems.
With any problem, your goal is to identify the primary management level. Once
you know the level, it is easier to focus on the types of solutions that will be rel-
evant. For example, if a company is having basic problems with its day-to-day
accounting, you would focus on improving the data collectionand worry later
about strategic tools and problems with competition. As you read the cases and
Reality Bytes throughout this book, you should identify the primary level of each
problem.
Operations
The operations level consists of day-to-day operations and decisions. In your frst
job, you will typically concentrate on the problems that arise at this level. For
example, in a manufacturing frm, machine settings, worker schedules, and main-
tenance requirements would represent management tasks and decisions at the op-
erational level. Information technology at this level is used to collect data and per-
form well-defned computations. Most of the tasks and decisions are well struc-
tured, in the sense that they can be defned by a set of rules or procedures. For ex-
ample, a clerk at Wal-Mart follows the procedures in the guidebook to deal with
Reality Bytes: Fewer Workers More Output
Looking at the statistics, it is clear that employment at manufacturing companies in
the U.S. has been declining for 40 years. But due to increases in productivity, total
manufacturing output over that time has increased. U.S. companies are producing
more than twice the output they did 40 years ago. In the meantime, even in low-
wage countries such as China, a shortage of workers is driving wage increases of 15
percent or more. Christian Murck, president of the American Chamber of Commerce
in Beijing notes that Chinas low-wage advantage will disappear over the next fve
years. Supply chains are already being disrupted.
Adapted from John Bussey, Analysis: Will Costs Drive Firms Home? The Wall
Street Journal, May 5, 2011.2004.
Sector Operations Tactics Strategy
Production Machinesettings
Workerschedules
Maintenanceschedule
Rearrangeworkarea
Schedulenewproducts
Changeinventorymode
Newfactory
Newproducts
Newindustry
Accounting Categorizeassets
Assignexpenses
Producereports
Inventoryvaluation
Depreciationmethod
Financeshort/longterm
NewGLsystem
Debtvs.equity
Internationaltaxes
Marketing Rewardsalespeople
Surveycustomers
Monitorpromotions
Determinepricing
Promotionalcampaigns
Selectmarketingmedia
Monitorcompetitors
Newproducts
Newmarkets
Figure 1.13
Each functional area of management faces the three categories of decisions and
problems. Only a few examples are presented here.
29 Chapter 1: Introduction
typical operations. Common problems are anticipated, with actions spelled out in
the guidebook. Computer security is an increasingly important problemfor both
individuals and companies. Chapter 5 examines the major threats and tools avail-
able to protect your assets.
As summarized in Figure 1.13, managers in other disciplinessuch as account-
ing, marketing, or fnancealso face operational decisions. Personal productivity
tools, like spreadsheets, word processors, and database management systems help
managers collect and evaluate data they receive on a daily basis. The use of these
tools is reviewed in Chapter 2.
An important task at the operations level is to collect data on transactions and
operations; hence transaction processing systems are a crucial component of the
organizations information system. The data collected form the foundation for all
other information system capabilities. As discussed in Chapter 6, an important
characteristic of transaction processing systems is the ability to provide data for
multiple users at the same time. A special class of transaction processing soft-
ware designed for factory operations is called process control software. Chapter
7 shows how modern enterprise resource planning (ERP) software extends the
concepts of transactions across the organization.
Database management systems are increasingly used to control data and build
systems to share data. Their role is explained in Chapter 4. Chapter 3 shows how
communication networks are used to provide access to data throughout the organi-
zation. Increasingly managers work in teamseither with workers in the same de-
partment or across departments and sometimes companies. Sophisticated software
tools are being developed to help integrate data in these collaborative arrange-
ments. These integration tools and enterprise resource planning systems are
described in Chapter 7. Operational decisions are often the easiest to understand.
They deal with structured problems over relatively short periods of time.
Tactics
As you move up in your career to project leader or department manager, you
will encounter a different level of decision making, where the types of problems
will depend on your specialization, but some common features will stand out. At
the tactical level, decisions typically involve time frames of less than a year. As
shown in Figure 1.14, these decisions usually result in making relatively major
changes but stay within the existing structure of the organization.
Level Description Example Type of Information
Strategy Competitive advantage,
becomeamarketleader.
Long-termoutlook.
New product that will
changetheindustry.
External events, rivals,
sales,costsquality,trends.
Tactics Improving operations
without restructuring the
company.
New tools to cut costs
orimproveefciency.
Expenses, schedules, sales,
models,forecasts.
Operations Day-to-day actions
to keep the company
functioning.
Scheduling employees,
orderingsupplies.
Transactions, accounting,
human resource
management,inventory.
Figure 1.14
Each decision level affects the frm in different ways. Each level uses and produces
different types of information.
30 Chapter 1: Introduction
A manufacturing tactical-level decision might involve rearranging the work
area, altering production schedules, changing inventory methods, or expanding
quality control measures. These changes require time to implement and represent
changes to the basic methods of the frm. What distinguishes them is that they
can be made without altering the overall characteristics of the organization. For
example, in most cases, expanding quality control measures does not require the
frm to expand into new industries, build new facilities, or alter the structure of
the industry. Much of the information for making tactical decisions comes from
the transaction records that have been stored in the computer. Computer tools to
help analyze this type of data are called decision support systems (DSSs) and are
described in detail in Chapter 10.
Reality Bytes: Growing and Dying Industries
Industry Revenue Change
2000-2010
Revenue in 2010
($ million)
Voice over IP (VoIP) 194.0% 12,498
Internet Publishing 25.2% 32,573
Wind Power 16.9% 3,388
E-Commerce & Auctions 12.2% 95,005
Biotechnology 11.0% 86,971
Correctional Facilities 9.1% 34,373
Environmental Consulting 7.7% 18,153
Insurance Claims Adjusters 6.9% 57,530
Video Games 6.2% 38,622
Solar Power 2.7% 69
Video Postproduction -24.9% 4,276
Formal and Costume Rental -35.0% 736
DVD, Game, Video Rental -35.7% 7,839
Newspaper Publishing -35.9% 40,726
Mills (textile) -50.2% 54,645
Wired Telecomm. Carriers -54.9% 154,096
Photofnishing -69.1% 1,603
Manufactured Home Dealers -73.7% 4,538
Record Stores -76.3% 1,804
Apparel Manufacturing -77.1% 12,800
Adapted from Phil Izzo, Top 10 Dying Industries, The Wall Street Journal, March
28, 2011; and Phil Izzo, Top 10 Thriving Industries, The Wall Street Journal, May
16, 2011.
31 Chapter 1: Introduction
Other types of problems that involve more complex models occur in business.
For instance, diagnostic situations consist of spotting problems, searching for
the cause, and implementing corrections. Examples of these situations include re-
sponding to problem reports from operations to identify the cause of the problem
and potential solutions. For instance, a marketing manager might be asked to de-
termine why the latest marketing approach did not perform as well as expected.
Tactical-level decisions tend to involve specialized problems and can often be
solved with the help of an expert. Chapter 10 presents expert systems (ES) to
make this knowledge more accessible to an organization.
Strategy
The next step on the pyramid moves up the corporate ladder to executive-level
decisions. Although you may never be a CEO, you might be in a position to advise
upper-level management about strategic opportunitiesespecially in small busi-
nesses. Strategic decisions involve changing the overall structure of the frm to
give it an advantage over the competition. They are long-term decisions and are
unstructured. In other words, they are usually diffcult and risky decisions. Exam-
ples of strategic decisions in the manufacturing arena include building new facto-
ries, expanding to new products or industries, or even going out of business. Stra-
tegic decisions represent an attempt to gain a competitive advantage over your ri-
vals. Because of the complexity and unstructured nature of executives decisions,
it is diffcult to determine how information systems can help at the strategic level.
However, Chapter 11 explores information system techniques that frms have used
to gain a competitive advantage.
Rivalry Among
Existing Competitors
Bargaining Power
of Buyers
Bargaining Power
of Suppliers
Threat of New Entrants
Threat of Substitute
Products or Services
Figure 1.15
In analyzing strategies, Michael Porter focuses on the fve forces: threat of new
entrants, threat of substitute products or services, bargaining power of suppliers,
bargaining power of buyers, and rivalry among existing competitors. Competitive
advantage can be obtained by using these forces or altering the relationships between
these external agents.
32 Chapter 1: Introduction
An Introduction to Strategy
Why are strategic decisions so diffcult? How do you begin
searching for competitive advantage? In all industries, competition is
challenging. Firms are constantly searching for ways to gain an advantage over
their rivals. Finding these opportunities is hard: it requires extensive knowledge
of the industry, and it requires creativity. Managers also have to be willing to take
risks to implement strategic options. Strategic uses of IT often involve the use of
new technology and development of new software. Being the frst company to
implement a new idea can be risky. However, it can also bring substantial rewards.
Strategic uses of IT are discussed in detail in Chapter 11 because you need to
understand the technology before trying to solve diffcult problems. On the other
hand, to stimulate the imagination needed for creativity, it helps to begin think-
ing about the basic ideas right from the start. Many cases throughout the book
illustrate how frms have used technology to gain substantial advantages. These
examples should help you solve other problems. If you can recognize a pattern or
similarity between your problem and actions taken by other frms, the association
may help you create a solution.
Searching for Ideas
Michael Porter noted that often the frst step in searching for competitive advan-
tage is to focus on external agents, or entities that are outside the direct control of
your company. Porters Five Forces model in Figure 1.15 illustrates that typical
external agents are customers, suppliers, and rivals. You should also look
at the role of government as an external agent. Competitive advantages can be
found by producing better quality items or services at a lower cost than your ri-
Supply storeroom
Supply
Closets
Hospital
Warehouse
American Hospital
Supply
Supplier
Typical Supply Relationship
Supplier
Supplier
Figure 1.16
American Hospital Supply began as an intermediary that bought various medical
supplies and distributed them in bulk to hospitals. The hospital distributed supplies
throughout its facility and was responsible for maintaining its own inventory.
33 Chapter 1: Introduction
vals. Also, many frms have strengthened their positions by building closer
ties with their suppliers and customers.
It is hard to fnd revolutionary ideas that alter the entire industry. And every
frm in the world is constantly searching for that next big idea. Not only do you
have to come up with the best idea, but you have to do it before someone else
tries the same (or better) strategy. Then, because new strategies involve signifcant
changes, and often high costs, you have to be able to persuade the other managers
that your idea will succeed.
Strategy Example: Baxter Healthcare
Strategy is often easier to understand with examples or cases. A classic case in-
volving IT involves management of hospitals. For a moment, picture yourself as
the business manager of a medical center. Hospitals use a large amount of routine
supplies such as bandages and antiseptics. Originally, they purchased them from
various suppliers, held them in inventory, and distributed them throughout the
hospital as they were needed. This relationship is shown in Figure 1.16. Ameri-
can Hospital Supply (AHS) was one of these suppliers. Then, hospitals be-
came squeezed by initial governmental efforts to rein in and standardize medical
costs. One consequence of these early controls is that hospitals and physicians no
longer controlled the length of stay for patients. Consequently, hospital managers
were forced to fnd ways to reduce costs. To gain an advantage over their competi-
tors, AHS created a new system and made an offer to the hospital managers. AHS
Supply Closets
Hospital
Warehouse
American Hospital
Supply
Supplier
Baxter
Supplier
Supplier
AHS/Cardinal Health Computer Link
Computer
Monitor
Usage data
Deliver
Supplies as
Needed
Accurate usage data
Free space
Figure 1.17
American Hospital Supply changed the industry by providing a just-in-time inventory
delivery service. Supplies then were delivered directly to where they are used within
the hospital. AHS could offer this system only by maintaining a computer link
between supply usage and the local warehouse. The computer data also provided
summary reports to management. By purchasing AHS, Baxter Healthcare gained
immediate access to that sales data.
34 Chapter 1: Introduction
placed computer terminals in hospital locations where the supplies were used
(emergency, operating rooms, nursing stations, etc.). As shown in Figure 1.17,
these terminals were connected to the AHS computer.
As hospital personnel removed supplies, they recorded them on the terminals.
The computer kept track of the amount of supplies in each location. A list would
be printed at the warehouse, and drivers delivered the necessary supplies to each
location in the hospital. Monthly usage statistics were sent to the hospital.
The hospital gained because the facility did not need to maintain extra inven-
tory, which saved money and space. Fewer hospital employees were required, be-
cause the supplies were delivered directly to the needed locations. Additionally,
the hospital received detailed usage records.
To offer this service, AHS incurred higher costslargely the cost of creating
and maintaining the information system. What did AHS gain in return? As long
as it was the only company offering this service, AHS gained a competitive ad-
vantage by providing a new service. Hospitals were more likely to choose AHS
over the rivals. But what would happen if a competitor created a similar system?
Would the hospitals stay with AHS or switch to the rivals?
Although the answer depended on the prices, hospitals had a strong incentive to
stay with AHS. They would encounter various switching costs if they chose an-
other supplier. For example, daily operations would be disrupted while the system
was changed. Employees would have to be retrained to use the new system. Man-
agers who used the monthly usage reports would have to adapt to the new system.
A rival would have to offer strong price advantages to overcome these costs.
Supply Closets
Hospital
Supplier
Baxter
Supplier
Johnson
Supplier
Winning bidder
delivers suppiles
Internet
Daily Auction
Bid 1
Bid 2
Bid 3 << purchase
Figure 1.18
Moving to the Internet. Today, competition could be increased by connecting the
hospitals and suppliers through a B2B Internet auction. The daily hospital data could
be listed on a private auction site, and supplier computer system would automatically
bid for each job. The winning bidder would deliver supplies as usual, but different
suppliers might win the bidding each day.
35 Chapter 1: Introduction
In 1985, Baxter Healthcare, a large manufacturer of supplies, purchased AHS.
Of course, over time Baxter had an incentive to cut its costs to maintain higher
profts. In the process their delivery service might suffer. Some hospitals appar-
ently experienced problems and returned to in-house stock rooms to eliminate
shortages of basic supplies. In 1996, Baxter spun off Allegiance Medical Sup-
ply Corporation as a separate unit. Today, Allegiance is a subsidiary of Cardinal
Health, one of the three main health care distributors in the United States (Owens
& Minor and McKesson are the other two).
With the expansion of the Internet, as shown in Figure 1.18, the entire medical
supply chain industry is attempting to build an online Web service system. Ideally,
miniature electronic auctions would take place each day. The supplier systems
would automatically monitor the hospital needs and compete to resupply them.
Most of the monitoring and bidding could take place automatically on the Inter-
net. The best bid would win each day, and the hospitals would not be tied to a
single supplier. Yet all transactions and payments would be automated, holding
costs down for all parties.
Cloud Computing
As a consumer, you have certainly seen the increasing importance of Web-based
technologies, including sales, news and entertainment, communications, and so-
cial network interactivity. Many of these same concepts can be applied to infor-
mation technology within businesses. Instead of running applications on personal
computers, all of the data and services can be moved to Web-based servers. Man-
agers could access the data through portable devices including laptops, tablets,
and cell phones. Centralizing the Web servers provides the ability to control and
monitor the data and software. It also makes it easy to provide backups, duplicate
facilities, and robust Internet connections. In some cases, services might be pro-
vided by other companies. The Internet is often pictured as a cloud because it has
imprecise boundaries. So running operations from Web servers is often referred to
as cloud computing.
Many aspects of MIS can impact and beneft from cloud computing. Each
chapter in the book looks at various issues and examples of how Web-based serv-
ers can change the way companies deal with information systems.
Summary
Information technology is altering jobs, businesses, and society. Managers who
understand and use this technology will be able to improve companies and ad-
vance their personal careers. Studying technology means that you must also study
businesses and understand how they operate. Information systems consist of hard-
ware, software, people, procedures, and collections of data. These components
work together to provide information and help managers run the frm, solve prob-
lems, and make decisions. Studying information systems will also teach you to
analyze business operations and solve problems.
The role of a manager is changing, but at a basic level all managers spend time
organizing resources, planning, motivating workers, and communicating with oth-
er employees and managers. Several business trends will affect individual jobs,
business operations, and society. Important trends include specialization, manage-
ment by methodology and franchising, decentralization, the increased importance
of small businesses, the use of temporary workers and consultants, the growing
international scope of business, and the rise in service-oriented businesses. Infor-
36 Chapter 1: Introduction
mation technology is used to support these trends and provide new management
alternatives.
As is true of many problems, management and information technology can be
studied by breaking them down into smaller pieces. The three basic levels to man-
agement are operations, tactics, and strategies. The operations level is concerned
with day-to-day operations of the frm. Tactics involve changes and decisions that
improve operations but do not require a major restructuring of the frm. Strategies
are designed to give a frm a competitive advantage.
Strategy typically involves examining external forces: rivals (competitors with-
in the industry), customers, suppliers, potential new competitors, and potential
substitute products or services. Information technology can be used to strengthen
links strategically between customers and suppliers. It can also be used to create
new products and services and to improve the quality of the operations.
Key Words
B2B
B2C
cloud computing
data
database
decision process
decision support system (DSS)
diagnostic situation
dot-com
e-business
e-commerce (EC)
enterprise resource planning (ERP)
expert system (ES)
hardware
information
information technology (IT)
knowledge
management informa-
tion system (MIS)
people
procedures
reengineering
software
strategic decisions
structured decisions
switching costs
transaction processing system
wisdom
A Managers View
How do you manage and control a frm? In the 1950s, an army of back-of-
fce workers and managers were required just to record the basic data for the
frm. Today, a good information system helps you manage a small company
or a large empire with fewer workers. The workers that remain are those
who use the technology intelligently to solve business problems. Regardless
of your area of expertise, as a manager you have to be able to analyze and in-
terpret data. You also have to communicate and share your work with team-
mates. Information technology provides the tools you need to solve common
business problems.
37 Chapter 1: Introduction
Web Site References
General Searches
Ask www.ask.com
Bing www.bing.com
Dogpile www.dogpile.com
Google www.google.com
Yahoo www.yahoo.com
Yippy www.yippy.com
People and Businesses
Anywho www.anywho.com
Infospace www.infospace.com
Knowx www.knowx.com
ChoicePoint www.choicepoint.com
Securities and Exchange www.sec.gov
SuperPages www.superpages.com
Switchboard www.switchboard.com
Whitepages www.whitepages.com
Reference
Britannica (encyclopedia) www.britannica.com
CIA World Factbook www.cia.gov/cia/publications/
factbook
Dictionary www.dictionary.com
Encarta (encyclopedia) www.encarta.com
FedStats www.fedstats.gov
Translation dictionaries www.freedict.com
Translate/Google translate.google.com
Wiktionary www.wiktionary.org
Wikipedia www.wikipedia.org
Wolfram Alpha, math and science www.wolframalpha.com
38 Chapter 1: Introduction
Review Questions
1. What is the main purpose of MIS?
2. How is MIS different from studying personal productivity tools?
3. Describe the fve components of a management information system.
4. Why do students who are not MIS majors need to study MIS?
5. How important is the Internet in sales?
6. How do you know if you are buying the correct level of technology?
7. What are the roles of managers in a modern company?
8. Describe how seven basic trends in todays business environment are related
to MIS.
9. Why is re-engineering important in business?
10. What are the three main management decision levels, and why are they
important to know?
11. How does strategy involve external organizations?
12. What is cloud computing?
Exercises
1. Identify a job that has minimal use of information technology. Explain why
the job might not need technology or what type of technology would be
needed to improve productivity in the job.
2. Talk to at least three people and ask them how often they get a new cell
phone and a new computer. Compare the answers and comment on any
differences.
3. Choose a company and describe three decisions that must be made: one at the
operations level, one tactical, one strategic. Be specifc.
4. Choose a company and read its two most recent annual reports. Summarize
the companys strategy and goals for the coming year.
5. As an entrepreneur, you decide to open a fast-food restaurant. You can
purchase a franchise from one of the established corporations (as discussed
in the McDonalds case) or create your own restaurant. Compare the choices
by identifying the decisions you will face with each approach. What data will
you need to collect?
6. Assuming you run a small business, fnd two Web sites that enable you to
hire contract workers online. Provide a brief list of the types of tasks that are
offered on the sites.
7. Review business magazines, newspapers, and Web sites. Find two
organizations and identify a specifc business problem that each one faces.
Classify the problem as operations, tactics, or strategies.
39 Chapter 1: Introduction
8. Identify the most likely decision level for each of the following situations.
a. A manufacturing frm lays off 100 workers.
b. A restaurant completely changes it menu.
c. A Web site begins accepting Google payments.
d. A company builds an iPhone-based app to provide complete customer and
order data to its salespeople.
e. A California farmer tears out his felds of grape vines and plants olive
trees.
f. A large retail chain implements a new computer system to analyze sales by
time and day and uses it to alter prices in every store.
g. A manufacturer creates a computer system to evaluate workers in terms of
productivity and cost and uses it to give bonuses or fre workers.
9. Find one company that is using information technology in a way that
surprises you. Briefy explain what the company does and why it seems
different or new. (Check places you go, try the Wall Street Journal,
Computerworld, or CIO Magazine.)
10. Which geographic region of the world has the most Internet users and why?
Technology Toolbox: Searching
11. What was the name of the space shuttle that took the last fight?
12. What is the approximate ratio of cell phones to landline phones in Ethiopia?
13. How many singers have covered (recorded) John Lennons song Imagine?
14. How much proft did Exxon Mobile earn in 2010?
15. Who is the main executive producer of the TV show The Big Bang Theory?
Technology Toolbox: Government Data
16. Find monthly unemployment data for at least fve years and display it in an
appropriate chart.
17. Compare the most recent population by state.
Technology Toolbox: Spreadsheets
18. Create a spreadsheet to record current sales and forecast future sales as a 4
percent increase.
increase 4%
Region Sales Forecast
Midwest 132
Southwest 651
Northeast 478
Southeast 391
1652
40 Chapter 1: Introduction
19. If you have Excel 2010 or later, create the following spreadsheet and chart
that consists of fctional data evaluating three search engines. The weighted
average is the total of the response value in the cell times the point value
on the frst row, where the total is divided by the sum of the number of
responses.
5 4 3 2 1
SA A N D SD Wtd Avg
Google 71 37 12 5 1 4.365
Bing 65 43 27 8 4 4.068
Yahoo 32 55 45 32 12 3.358
Teamwork
20. Each team member should fnd and select a new computer that could be used
by a typical manager in a business. Combine the data from each person into a
single spreadsheet. Compute the average price, drive size, and memory size.
As a group, select one of the computers that could be used as the standard for
each person in the group.
21. Choose an industry. Have each team member select one company within
the industry and fnd the number of employees at that company for the two
most recent years. Compare the total number of employees to see if the total
has increased, and to see which frms are growing the fastest. Compare the
industry results to those in the rest of the class.
22. As a team, fnd an example of companies that have recently merged. Identify
potential reasons for the merger and how each company might beneft (or
suffer) from the merger.
23. As a team, choose a specifc company and identify at least one decision that
has to be made at each of the management levels. What data would be needed
to make the decision? Briefy explain why the chosen level applies to each
decision.
Rolling Thunder Database
24. Install the Rolling Thunder Bicycles database. Look through the various
forms. List each of the main forms and briefy describe the purpose of the
form.
25. Using the Rolling Thunder help fles or the description available on the
Internet site, describe the goals of the frm and outline the basic operations.
26. Using Internet sources, identify the competitors to Rolling Thunder Bicycles.
27. Using Internet, fnancial, and government sources, estimate the size of the
market (total sales and number of bicycles) for quality bicycles.
28. Locate at least fve sources for additional information about bicycles and
bicycle components on the Internet. List and briefy describe the sites.
41 Chapter 1: Introduction
Additional Reading
Anthony, Robert N. Planning and Control Systems: A Framework for Analysis.
Cambridge: Harvard University Press, 1965. [Early MIS]
Booker, Ellis. Baxter Gets PC Smart, Ousts Dumb Terminals, Computerworld,
April 3, 1989, p. 33. [Baxter Healthcare]
Gorry. G.A. and M. Scott Morton. A Framework for Management Information
Systems, Sloan Management Review, Fall 1971, pp 55-70. [Early MIS.]
Health-Care Guys Can Make Good on Retail IT. PC Week, August 21, 1995, p.
11. [Baxter Healthcare.]
Leavitt, Harold J. and Thomas L. Whisler. Management in the 1980s, Harvard
Business Review, November 1958, p 41-48. [Prediction of decline in middle
management.]
Luthans, Fred. Organizational Behavior: A Modern Behavioral Approach to
Management, New York, McGraw Hill, 1973. [Management.]
Mintzberg, Henry. The Nature of Managerial Work, Harper & Row, New York,
1973. [Management.]
Nash, Jim. Just What the Doctor Ordered, Computerworld, June 1, 1992, p. 79.
[Baxter Healthcare.]
Porter, Michael. Competitive Strategy: Techniques for Analyzing Industries and
Competitors, New York: Free Press, 1980. [Strategy.]
Sloan, Alfred. Adventures of a White-Collar Man. New York: Doubleday, 1941.
[Management.]
Cases: Te Fast-food Industry
Te Industry
What do customers want? Look at the sales for the major fast-food res-
taurants, and you see increases by many companies. Look at the Stan-
dard and Poors restaurant stock market index, and investors agree. In
2003, the index was up 37.5 percent, compared to a 24.8 percent rise
in the S&P 1500. Since an aging, wealthier population favors dining in
full-service restaurants, the casual-dining sector is gaining share from
fast-food restaurants. This trend is projected to continue as the popu-
lation ages. Many restaurant chains, especially those in the fast-food
sector, will increase their focus on healthy food initiatives to attract
customers and reduce the impact of obesity-related lawsuits. Increased
diversity in menus will help to reduce the dependence on industry price
discounting, enabling operating margins to further expand. The intro-
duction of new restaurants will likely slow in the over-stored U.S. fast-
food market. Most fast-food restaurants are looking to international
expansion to lead to growth. But, fast-food restaurants cannot stand
still. Many radically expanded their menus, both to target higher-mar-
42 Chapter 1: Introduction
gin threats such as coffee and smoothies, and to add healthier snacks.
And when the recession hit in 2007, fast-food restaurants were able
to provide meals at substantially lower costs than full-service restau-
rants. In the ensuing couple of years, fast-food chains increased sales
while many high-end restaurants closed down.
During the past two decades, the percentage of U.S. food dollars that has gone
to eating out has increased substantially. A greater percentage of people, particu-
larly women, are working more, leaving less time available to prepare food at
home. Overall sales have increased based on three factors:
The opening of new stores.
Higher contributions from older restaurants.
Acquisitions of other chains or selective sites.
-0.15
-0.10
-0.05
0.00
0.05
0.10
0.15
0.20
0.25
R
a
t
o
Net Income / Revenue
McDonald's
Burger King
Yum
Starbucks
Wendys
0
5
10
15
20
25
30
19941995199619971998199920002001200220032004200520062007200820092010
B
i
l
l
i
o
n
$
Annual Revenue
McDonald's
Burger King
Yum
Starbucks
Wendys
43 Chapter 1: Introduction
But over the past several years, fast-food sales gains have lagged those of the
full-service sector, due in part to ferocious competition, ferce price discounting,
and reduced same-store sales and proftability. In January 2003, both McDonalds
and Burger King changed management teams. Both companies have focused on
rebranding efforts to recast their dowdy image and less reliance on price discount-
ing as a means to drive traffc. In 2004, the CEO of McDonalds died of a heart
attack, but it is likely the changes he instituted will continue.
What Do Customers Want?
Most of the fast-food restaurants have tested a variety of options to fnd what
customers want. Originally, McDonalds was successful because it promised the
same level of service and quality regardless of where you traveled. But incomes
increased and health became an important issue. Do customers still want the same
things? How can the big fast-food chains identify what customers want? How can
they respond quickly enough?
New Concepts: Quick Casual.
The frst generation to grow up with fast food has now reached their mature, high-
income years. To meet their needs, quick casual, limited, self-service restau-
rants are geared toward adults. They feature upscale menus, with more health-
ful items such as gourmet soups, salads, and sandwiches. In some quick-casual
units, workers take orders from behind the counter as customers proceed in a line
toward the register. In others, they take orders at a counter where customers pay
for the food, which is then prepared and delivered to the customers table. Checks,
averaging between $6 and $9, are higher than in traditional limited-service units,
but lower than in full-service casual dining restaurants.
The most successful and most visible of the quick-casual chains is Panera
Bread Company. An operator of bakery/cafs, system sales now surpass $800 mil-
lion. The company plans to add another 100 to 150 units annually over the next
several years.
Focus on Health.
The American culture has become signifcantly more health-conscious and liti-
gious over the past decades. This culture has resulted in lawsuits focused on the
responsibility for obesity-related health problems faced by consumers, particular-
ly children. Plaintiffs have sought remedies such as menu changes, nutritional la-
beling, advertising restrictions, and monetary damages. In response to this strong
customer demand, many restaurant chains have begun to make signifcant chang-
es in their menu offerings. Applebees International signed a deal with Weight
Watchers International Inc. in July 2003 to develop a menu for diet-conscious in-
dividuals. In February 2003, Darden Restaurants opened its frst Seasons 52 unit,
a test concept offering low-calorie menu items.
The fast-food industry has introduced even more dramatic changes, perhaps be-
cause it has the most to lose from consumer perceptions of the healthfulness of its
food offerings and from potential lawsuits. In August 2003, Wendys announced
that it would promote four meal combinations from items already on the menu
that would have less than 10 grams of fat. Wendys also added another salad offer-
ing to its menu. Burger King and Jack in the Box have focused on salad, chicken,
and turkey offerings to revamp their menus.
44 Chapter 1: Introduction
McDonalds has developed a wide range of Healthy Lifestyle programs,
including the addition of menu offerings that the company believes will attract
health-conscious consumers. It has also developed new Happy Meals that include
yogurt, milk, vegetables, or fruit, depending on the end market. In 2002, McDon-
alds changed its cooking oils to reduce the amount of trans-fatty acids in its fried
foods. In June 2003, it phased out animal-growth-promoting antibiotics in its meat
supply. McDonalds has also sought to promote nutritional education and aware-
ness among its customers. In May 2003, the company formed its Global Advisory
Council on Healthy Lifestyles, consisting of experts such as doctors, educators,
and athletes in the areas of ftness, nutrition, and active lifestyles. The group is
commissioned to help guide the company toward activities that promote balanced,
healthy lifestyles among its customers. McDonalds has also begun to collaborate
with the World Health Organization and the U.S. Department of Health and Hu-
man Services to educate consumers on the importance of nutrition and ftness.
The company has educated consumers by printing brochures directing them to the
nutritional information on its corporate Web site.
Te Future
The restaurant industry generally depends on the economy. When people work,
they have less time and more money, so they vote for convenience. As long as
costs stay low, the industry should continue to do well. Costs are heavily depen-
dent on labor and food. Companies tend to lock in food costs for up to a year, so
they are less affected by short-term swings in prices. Labor costs depend on the
overall economy. The question of what customers want is diffcult to answer. And
the answer changes over time. Information systems can help identify sales pat-
terns. They can also help control costs and reduce order lags with suppliers. But,
analyzing the data requires a keen eye and experience.
Case: McDonalds
What do customers want? John Gusapari in The Customer Connection suggests
that one goal is to meet customers expectations. You accomplish this by creating
value. Creating quality is not just a matter of reducing defects but of providing
customers with something they value. McDonalds (ticker: MCD) has a clear def-
nition of customer needs and expectations. Its formula is QSC, quality, service,
and cleanliness (Band 1989). Transaction quality, defned from a customers per-
spective, means paying for a product or service in a way that makes the customer
feel good about doing business with a company.
According to Harry Beckwith (Beckwith 2003), customer defnition is essential
to success in marketing. Beckwith viewed McDonalds as an example of a classic,
but simple, excellent service model. However, he feels that they have recently tak-
en their eye off the ball, forgetting their formula for success. Beckwith feels their
mistake is that they have been thinking that fast food is a food business. Beckwith
focuses instead on the fast part of the defnition: It is a time and convenience
business. In Beckwiths opinion, McDonalds has made the menu choices too
complex costing customers too much time. Beckwith does not feel that people go
to McDonalds for the menu.
45 Chapter 1: Introduction
Corporate Summary
McDonalds Corporation serves more than 64 million customers daily from
32,737 fast-food restaurants in over 115 countries. In 2011 there were 14,000 res-
taurants in the United States and 17,614 in other countries. McDonalds maintains
its competitiveness through substantially uniform menus and standard operating
processes. The company has experimented with expansion through partner brands
in additional market segments including Boston Market, Donatos Pizza, and, (in
the UK) Pret A Manger. McDonalds sold its Chipotle Grill in 2006 for $300 mil-
lion. McDonalds operates all of its restaurants under joint venture agreements.
In 2010, McDonalds annual report showed the mix was (although only company
stores are recorded as revenue):
Restaurant Sales ($ billion) Number
Company-operated $16,233 6,399
Franchise + Affliated $61,147 26,338
Total $78,380 32,737
Systemwide sales were $64 billion in 2010, accounting for $24 billion in rev-
enue for McDonalds. The company is targeting sales growth rates of 3-5 percent
a year. U.S. sales increases were largely driven by breakfast items and coffee, and
the introduction of wraps as a menu item. International business contributed 66
percent of revenue in 2010 and 50 percent of operating income, compared to 45
percent in 2003. McDonalds 2006 Annual Report notes the existence of 550,000
restaurants in the U.S. with $365 billion in sales. McDonalds restaurants repre-
sent 2.5 percent of the total and 7.4 percent of the sales. Key factors in the perfor-
mance of the company include
The ability to forecast trends, demographic changes, and food preferences.
The selection of menu items and product mix.
The ability to improve day-to-day restaurant operations and hire workers.
The ability to identify new franchisees.
To focus on the restaurant business, in 2009 McDonalds sold its interest in the
Redbox company for $140 million. In 2008, it sold its interest in the UK Pret A
Manger company for $229 million. However, many McDonalds stores still have
Redbox movie rental kiosks.
Turnaround Under Way
Jim Cantalupo, one of the architects of McDonalds highly successful worldwide
expansion in the 1990s, was lured out of retirement to run the company. He as-
sembled a youthful and energetic management team, led by president and chief
operating offcer Charles Bell, to revamp the companys fortunes. Under this new
leadership, the company embarked on a strategic plan to return to positive sales
growth and income trends. To accomplish this goal, the company shifted its focus
away from expansion and toward the improvement of existing operations. Tragi-
cally, Jim died of a heart attack in April 2003.
McDonalds began to address concerns that its menu had become stale and ir-
relevant to todays consumer. McDonalds made new product introductions, in-
cluding salad offerings, the McGriddle breakfast sandwich, and increased Happy
Meal options. Even though management believes that excessive price discounting
has diminished the companys brand image, the company plans to maintain the
99-cent Value Meal offering. In relation to the brand image, the publics percep-
46 Chapter 1: Introduction
tion of the quality, service, and cleanliness at McDonalds units has suffered over
the last several years. The company has lagged behind its peers in consumer at-
titude toward these areas. To improve overall customer satisfaction, the company
has refocused on its quality, service, cleanliness (QSC) program. This program
gauges performance at each location through customer satisfaction studies and
mystery shoppers, who pose as customers and score each units performance in
various categories. The company has also taken a harder line with franchisers who
do not perform to expectations.
McDonalds must also reinvigorate the companys franchise base. Franchisees
run more than 70 percent of McDonalds 31,000 restaurants worldwide and ac-
count for a similar level of systemwide sales. In recent years, many franchisees
have been demoralized by declining profts caused by company-mandated dis-
counting, a proliferation of stores that has cannibalized individual store sales, and
the overall lack of a coherent national advertising program. Retaining hardwork-
ing, entrepreneurial store owners is paramount to reinvigorating the companys
health.
McDonalds began to reap benefts from its new strategies in early 2003. The
company had seen its proftability deteriorate in the United States during 2001 and
2002 because of operational shortcomings and sales trends that were signifcantly
below the industry average. In the second quarter of 2003, driven by new prod-
uct offerings and improved marketing effectiveness, same-store sales jumped 4.9
percent, year to year. While these sales results are only an important frst step in
reviving McDonalds image, the company must show tangible improvement in its
customer satisfaction scores to maintain momentum. New products may lure cus-
tomers through the doors, but high degrees of customer satisfaction are often the
key to keep them returning.
CEO Jim Skinner is pushing for innovation in new products, but is also focused
on maintaining fscal discipline and tight controls on company expenses (2006
Annual Report). 2006 was a good year for McDonalds with a 7 percent global
increase in sales and improved prices of the stock. However, McDonalds used the
proceeds from the sale of its Chipotle franchise to repurchase sharescontribut-
ing to the increase in stock prices.
Since 2006, McDonalds has averaged four percent increases in sales revenue
at U.S. stores. Despite the recession, McDonalds has growneven faster than
its nearest competitors. The company plans to push its advantageswith plans
to remodel or rebuild almost half of its 14,000 stores. Key elements in the rebuild
include doubling the number of drive-through lanes and redesigning interiors that
encourage people to stay longer (Jannarone 2011).
Enhancing Information Technology through Project Management
To improve the project success rates on information technology projects, McDon-
alds has developed an apprenticeship program for prospective project managers,
combining classroom theory, on-the-job learning, and support from mentors. Mc-
Donalds is accomplishing this program in association with the Computer Tech-
nology Industry Association (CompTIA), six other companies, and a $2.8 million
grant from the Department of Labor. The goal is to develop a National Informa-
tion Technology Apprenticeship System, aimed at building skills and credentials
around specifc business-technology functions.
The grant enables CompTIA to build four career tracks in areas that it feels are
prime for IT apprenticeships: IT generalist, project manager, security, and data-
47 Chapter 1: Introduction
base. The grant also provides funds to implement Web-based processing of ap-
plications and certifcation. Over the next fve years, CompTIA has committed
matching funds of nearly $3.8 million to develop the systems infrastructure, skill
standards and work processes, and marketing strategies to encourage large-scale
private sector adoption.
The Labor Department awarded CompTIA a grant of $550,000 through De-
cember 2002 to assess whether apprenticeships would work in the IT industry and
to develop one apprenticeship track for the IT generalist. Success with that led the
Labor Department to award a $475,000 second-round grant through December
2003 to develop additional apprenticeship tracks, including IT project manage-
ment, and to test them in pilot companies such as McDonalds. The latest round of
funding enables the Labor Department to expand on these original efforts.
Using Technology to Improve Operations
Day-to-day operations are critical to McDonalds restaurants. Hyperion, a soft-
ware company that sells analytical tools, observes that reducing service time by
six seconds increases sales revenue by one percent (Vance 2004). HyperActive
Technologies, a specialty company from Pittsburgh, created HyperActive Bob, a
tool that helps estimate fast-food sales for the next 10 minutes. The tool uses past
sales data and cameras to evaluate traffc entering the restaurant. The computer
display tells the grill cooks how many high-volume items to start cooking. When
the order arrives, it is pulled right off the grill. In one trial, the system noticed
fewer cars entering the drive-through than expected and it told the grill cook to
hold back. The cook, with three years of experience, wanted to ramp up produc-
tion for the lunch hour. The manager convinced him to listen to Bob and wait. It
turns out a ruptured gas line on the road blocked traffc, and the real-time informa-
tion analyzed by Bob was correct. In 2006, McDonalds rolled out a new point of
sale system to 8,400 restaurants. The system created improved order accuracy and
speed of service.
Sometime around 2001, McDonalds Corporation started the Innovate project
that was designed to build an intranet to collect detailed data from every restau-
rant franchise around the globe and transfer data to corporate headquarters. The
system would have integrated 30,000 restaurants in more than 120 countries. Pre-
sumably, it would have given McDonalds detailed records on sales and opera-
tions. According to SEC flings in 2003, the project was cancelled after spending
$170 million on consultants and initial implementation (McDougall 2006).
Dee Crawford runs fve McDonalds restaurants. She notes that Change is a
part of our business, to keep up with customer demands, and there have been a lot
of changes. In 2010, her restaurants had more than 100 items on the menufar
more than in the past. (Jargon 2010). The expanded menu has helped McDon-
alds increase same-store sales for 30 straight quarters since early 2003. Even dur-
ing the worst of the recession in 2008, same-store sales increased by 6.1 percent.
Introducing high-end coffee has increased sales in some stores and struggled in
others, and the machines cost $100,000 per store. The company has learned that
snack wraps and other items often eaten between traditional meals have become
the fastest selling items. Most stores have increased their hours to attract more
non-traditional traffc. With the larger menus, a corporate distribution center auto-
matically handles inventory and restocks stores two or three times a week.
The 2010 annual report notes that the company uses a strategic menu pric-
ing tool that optimizes price, product mix, and promotions. Several newer res-
48 Chapter 1: Introduction
taurants use electronic display boards to digitally display the menu and prices.
Among other things, the tools enable the restaurant to quickly alter prices. The
company also plans to introduce a new point-of-sale system beginning in 2011. In
some locations, particularly Europe, the company is introducing self-order kiosks.
In a few locations, drive-through productivity is improved by having employees
with hand-held terminals take orders by walking down the drive-through lane.
In 2010, McDonalds worked with Nintendo to develop a DS-based game to
help train new workers. Most restaurants have relatively high employee turnover,
so they are constantly training new workers. The system reportedly reduced train-
ing time from 45 to 24 hours and eliminated the need for human trainers for the
initial training (Perkins 2010).
Application of the Internet to Solving Business Problems
One of the ways that McDonalds has used the Internet is to provide information
to customers to deal with the fat content of their meals. While this is in some way
a response to attorneys and consumer groups that have criticized the industry for
fattening America, McDonalds is using Internet technology to better disseminate
information about the nutritional properties of their menu items. In 2003, McDon-
alds revamped its www.mcdonalds.com Web site to better explain the nutritional
values of the chains foods.
Among the most graphically sophisticated nutrition tools on the Internet, Bag
a McMeal enables users to drag up to fve McDonalds menu items from pull-
down lists into a virtual bag. Once completed, the users receive a cumulative nu-
trition profle covering calories, fat, cholesterol, and sodium, among other infor-
mation. A Customize an Item feature enables consumers to obtain a nutrition
profle for a special order, such as a McChicken sandwich without mayonnaise
or a Big Mac without cheese or sauce. Bag a McMeal uses multiple pull-down
lists and drag-and-drop functionality to generate a nutrition profle for a complete
meal of up to fve items. The goal is to provide additional educational resources to
demonstrate the range of options and service sizes available to make it easy to ft
McDonalds into a balanced diet.
According to McDonalds representative Lisa Howard, the Web-surfng public
has found value in the dynamic nutrition databases. There are from 160,000 to
200,000 unique visitors to the nutrition section of McDonalds.com each month,
Howard said. Weve seen it spike [upward] since the new Web tools were put in
place, she added. According to Howard, We continue to look at new and innova-
tive ways to communicate with customers, like in store kiosks (Brewin 2003).
Reaction to the Web-based nutrition information has been critical. If [the
chains] were really serious about doing a better job at giving consumers informa-
tion, diners would have that information at the point of decision in the restaurant,
said Jeff Cronin, director of communications for the Washington, D.C.-based
Center for Science in the Public Interest. Now the [nutrition] brochures are hard
to read and hard to fnd and sometimes altogether absent. Few consumers would
leave their place in the drive-thru or counter line to fnd and read a poster with
nutrition information before ordering, and many fewer are likely to go to a Web
site before making a decision. National Restaurant Association offcials and rep-
resentatives of some other trade groups have countered this argument by asserting
that restaurateurs provide what consumers want, not what restaurateurs think con-
sumers should eat. They believe menu board notices are unnecessary, since many
chains already provide interested consumers with printed brochures or Web site
pages containing nutrition information for regular menu items.
49 Chapter 1: Introduction
Given the debate about practicality and accessibility, information about nutri-
tion can be stored in large, centralized, and easily updated databases that many
consumers can tap through the Internet. Such data can be presented in ways that
enable Web surfers to personalize searches and drill down through multiple lay-
ers of details to get as little or as much insight into a topic as desired. Many res-
taurant companies have ignored such dynamic Internet presentation plans in favor
of merely presenting at their Web sites the same nutrition information tables con-
tained in printed brochures.
McDonalds may be considering ways to leverage its Web site technology in
such a fashion, company spokeswoman Howard said. We continue to look at new
and innovative ways to communicate with customersthat is certainly something
we might look at.
Of course, using the Web also opens up more holes for hackers. In December
2010, McDonalds reported that someone had broken into the companys data-
bases and stole information about customers (Perez 2010). Much of the data was
collected by Arc Worldwide, a company that develops and coordinates promotion-
al e-mail messages for McDonalds. The data was basically personal information
provided by customers and did not include SSN or fnancial data.
McDonalds also runs a Facebook page which it basically uses as a Web site
to provide basic data but also to collect comments from users. The McDonalds
site is also one of the frst to use Facebooks location feature. It enables people to
check in at a location and receive coupons or promotions for the nearest Mc-
Donalds restaurant (Gannes 2010).
Implementing Wireless Technology
Many restaurants view the public-access Wi-Fi hot spot technology as essential
for attracting customers. But what is still unclear is how much businesses can
charge customers to use the Wi-Fi linksor whether they should simply provide
the Internet and e-mail access capabilities for free with the hope that increased
sales of food, drinks, and other products will offset the cost of the technology.
McDonalds launched a Wi-Fi pilot project at 75 restaurants in the San Fran-
cisco Bay area in mid-2003 through a deal with Austin-based Internet access pro-
vider Wayport Inc. Mark Jamison, vice president of business strategy and devel-
opment at McDonalds, said the company would use the San Francisco trial and
similar ones in Chicago and New York to evaluate potential pricing models for the
service and Wi-Fi technologys ability to attract customers. The end result is that
McDonalds plans to equip several hundred restaurants in the United States with
Wi-Fi connections by 2004. McDonalds charges $4.95 for two hours of Wi-Fi
access at the San Francisco locations, but customers who buy a meal can use the
technology for free. By the end of 2006, 15,000 restaurants worldwide had wire-
less access.
But will customers really go to a restaurant because it has wireless access?
Consider the opinion of Matthew Nuss of the Valencia Group, a Houston-based
hotel operator: Wireless, in our opinion, is the next running water. It has become
part of the infrastructure of a hotel (Wright 2003). On the other hand, McDon-
alds is using an outside company (Wayport) to set up and run the Wi-Fi opera-
tions. McDonalds is also benefting from the technology. It is using the same
Internet connection to run its cashless payment and credit card systems. Basically,
it is turning communications with the stores into a revenue-generating operation
(Brewin 2004). David Grooms, VP of IT at McDonalds noted that It gives us a
50 Chapter 1: Introduction
platform to use wireless applications within the restaurant. It turns out that 25
percent of the Wi-Fi traffc is produced by gamers using Nintendo DS systems
(Mitchell 2007).
Seattle-based Starbucks Corp. launched Wi-Fi service in its U.S. cafes in Au-
gust 2002 and offers access in about 2,000 locations. Users have to sign up for the
service with Bellevue, Washington-based T-Mobile USA Inc., whose prices start
at $19.99 per month. Lovina McMurchy, director of Wi-Fi business and alliances
at Starbucks, said the company plans to stick with that approach. But she added
that Wi-Fi hot-spot deployment is a learning experience for businesses and said
its hard to tell how different pricing plans or free services will play out. At this
point, a lot of companies are still just dabbling in Wi-Fi through pilot projects,
McMurchy said.
In 2009, McDonalds in partnership with AT&T opened up the Wi-Fi and of-
fered it for free. The goal was to encourage customers to sit around longer and buy
more productsparticularly higher-proft margin drinks including coffee and fruit
smoothies. CIO David Grooms noted that Were becoming a destination and free
Wi-Fi just naturally fts. This is another long-term investment that we see helps
McDonalds stay relevant as a brand in the marketplace. McDonalds is now a
signifcant Wi-Fi provider in the U.S., delivering one out of six hot spots (Ziobro
2009).
Questions
1. How does McDonalds use technology to learn what customers want?
2. How does information technology reduce management costs?
3. Has the Wi-Fi implementation been successful?
4. Does the franchise model make it more diffcult to implement information
technology solutions? Explain.
5. Is it more important for information technologies to reduce costs or provide
new services?
Additional Reading
Band, William, Quality: I Know IT When I See It. Sales & Marketing
Management in Canada v30n2, (Feb 1989): p.36-38.
Beckwith, Harry, 10 Questions With... Harry Beckwith, Journal of Financial
Planning, Vol 16(10), October 2003, pp. 12-15.
Brewin, Bob, Computerworld, Vol 37(28), July 14, 2003, p. 1.
Brewin, Bob, McDonalds to Supersize Use of Wi-Fi Connections,
Computerworld, April 19, 2004.
Gannes, Liz, McDonalds to Be First Location-based Marketer on Facebook,
Gigaom, May 6, 2010. http://gigaom.com/2010/05/06/mcdonalds-to-be-frst-
location-based-marketer-on-facebook-report/
Jannarone, John, McDonalds Lucrative Shake-Up, The Wall Street Journal,
May 24, 2011.
Jargon, Julie, On McDonalds Menu: Variety, Caution, The Wall Street Journal,
December 27, 2010.
51 Chapter 1: Introduction
McDougall, Paul, 8 Expensive IT Blunders, Information Week, October 16,
2006.
Mitchell, Robert L., Would You Like Wi-Fi with that Burger? Computerworld,
April 13, 2007.
Perkins, Bart, Want a Job? Bring Your Game! Computerworld, November 23,
2010.
Perez, Juan Carlos, Hackers Steal McDonalds Customer Data,
Computerworld, December 11, 2010.
Vance, Jeff, You Will Have French Fries With That, CIO, December 15, 2004.
Wright, Maury, Combo, Please, EDN, Vol 48(16), July 24 2003, pp. 95-6, 98.
Ziobro, Paul, McDonalds to Offer Free Wireless Internet, The Wall Street
Journal, December 15, 2009.
Case: Burger King
Burger King (private) is the second largest fast-food chain in the United States,
with more than 12,000 locations 2010. For the year ending in June 2006, Burg-
er Kings annual report estimates that McDonalds, Burger King, and Wendys
account for 73 percent of the fast-food sales in the United States, with Burger
King accounting for 15. Burger King has encountered diffculties over the last
few years. According to Nations Restaurant News (NRN), the companys market
share among quick-service sandwich chains dropped from 15.03 percent in 2000
to 13.68 percent in 2002. The comparative revenue from the annual reports shows
slight increases for BK sales after 2003, but far below that of McDonalds.
In the fall of 2002, Burger King was sold to a private investment group for ap-
proximately $1.5 billion. Many analysts believed the change in ownership would
improve the chains management focus and vision, increasing its competitiveness
in the marketplace. Brady Blum, formerly a senior executive of Darden Restau-
rants Inc., was hired as CEO to engineer a turnaround. Burger King now seeks
to recast its brand image by focusing on its grilling processes and retooling its
menu, while downplaying its previous emphasis on discounts. The new strategy
has yet to provide the desired results, however. The chain has acknowledged that
negative same-store sales trends continued into the frst six months of 2003. From
2003 to 2006, the chain experienced a drop-off in franchisees renewing their 20-
year agreements. To renew a contract, franchisees have to pay a $50,000 fee and
upgrade their restaurants to current standardstypically paying around $325,000.
Fewer than 50 percent of the franchisees were able to or willing to pay the costs
for a full renewal. BKC also experienced problems collecting royalty payments
from many franchisees and the company initiated a program to assist strong stores
and help close the weaker ones. In 2006, BK went public again with an IPO. In
2010, BK returned to private ownership when it was purchased by 3G Capital
(Web site history). Less than a week after the takeover, Raj Rawal was replaced
as CIO by Heitor Goncalves (Betts and King 2010). Previously, Goncalves had
worked Anheuser-Busch InBev, both as director of Mergers and Acquisitions and
as a vice president of rewards and target setting.
52 Chapter 1: Introduction
Standardized Point-of-Sale Terminals
New point-of-sale (POS) terminals from NCR Corp. have provided more than 130
Burger King restaurants in Canada with a standard method of order taking and
data entry. Burger King Corp. has already installed NCRs Compris food service
software, support services, and RealPOS 7454 terminals in more than 600 com-
pany-owned restaurants in the United States. It is wrapping up deployment in its
259 company locations in Canada, the United Kingdom, and Mexico. The goal
of the deployment is to streamline equipment across corporate-owned restaurants
around the globe, according to Michael Lingswiler, director of technical services
with Burger King. The drive behind this is standardization. The NCR platform
provided the functionality and given where they are in the market are able to pro-
vide for future releases (Hilson 2003).
A standard interface for all restaurants enables changes in the menu or special
promotions to be easily linked with the corporations back-end systems. Training
can be standardized and deployed across all regions of the company. Simplicity,
durability, and environmental friendliness are important in these fast-paced envi-
ronments. Prior to the standardization effort, Burger King had a mixture of NCR
and non-NCR equipment in their restaurants. Typically, these terminals have a life
cycle of about three years. While franchise restaurants are responsible for their
own POS hardware/software selections, they often adopt the corporate-owned
model for ease in purchase and maintenance.
In its 2006 Annual Report, Burger King noted that it had selected three primary
POS systems as preferred providers, but it does not require franchisees to choose
a particular hardware and software package. Data collection from franchisees is
still handled manually. By 2010 (annual report), the new POS systems had been
installed in all company-owned restaurants and 57 percent of the franchises. All
restaurants are required to install the new POS before January 1, 2014. Until that
time, most of the restaurant are still reporting sales manually and BK has only
incomplete data on sales.
Computer Security
Given its worldwide status, Burger King wanted to use automation to help it ef-
fciently assign and manage the identities and network privileges tied to enterprise
and online initiatives. In our opinion it is a necessity, says Burger Kings chief
information offcer, Rafael Sanchez. Such tools are needed because every orga-
nization has legacy systems, and most legacy systems have their own security.
(Liddle October 2003) In 2003, the installation of Oblix NetPoint software for
enterprise Web access and identity management purposes was the latest devel-
opment in a sweeping Burger King information technology project. That under-
taking, for which Burger King involved consultant PricewaterhouseCoopers, is
aimed at improving internal network security and controls over fnancial state-
ments and enhancing the chains performance by better empowering employees
and improving relationships with franchisees, and vendors.
According to Burger King offcials and PricewaterhouseCoopers documents,
the latter two goals can be achieved by making available to feld personnel, fran-
chisees and suppliers certain business support applications and information once
accessible only by select headquarters or regional staff. Such information shar-
ing can take place through an Internet portal that might also beneft Miami-based
Burger King by acquiring additional higher-quality operations information from
franchisees, a PricewaterhouseCoopers case study of the project suggested.
53 Chapter 1: Introduction
Oblix NetPoint supports single sign-on for network users, or the consolida-
tion of user-ID and password information for multiple Web-based applications
or applications with Web front ends. It works with the Active Directory feature
of Microsofts Windows Server to streamline and automate several of the steps
needed to make changes to user identity information and access privileges. The
NetPoint software supports self-registration by users and the delegation of some
administrative duties to certain classes of end users, such as department heads. It
also ties access and privileges administration into a user organizations workfow
routine. That makes possible scenarios such as one in which network access is
immediately revoked for any employee subject to a termination notice from the
companys human resources department.
Under the former security plan at Burger King, different legacy applications
required or permitted administrators to create log-in IDs of passwords different
from those used for other programs. That, CIO Sanchez says, made it possible for
individual users to wind up with multiple log-on IDs or passwords or both. In the
Burger King information technology realm a person may have access to from
fve to 15 different applications, Sanchez explains. Those programs, he adds, in-
clude such things as basic network access and applications tied to sales, fnance,
and franchise-related matters.
Sanchez says he or someone else in his department had to change log-on IDs
and password information and access privileges for a variety of applications
whenever an employee joined the company, left the company, was given addi-
tional responsibilities, or was stripped of duties. Because disgruntled terminated
employees are a potential threat to company resources accessible via a network,
Sanchez says of the old security plan, I had to pray that whoever provided access
[to the employee in question] let me know about the termination. Creating an
identity management infrastructure allows you to manage the [network] environ-
ment a lot more effciently, Sanchez says. Everyone has one user ID and pass-
word for everything they use.
According to Sanchez, under the new system the primary user of a particular
application, such as a department head, assigns access and privileges to people
within his or her sphere of infuence. Such assignments, however, must be in
keeping with the protocols and security parameters established by the confgura-
tion of NetPoint and the underlying identity management infrastructure, he indi-
cates. Dealing with outside communitiesthat is where we will use the power of
Oblix [NetPoint] for self-administration, Sanchez remarks, referring to resources
he expects to save by delegating administration of identity and privileges to sup-
pliers and franchise groups with extranet access. The concept, he says, is that he
might say to a supplier, Ill give you access for up to 20 people, but the internal
assignment within your company is your responsibility.
Human resources can clue us [to personnel changes] in house, but when your
partners are outside, it becomes even more diffcult to determine who should
have access or who should have access terminated, Sanchez observes. Burger
Kings goal, Sanchez reports, is to reduce the time spent administering network
security, while increasing the companys ability to implement new security strate-
gies. To help achieve that goal, the Miami-based chain used PricewaterhouseC-
oopers to help build a modern directory and identity management infrastructure.
Among other things, Burger King will use its new identity management ca-
pabilities to help support portal access to the companys SAP R/3 suite of appli-
cations. Offering a wide range of end users access to business support software
54 Chapter 1: Introduction
through a portal with solid identity management underpinnings allows us to ex-
tend the applications to the outer edge of the Burger King universe, Sanchez
says. Technologies like identity management that drive costs down and increase
employee, franchisee and [business] partner satisfaction give companies in the
restaurant industry a competitive edge, Sanchez states. Because the use of Net-
Point will reduce to one the number of log-on IDs and passwords used by Burger
King employees, it should be easier for those workers to remember that informa-
tion. And that, Sanchez says, should help reduce costs, or at least the workload,
associated with the chains information technology help desk.
Te Internet
Burger King sometimes runs off-beat advertising campaigns. In 2009, they cre-
ated a new campaign that involved Facebook. The company offered people free
hamburgers if they deleted 10 online friends, calling it the Whopper Sacrifce.
Facebook took offense at the campaignpartly because the BK site sent messag-
es to the people being deleted telling them they were sacrifced for a free burger
(Gaudin 2009). About 60,000 people had taken advantage of the free burgers in the
frst week, but BK decided to stop the campaign after discussions with Facebook.
Questions
1. Why is security so important to Burger King?
2. Why is technology standardization so critical?
3. Do all franchises need to worry as much about security, or just the fast-food
industry?
Additional Reading
Betts, Mitch and Julia King, CIO Watch, Computerworld, November 3, 2010.
Gaudin, Sharon, Facebookhas Whopper of a Problem with Burger King
Campaign, Computerworld, January 15, 2009.
Hilson, Gary, Hardware Fit For A King: Restaurant Chain Upgrades POS
Terminals Across Canadian Locations In Quest For Standardization,
Computing Canada, Vol 29 (3), February 14, 2003, p. 19.
Liddle, Alan J., Operators Chew On Ways To Offer In-Store Internet Access,
Nations Restaurant News, Vol. 37(32), August 11, 2003, pp. 1,69.
Case: Wendys
Driven by expansion and new product offerings, U.S. annual sales gains at Wen-
dys (ticker: WEN) Old Fashioned Hamburgers outpaced those of McDonalds
from 1998 through the end of 2002. According to Nations Restaurant News, Wen-
dys market share in the quick-service sandwich sector rose to 11.4 percent in
2002, from 10.3 percent in 2000. While the companys expansion enabled it to
continue capturing market share in 2003, same-store sales at its restaurants were
down, year to year, through July. This decline was due to a change in comparisons
from 2002 and competitive pressures, particularly from a recovering McDonalds.
Systemwide sales for 2006 totaled $7.8 billion. Same-store sales increased by less
than one percent, but proft margins at company-operated restaurants increased
slightly.
55 Chapter 1: Introduction
The company has sustained its image as selling high-quality products in the
quick-service sector and continues to enhance its reputation for offering a diverse
selection of sandwiches. The company has also maintained industry-leading cus-
tomer satisfaction scores. Future plans include an increase in national advertis-
ing spending targeting the growing number of Hispanics and late-night customers.
Though the company has stalled for the near term, its strong brand image has
prepared it for the longer term. In 2006, the company spun off the Tim Hortons
and Baja Fresh subsidiaries, and approved the sale of its Caf Express stores. Ap-
parently copying McDonalds, the company used the funds to repurchase more
than $1 billion in shares, hoping to prop up the stock price. According to Wendys
annual report, the company intends to expand its breakfast offerings to more store
in an attempt to grow revenues in this newer segment. The company recognizes
that it needs to work to rebuild its image. It also needs to reduce expenses, partly
through selling some of the company-owned stores. In 2007, Wendys executives
foated the news that it was willing to be purchasedpossibly by a private equity
frm.
In 2011, Wendys sold off the Arbys chain for $130 million to a private equity
frm. The Arbys chain had suffered during the 2008 recessionlargely because
its sandwiches are more expensive than those at other chains. Wendys will ini-
tially retain an 18.5 percent share of the new company.
Customer Cards
Under the direction of Scott McClenahan, Wendys in Redwood City, Utah, is
collaborating with Visa USA in a payment card acceptance pilot test. Wendys is
using a Verifone Omni 3200 customer-activated, credit-card-payment terminal on
the front counter and a Verifone Everest terminal at the menu board in the drive-
through. In confguring the Everest for the drive-through, Verifone developed a
weatherized case for the terminal and attached a MagTek dual-head dip card
reader to minimize instances of incorrect insertion that could slow transactions.
The drive-through Everest terminal served as a remote link to the countertop
Omni model. The two units were connected by a cable that ran underground from
the restaurant to the outdoor terminal at vehicle-window height near a red LED
order-confrmation board.
To keep transaction times as low as possible, most quick-service chains have
limited their initial tests of card acceptance to credit cards and check cards that
can be processed without requiring card users to sign receipts or enter personal
identifcation numbers. As a result, drive-through point-of-order payment termi-
nals often came without numeric keypads. The latest card-acceptance platforms
combine a payment terminal supporting PIN-based debit transactions with LCD
order-confrmation systems. A 2.4-gigahertz, wireless transmitter with encryption
capabilities from AeroComm is now being used to transfer payment terminal data
to the POS system.
Drive Trough
Drive-through orders add up to 75 percent of a fast-food restaurants sales. But
most restaurants have only one order-taking station and that slows down the pro-
cess. You have undoubtedly sat in the lines waiting for the person in front of you
to stumble through an order. Miami Management, Inc., a company that owns 16
Wendys franchises places two order stations in the drive-through lane. All of
them are connected to an order center in Lexington, KY through voice-over-Inter-
56 Chapter 1: Introduction
net technology. The orders are entered into the point of sale system and displayed
at the appropriate restaurant. Brian Fields, director of operations noted the system
increased peak lunch hour performance from 117 to 137 cars per hour (Mitchell
2006). But all was not perfect. In at least one restaurant, the manager reported that
the call center employees sometimes got orders wrong or failed to greet custom-
ers (Mitchell 2007). Part of the problem was that restaurants chose to use lower-
priced DSL phone lines instead of dedicated T1 connections. And in many loca-
tions, the communication quality was inconsistent or poor.
Questions
1. Why has Wendys been more successful at identifying customer desires than
Burger King?
2. How do most customers pay for fast food? How much are they willing to pay
in service charges to use ATMs in the restaurant?
Additional Reading
Jargon, Julie and Annie Gasparro, Wendys Parts with Arbys, The Wall Street
Journal, June 14, 2011.
Mitchell, Robert L., Would You Like Wi-Fi with that Burger? Computerworld,
April 13, 2007.
Mitchell, Robert L., Derailed by Defcient DSL, Computerworld, November
26, 2007.
Case: Yum! Brands
After several years of closing unproftable stores and selling company-owned
units to franchisees, Yum! Brands Inc. (ticker: YUM) has shown renewed vigor.
The owner of the KFC, Pizza Hut, and Taco Bell brands acquired the Long John
Silvers and A&W restaurant brands in 2002 as part of its multibranding restaurant
strategy. The company is aggressively expanding internationally as well, particu-
larly in China, Mexico, Korea, and the United Kingdom. The companys diversi-
fed portfolio has enabled Yum! Brands to successfully grow its business despite
diffculties that may occur at any one of its restaurant brands. Through late August
2003, strength at Taco Bell had helped to offset diffculties at KFC, while over-
all proftability was aided by a weaker dollar. Today, Yum! Brands, with 33,000
restaurants in fve major chains and 2006 revenue of $9.6 billion with worldwide
total system sales of $31.1 billion, is the worlds largest restaurant operator in
terms of units (34,595 in 2006). Yum has focused heavily on international growth,
including KFC in China. The potential sales to over 1 billion customers is appeal-
ing to any company, but KFC has had to weather challenges with supplypartic-
ularly with SARS, the avian virus. According to the companys 2006 Annual Re-
port, Pizza Hut is already the leader in casual dining in the UK and KFC and Pizza
Hut are the number 1 quick-service brands in mainland China. In 2011, Yum! an-
nounced that it was selling the A&W and Long John Silvers chains. The company
also announced plans to expand in China by acquiring the Little Sheep chain. Yum
already owned 20 percent of the company, and profts from China were driving
proftability for the entire company in 2010 (annual report).
57 Chapter 1: Introduction
The restaurants are trying to lift traffc and sales around the world by adding
ambience, quality, and service to a business that largely ignores such niceties.
Emphasis is placed upon training at the counter and upgrading the restaurants in
terms of equipment and food. The average checks in the restaurants are $3 to $4 at
Taco Bell and $5 to $7 at KFC.
While the burger chains duke it out on price, KFC, Pizza Hut, and Taco Bell are
adding and emphasizing better food, which, in the case of KFCs roasted chicken,
at least, also means lighter fare. Yum restaurants are pushing higher-priced items
to bolster dine-in business. Among them: Pizza Huts Chicago Dish pizza ($13)
and Taco Bells popular Southwest Steak Border Bowl ($3.50).
The CEO, David Novak, began an overhaul in 2000 in response to customer
feedback. Customers bluntly told the chains their service was shoddy, their food
subpar, and their restaurants, in some cases, shabby (Wells 2003). Novak, aged
50, still fumes when he recalls answering a call on Taco Bells toll-free complaint
line in early 2001. A woman named Michelle complained bitterly about getting
the wrong $3.60 order and a lot of attitude. I can assure you Michelle would
be justifed to tell everyone she sees about how poorly she was treated, Novak
exploded in an e-mail to restaurant managers after the call. This is the kind of
word-of-mouth that kills us.
David Novak hopes that acting on this feedback will make the company stron-
ger. Employees at all the chains around the world now attend training four times
a year at which customer-service initiatives are hammered home. They also get
evaluated, in part, on how they treat customers and react to problems when they
arise. Novak is pushing to slice service times, particularly at Taco Bell and KFC.
At Taco Bell a timer installed at drive-through windows beeps after 60 seconds.
This is the time in which an employee is supposed to spend taking and flling an
order. Novak blames some of the lingering problems at the restaurants on for-
mer owner PepsiCo. He feels Pepsi emphasized marketing at the expense of qual-
ity food, service, and atmosphere. It wasnt our schtick, PepsiCo President and
Chief Financial Offcer Indra Nooyi answers. The restaurant business wasnt our
schtick.
David Novak is orchestrating this dramatic shift to civilize the fast-food experi-
ence. At Taco Bell, where food is delivered to its 6,444 U.S. restaurants premade,
new $1,450 grills are being installed to cook new menu entries on-site. Restau-
rants in the Mexican-themed chain are also paying $16 million more a year for
better-quality beef, tortillas, and beans. The company is developing higher-end
ideas, such as Yan Can, the name of four new Asian-themed restaurants in Cali-
fornia created with Arthur Ho, a Hong Kong-based franchisee of KFC, and chef
Martin Yan of PBS Yan Can Cook fame. Average sales at these restaurants exceed
$35,000 a week, compared with just under $20,000 a week at a typical Taco Bell.
Yum! Brands is also combining Pizza Hut with a fast-casual chain called Pasta
Bravo in test markets.
Some Taco Bell franchisees argued against paying more for the new ingredi-
ents. I didnt think our customer base was that discerning, says Ned Kirby, a
franchisee in Noblesville, Indiana But they noticed the better food and didnt
resist the higher prices (Wells 2003). Not every trial restaurant is successful. Bell
Grille was an experimental restaurant the company opened in Garden Grove, Cali-
fornia to test higher-end menu items, such as smoothies. According to Emil Bro-
lick, president of Taco Bell, it was short-lived, because the food did not ft in with
the restaurant, which looked like a regular Taco Bell.
58 Chapter 1: Introduction
Novak is also pushing to pair the different Yum! Brands restaurants in multi-
branded units, which offer unit sales that are 20 percent higher than that of stand-
alone restaurants. With just 1,870 twofers open, the goal is to have 6,000 by 2007.
Novak has focused on new designs for the multibranded units, emphasizing what
traditionally makes fast-casual chains popular. The new designs include inviting
lighting with sleek sconces that are conducive to reading or hanging out. Whimsi-
cal murals fuse the personalities of two restaurants when they are combined into
one unit. Fast-casual chains make a statement. They spend little on advertising
but a lot on the dining experience. If we apply this kind of thinking to our cat-
egory we think it will give us some edge (Wells 2003).
Given the weakness in the market sector and the focus on fast-food compa-
nies vulnerability to new lawsuits, Yums stock has recently fallen. Since 1997,
revenue has sagged from a high of $9.7 billion. Since that time, operating income
has more than tripled to $891 million in 2001. Debt has been slashed from $4.6
to $2.1 billion. Emphasis continues to be placed on refurbishing the restaurants
themselves in a concentrated program.
Yum has experienced problems with its supply chain, from SARS in China to
E. coli in lettuce in New England in December 2006, costing the company at least
$20 million in proft (Annual Report). Sales growth in the U.S. was fat in 2006,
but 4 percent worldwide. Almost all of the growth was through new stores. Pizza
Hut has to compete against all of the fast food chains, the national pizza chains,
and the local pizzeria. Dominos CEO David Brandon said that our industry has
seen a shift where all of the national brands have lost market share and seen sig-
nifcant reductions in traffc growth at the expense of regional and local pizza
shops (Gibson 2007). Papa Johns CEO also notes the lack of product innova-
tion. On the other hand, Papa Johns is promoting online ordering in an attempt to
build brand loyalty.
In 2005, Alinean, a research company, awarded Yum! Brands the number 3 spot
in the retail industry in terms of return on IT investment. Dividing economic value
added by its IT spending gave it a value of 201 percent, not to far below the 290
percent of the number 1 company (Next Group PLC) (Betts 2005).
One of the challenges of Yum! Brands is that the company actually consists of
multiple concept restaurants. Finding common ground and getting 1.6 million
global employees to work together is a challenge. In 2011, Dickie Oliver, head of
global IT at Yum! Brands emphasized a four-point strategy for coordinating work-
ers. He created the iChing social network to enable employees to post documents,
ask questions, and collaborate. Similarly, an enterprise search system from Coveo
enables workers to search for answers and data. An online learning system from
Saba makes it easier to distribute training. And a high-defnition videoconferenc-
ing system from Tandberg lets employees hold virtual meetings to reduce travel
time and costs.
Questions
1. How does Yum! Brands use information technology to improve effciency?
2. With the mix of restaurants, how could Yum! Brands use IT to determine the
best store combinations and selection of items to sell?
59 Chapter 1: Introduction
Additional Reading
Betts, Mitch, Top Retailers for IT ROI, Computerworld, November 22, 2005.
Betts, Mitch, How One IT Chief is Building a Know-How Network, April 18,
2011.
Gibson, Richard, Pizza Chains Cook Up Ways To Battle Old, New Rivals, The
Wall Street Journal, May 30, 2007.
Wells, Melanie, Happier Meals, Forbes, Vol. 171(2), January 20, 2003, pp. 76-
78.
Case: Starbucks
Since 1985, Starbucks (ticker: SBUX) is committed to offering the highest qual-
ity coffee and the Starbucks Experience while conducting its business in ways
that produce social, environmental, and economic benefts for the communities
in which it does business. In addition to its retail operations, the company pro-
duces and sells bottled Frappuccino coffee drinks, Starbucks DoubleShot coffee
drink, and a line of super-premium ice creams through its joint venture partner-
ships. The companys brand portfolio provides a wide variety of consumer prod-
ucts. Tazo Teas line of innovative premium teas and Hear Musics exceptional
compact discs enhance the Starbucks Experience through best-of-class products.
The Seattles Best Coffee and Torrefazione Italia Coffee brands enable Starbucks
to appeal to a broader consumer base by offering an alternative variety of coffee
favors. Some of these products are now sold directly to consumers as Starbucks
VIA Ready Brew and through national food distributors SYSCO Corporation and
US Foodservice.
An interesting feature of Starbucks is that it does not franchise its stores. Star-
bucks has grown to 8,833 corporate stores plus 8,025 licensed retail stores inter-
nationally in 2010 from only 125 stores in September 1991. Starbucks purchases
green coffee beans for more than 50 blends and varieties from coffee-producing
regions worldwide. All green coffee beans purchased are of the Arabica species,
which is of higher quality than the Robusta species typically found in supermarket
coffees. Starbucks custom roasts the coffee beans to exacting standards. To add
sales margins, the company stores offer a wide selection of coffee-making equip-
ment, accessories, pastries, and confections.
In fscal year 2010, retail stores accounted for 84 percent of net sales. Stores are
typically clustered in high-traffc, high-visibility locations in each market. This in-
cludes offce buildings, downtown and suburban retail centers, and kiosks placed
in building lobbies, airport terminals, and supermarkets. In fscal year 2002 the
retail store sales mix by product type was 77 percent beverages, 13 percent food
items, 6 percent whole bean coffees, and 4 percent coffee-related hardware items.
Starbucks has expanded its retail business by increasing its share in existing
markets, and opening stores in new markets in which it sees an opportunity to be-
come the leading specialty coffee retailer. The company opened a net total of 810
company-owned stores in fscal year 2006 and planned to open a similar number
in fscal year 2007. But in the U.S. it closed 474 stores in 2009 and 57 in 2010.
Starbucks has tried to use its Specialty Operations, which accounted for 16 per-
cent of total revenues in fscal year 2003, to develop the Starbucks brand outside
the company-owned retail store environment. Starbucks has licensing agreements
60 Chapter 1: Introduction
(35 percent of specialty revenues) with prominent retailers in North America,
Central America, Europe and Asia. The company has about 5,600 food service
accounts (27 percent), where it sells whole bean and ground coffee to various cof-
fee distributors, hotels, airlines, and restaurants. Starbucks has a licensing agree-
ment (13 percent) with Kraft, Inc., which markets and distributes the companys
whole bean and ground coffees in the U.S. grocery channel. In addition, the com-
pany sells its coffee products through warehouse club accounts (13 percent), and
through mail order and online (7 percent) (Standard and Poors, Starbucks annual
report). The companys long-term plans are to run 20,000 stores in the U.S. and
another 20,000 worldwide, with an emphasis on China. Although the Annual Re-
port observes the increasing diffculties in managing that many stores, comparable
store sales grew by 7 percent in 2006; but hints are that the growth rate has slowed
in 2007. The company also spent $1 billion buying back its stock to prop up the
price (Blumenthal 2007). From 2007 through 2009, Starbucks was hit hard by the
recession where sales growth slowed and fell in 2008 and 2009 (annual report
2010). Howard Schulz returned to the CEO position in 2008 to help organize the
response to competition and the recession.
In the fourth quarter 2003, Starbucks acquired Seattle Coffee Company, which
includes Seattles Best Coffee and Torrefazione Italia coffee brands, for $72 mil-
lion. Negotiating and controlling the supply of its products is a key factor in the
Starbucks operation. The company also spent $6.5 million in 2006 on research to
create and improve products as well as operations (Annual Report).
When the top management was replaced in 2008, Starbucks also named Chris
Bruzzo to be acting CIO and asked him to create innovative ways for Starbucks
to connect with our customers and build loyalty programs (Wailgum 2008). At
the time, the company had grown too rapidlyunfortunately just as the economy
was entering the recession. The frm was focused on growth through adding new
stores, so the technology focused on evaluating real estate, location, and demo-
graphics. Instead, the company needed to fnd a way to encourage each customer
to spend more money.
In 2009, Stephen Gillett was given the job of CIO at Starbucks. He has an IT
staff of 1,000 people. The size of the staff is almost a problemit is diffcult
to fnd and hire good workers. And he still faces one key area: business intelli-
gencefnding people and tools that can analyze the customer data (Mann 2009).
Stored Value Card
Brian Cyrnes, senior vice president and chief information offcer, is proud of the
coffeehouse chains stored-value, customer loyalty-enhancing Starbucks Card and
Duetto. The new Duetto offering is a combination Starbucks Card and Visa credit
card. This was accomplished by keeping an eye toward offering the best service
and value, while targeting competitive advantages, speed-to-market issues, and
enterprisewide integration. The launch follows the success of the reloadable Star-
bucks Card, of which more than 11 million have been activated since the card
began in November 2001. A Starbucks Visa credit card, incorporating the stored-
value feature, was launched in association with Bank One in March 2003.
The Starbucks Card program was run by an outside vendor, ValueLink, a First
Data Corporation. First Data is an electronic payment service specialist. Custom-
ers buy the cards in dollar amounts to be redeemed like cash at the checkout line.
ValueLink processes the transactions and manages an offsite database for the sys-
61 Chapter 1: Introduction
tem. The program is already a big loyalty winner. Starbucks redeemed 11 mil-
lion cards worth $41 million in the recent second quarter. Starbucks outsourced
the processing because it felt it lacked the knowledge to develop a complex cus-
tomer service program on its own.
Wi-Fi technology
Based on its experience at thousands of Starbucks Coffee outlets, Starbucks is
convinced that providing Internet access to guests will build customer loyalty and
sales. As a result, Starbucks is forging ahead with deployment of wireless local
area networks, as other food service chains accelerate rollouts or expand tests of
the technology. Starbucks Corp. launched Wi-Fi service in its U.S. cafes in August
2003 and now offers access in over 2,000 locations. Users have to sign up for the
service with Bellevue, Washington-based T-Mobile USA Inc., a unit of Deutsche
Telkom, whose prices start at $19.99 per month. The T-Mobile HotSpot service
is backed by reliable high-speed T-1 connections that can accommodate the full
spectrum of applications from checking e-mail to viewing rich multimedia and
video. T-Mobile HotSpot window signs are visible near the entrance of all partici-
pating Starbucks locations. A complete list of stores can be found by visiting the
Starbucks store locator on www.starbucks.com/hotspot and selecting Wireless
HotSpot Stores as the Store Type.
Today the chain has fee-based hot spots managed by strategic partner T-Mobile
International at about 2,600 of its 3,854 company-operated coffee bars. The goal
is to install hot spots in about 70 percent of the retail sites operated by the compa-
ny. Size, seating capacity, and the demographics of a market all determine which
stores will incorporate the technology. Starbucks looked at a number of alterna-
tives in terms of how to provide in-store Internet access, but decided wireless was
the way to go to provide access without disrupting the other customers. The chain
did not want to become known as an Internet caf littered with cabling and
other hardwired network paraphernalia.
The wireless service is already paying dividends at Starbucks. The company
charges customers about $6 an hour for the T-Mobile service. The typical wireless
user stays for 45 minutes. Of the nonwireless users, 70 percent spend 5 minutes or
less at the store; the remaining 30 percent linger for about 20 minutes. We cer-
tainly believe that means they buy more coffee and food. The real exciting thing
for us about the hot-spot service is that it is bringing people into our stores at dif-
ferent times of the day, and hot-spot users are staying longer, Nick Davis, Star-
bucks spokesman, remarked. (Liddle August 2003). Typically, a Starbucks unit is
busiest from 6 a.m. to 9 a.m., so building traffc later is a positive development.
About 90 percent of hot spot users arrive after 9 a.m., and that group, on average,
spends about 45 minutes online and in the stores.
In the attempt to leverage its wireless network installations further, Starbucks
in 2004 began testing possible synergies between its hot spot strategy and the dis-
tribution of product by its music industry holding, Hear Music. To spur additional
hot spot registrations and publicize Hear Musics Artists Choice compact disc
of Sheryl Crows favorite songs by other recording stars, Starbucks hot spot us-
ers were given Web access to audio clips of the songs and Crow interviews on the
CD. They were permitted to download three complete songs from the compilation
product.
By 2010, partly pressured by McDonalds, Starbucks opened the Wi-Fi to free
and unlimited access. Other coffee shops fnd Wi-Fi to me more challenging.
62 Chapter 1: Introduction
Freeloaders might buy a cheap cup of coffee and then take up space for hours
making it hard for paying customers to fnd a place to sit (Elgan 2010). Starbucks
will also offer free access to major newspapers such as The Wall Street Journal
and New York Times.
Starbucks and the Sundance Film Festival
In addition to being the offcial coffee at the 2004 Sundance Film Festival, Star-
bucks worked closely with the Sundance Institute to sponsor the 2004 festival, as
well as bring the excitement of the Sundance Film Festival experience directly
to customers in its stores. Throughout the month of January, customers who vis-
ited their favorite participating Starbucks location with a Wi-Fi (802.11b)-enabled
notebook computer or Tablet PC experienced the passion and inspiration of the
2004 Sundance Film Festival frsthand. By simply launching the Internet browser
on their device, customers watched exclusive flmmaker interviews, behind-the-
scenes video clips, and flm trailers for free prior to logging on to the T-Mobile
HotSpot wireless broadband Internet service.
Customers who logged on to the T-Mobile HotSpot service received a free day
pass to the Sundance Online Film Festivalthe online extension of the 2004 Sun-
dance Film Festival. The free day pass enabled Starbucks customers to access the
Sundance Online Film Festival, where they could cast a vote for their favorite ani-
mation and short subject flms while in the comfort of any participating Starbucks
location. Independent flm afcionados and consumers did not have to be in Park
City to experience the festivalthey only needed to fnd the nearest T-Mobile
HotSpot-enabled Starbucks to access the exclusive content.
Starbucks sponsorship of the flm festival enabled them to add value to the
T-Mobile HotSpot service in their stores by giving their customers the ability to
interact directly with digital entertainment. Since Starbucks has sponsored flm
festivals large and small, this next step enabled the company to share their enthu-
siasm for independent flm directly with their customers. Starbucks expanded its
involvement in the entertainment industryeven creating a separate subsidiary.
In 2006, it promoted a movie to its customers, but the effect was minimal. In
2007, Starbucks continued its sales of music CDs with a special solo album from
Paul McCartney. Starbucks also backed another movie in 2007 (Adamy 2007).
Analysts are mixed over whether the entertainment options attract customers and
encourage sales, or if they just distract management from selling coffee.
Phones
Like many other companies, Starbucks sells customers a prepaid card that can be
used for future purchases. In 2011, Starbucks released an app that lets custom-
ers store their prepaid card data on their smart phone. Cashiers simply scan the
bar code from the phone and deduct the amount from the balance (Segall 2011).
Because the Starbucks card is linked to a credit card, the payment card can be re-
loaded. The smartphone app includes the ability to easily add more money to the
card (Hamblen 2011).
In a different twist, Starbucks in 2010 became one of the frst companies to pay
Twitter to deliver Promoted Tweets, or advertising over Twitter. The marketers
will be charged per thousand impressions of their ads that are displayed on their
Web site alongside search results. Starbucks already publishes Twitter notes about
its promotions, but the ads will always show up near the top of the page, making
them more visible (Miller 2010).
63 Chapter 1: Introduction
Questions
1. Has Wi-Fi access improved sales and profts at Starbucks?
2. Given the huge number of stores, how could Starbucks use information
technology to determine where to open new stores and which ones to close?
Additional Reading
Adamy, Janet, Starbucks Sticks with Film-Promotion Plan, The Wall Street
Journal, June 28, 2007.
Blumenthal, Karen, One Stock, One Year: What I Learned, The Wall Street
Journal, July 1, 2007.
Elgan, Mike, Why Starbucks Will Win the Wi-Fi Wars, Computerworld,
August 14, 2010.
Hamblen, Matt, Starbucks Extends Mobile Payments to 7,500 Stores,
Computerworld, January 19, 2011.
Liddle, Alan J., BK Seeks Simplifcation of Complex Network, Online Identity
Management Process, Nations Restaurant News, Vol. 37(40), October 6,
2003, p. 36.
Mann, John, Starbucks CIO Tells How He Picks New Hires, Computerworld,
January 14, 2009.
Miller, Claire Cain, Twitter Unveils Plans to Draw Money from Ads, The New
York Times, April 12, 2010.
Segall, Laurie, Your Mobile Phone is Becoming Your Wallet, CNN Online,
January 19, 2011.
Wailgum, Thomas, How IT Systems Can Help Starbucks Fix Itself, CIO,
January 25, 2008.
Summary Industry Questions
1. What information technologies have helped this industry?
2. Did the technologies provide a competitive advantage or were they quickly
adopted by rivals?
3. Which technologies could this industry use that were developed in other
sectors?
4. Is the level of competition increasing or decreasing in this industry? Is it
dominated by a few frms, or are they fairly balanced?
5. What problems have been created from the use of information technology
and how did the frms solve the problems?
1
Part
Information Technology
Infrastructure
How is information technology changing and how do you evalu-
ate and choose technologies for business? How do you share in-
formation and collaborate? How do you store and retrieve data?
These are fundamental questions that any manager needs to be
able to answer. Information technology forms the foundations of
management information systems. As a manager, you need to un-
derstand what technologies are available today, and how they are
likely to change tomorrow. Although you do not have to be able
to build your own computer, you need to understand the trends
and limitations of computing equipment.
Networks are critical in most organizations today. The Internet
continues to expand into professional and personal lives. Manag-
ers should understand how wired and wireless technologies can
be used to share data and communicate. Particularly in terms of
the Internet, you need to be able to evaluate emerging technolo-
gies and evaluate costs.
Database management systems are probably the most im-
portant tools in business today. Managers can no longer rely on
programmers to answer business questions. Instead, you need
to know how to retrieve data and build reports from central
databases.
Chapter 2: Information Technology Foundations
Chapter 3: Networks and Telecommunications
Chapter 4: Database Management
What are the main features and tools of information systems?
65
What You Will Learn in This Chapter
What types of computers are needed for business applications?
What are the basic objects that computers process?
How do computers handle music and video?
What are the main components of a computer?
Why is the operating system so important?
How does the Internet change the role of computers?
What are the main software applications used in business?
Is it possible to handle all computing tasks with online services?
Chapter Outline
Information Technology
Foundations
2
Chapter
Introduction, 66
Types of Data, 69
Object Orientation, 70
Numbers and Text, 72
Pictures, 74
Color, 78
Style Sheets, 79
Sound, 81
Video, 82
Size Complications, 82
Data Compression, 83
Hardware Components, 84
Processors, 86
Input, 92
Output, 95
Secondary Storage, 95
Operating Systems, 97
Computers in e-Business, 99
What Is a Browser?, 100
What Is a Server?, 102
Virtual Machines, 104
Application Software, 104
Research: Databases, 105
Analysis: Calculations, 105
Communication: Writing, 107
Communication: Presentation and
Graphics, 107
Communication: Voice and Mail, 108
Organizing Resources: Calendars and
Schedules, 108
Augmented Reality, 109
The Paperless Offce?, 110
Open Software, 110
Cloud Computing, 111
Summary, 113
Key Words, 114
Web Site References, 115
Review Questions, 115
Exercises, 116
Additional Reading, 120
Cases: The Computer Industry, 121
66 Chapter 2: Information Technology Foundations
Dell
Introduction
What types of computers are needed for business applications?
Figure 2.1 shows the challenge of the choices. A wide range is available from
portable devices like cell phones and tablets to large-screen desktops to enterprise
servers and super computers. The interesting aspect is that at each level, the per-
formance and capabilities have continued to improve. So todays desktops have
the power of super computers from a few years ago. You are probably familiar
Should you buy new computers? How is information technology changing and how
do you evaluate and choose technologies for business? These are diffcult questions
to answer for any business. Buying one new computer is not the problemreplacing
hundreds or thousands of computers is expensive. One of the keys to changing tech-
nology is that buying a computer is not a one-time event. Organizations need to plan
on buying new machines on a regular basis. Of course, you also have to think about
how to dispose of the old computers.
The computer industry is driven by change and growth. An interesting feature of
computers is that they have a short shelf life. A computer that sits unsold for a few
weeks quickly becomes obsolete as more powerful or cheaper machines are intro-
duced. From a manufacturers perspective, this pattern of change is diffcult to han-
dle. It is even harder when you realize that people often want to try out a computer
frst. At one time, Dell tried to sell computers through retail stores, but had to give
up. Dells solution has become a driving force in the industry. Dell tightly manages
the supply chain and builds each machine to order. Components such as disk drives,
processors, and cases are purchased in bulkoften with long-term contracts. The
majority of the components are delivered in small just-in-time batches to manufac-
turing facilities. The individualized machines are built and formatted for each spe-
cifc customer. Dell holds costs down by minimizing inventory and producing the
exact products ordered by customers. Dell risks losing sales to retail stores, but the
company knows it will make a proft on every machine.
Which options should you choose on a computer? Do you need the fastest proces-
sor, a huge amount of RAM, and a monster disk drive? Where can you cut perfor-
mance slightly and save money? These questions are hard enough for buyers to an-
swer, but cause headaches for vendors. Again, Dells made-to-order process reduces
the risks. But vendors like Hewlett-Packard, Lenovo, and Acer have shown that with
accurate predictions, it is possible to capture a substantial slice of the retail market.
The key is to have the combination of features that are demanded by customers, at
the right price.
Getting rid of old computer equipment could involve almost as big a decision as
purchasing a new computer. California and Massachusetts have banned computer
equipment from landflls. Europe and Japan have relatively strict recycling laws.
Vendors are struggling to create recycling programs. Dell has committed to increas-
ing the recycling rates by offering new programs that embed the cost of recycling
into the new equipment. Other vendors will take back old equipment for a fee of $30
to $50.
67 Chapter 2: Information Technology Foundations
with common user devices such as laptops, cellphones, and tablets. These devices
are also important in business, but today they are essentially commodity items that
are purchased in bulk and replaced every couple of years. Servers require more at-
tention because they are more expensive and handle important tasks for the entire
company.
Some basic aspects of computing hardware have remained the same for many
years. However, the continued improvements have led to powerful changes in ca-
pabilities and physical size. Small, portable devices now have huge processing
and communication capabilities. These changes are leading to new applications,
new ways to build information systems, and new ways to interact with comput-
ers. Some of these effects are explored throughout this book. In terms of hardware
choices, the main impact in this chapter is the question of whether hardware se-
lection matters anymore. For example, most people in the U.S. essentially lease
their cell phones paying a small up-front price and paying for the device with
higher monthly contract prices. Consequently, it is relatively painless to replace
the equipment every two years. As more applications move to cell phones and
browsers, the choice of hardware becomes less important every year. Still, it will
be a few years before all hardware reaches this state. So, it is still useful to under-
stand some of the foundations of information technology hardware and software.
Trends
The frst computers were simple pieces of hardware. Like all computers,
they had to be programmed to produce results. Programming these machines
was a time-consuming task, because all of the pieces were connected by
individual wires. Programming the computer consisted of rearranging the
wires to change the way the pieces were connected. As computer hardware
improved, it became possible to program the processor without having to
change the internal wiring. These new programs were just a list of numbers
and short words that were input to the machine. These lists of commands
were called software, because they were easier to change.
Programmers soon learned that some tasks needed to be performed for
most programs. For example, almost every program needs to send data to
a printer or retrieve information stored on a disk drive. It would be a waste
of time if every programmer or user had to write a special program to talk
to the printer. By writing these common routines only once, the other pro-
grammers could concentrate on their specifc applications. As a result, every
computer has a basic collection of software programs called an operating
system. The operating system handles jobs that are common to all users and
programmers. It is responsible for controlling the hardware devices, such as
displays, disk drives, and printers.
The Internet changed everything by focusing on networks and sharing
data. The Web changed everything by making the browser the most impor-
tant display device. Increasingly, software and data are stored on Web serv-
ers. Users rely on browsers installed on a variety of clientsfrom desktops
to handheld computers, tablets, and cell phones.
Hardware trends have been astonishing compared to older industries.
Performance, size, and price have continued to improve each year. These
changes have created new, portable products and pushed advanced comput-
ing into everyday products.
68 Chapter 2: Information Technology Foundations
Keep in mind that the demands for data storage and computational tasks con-
tinue to increase. So someone has to buy more computing power and data storage
on a continuing basis. Most businesses purchase information technology at mul-
tiple levels: devices for users, servers for business tasks and data storage, long-
run backup, and sometimes intensive analytical tasks. Each of these categories
requires different types of computers, and it means someone has to monitor the
investments and changes to technology.
Why do you care how computers work? After all, it is easy to use a photocopy
machine without understanding how it works. Automobiles cost more than most
computers, yet you can buy an automobile without knowing the difference be-
tween a manifold and a muffer. You can also make telephone calls without under-
standing fber optic cables and digital transmissions.
On the other hand, when you buy an automobile you need to decide if you
want options such as power windows, a turbo charger, or a sunroof. Almost every
product you purchase has a set of technical elements, and you can fnd an expert
(techie) who is more concerned about details than others. But, does it truly matter
to you? Perhaps not, but if you do not understand the options, you might not end
up with the car, telephone service, photocopier, or computer that you need. Or you
could end up paying extra money for services that you will not use. To choose
among the various options, you need to know a little about how computers work.
Computers are typically discussed in terms of two important classifcations:
hardware and software. Hardware consists of physical items; software is the
logical component such as a set of instructions. Of course, many functions can
Figure 2.1
Information technology changes constantly. Change makes it diffcult to choose
products and control costs as you upgrade over time. As a manager, you have to
evaluate the technology features and choose options that provide the functions you
need while minimizing costs.
Desktop: $400-2,000
Laptop:$600-2,000
Tablet:$500-2,000
Workstation: $2,000-7,000
Super computer: $1,000,000+
Enterprise Server:
$10,000-$1,000,000
Cell phone:$200-700
HP
Apple
Motorola
Sun (extinct)
Cray
69 Chapter 2: Information Technology Foundations
be provided in either software or hardware, and a computer user often cannot tell
which has been used, and most often does not care. The one main difference is
that it is easier to make changes to software than to hardwareespecially since
software patches can be transmitted across the Internet. Before looking at the vari-
ous hardware components and software options, it helps to examine the primary
data types. You care most about the tasks a computer can perform, and the data
types are the fundamental blocks within any information system.
Types of Data
What are the basic objects that computers process? To a computer
user, the most important aspect of the computer is the data that it handles. Today,
computers are used to process fve basic types of data: numbers, text, images,
sound, and video. Because of limited speed and storage capacity, early comput-
ers could handle only simple text and numbers. Only in the past few years have
computers become fast enough and inexpensive enough to handle more complex
sound and video data on a regular basis. As computers continue to improve, these
new capabilities will alter many aspects of our jobs and society.
Single bit: one or zero (on or of)
8 bits = 1 Byte: 10101010
1 Byte holds values from 0 - 255
2
0
= 1
2
1
= 2
2
2
= 4
2
3
= 8
2
4
= 16
2
5
= 32
2
6
= 64
2
7
= 128
2
8
= 256
2
9
= 512
2
10
= 1024
2
20
= 1,048,576
Bytes bits Power of 2
1 8 256
2 16 65,536
3 24 16,777,216
4 32 4,294,967,296
8 64 18,446,744,073,709,551,616
Figure 2.2
Byte and bits. Binary counting imposes some limitations based on the size of the
counter. Note that 32-bit hardware and software can only address 4 GB of memory.
Windows 7/32-bit is limited to 3 GB. To use more RAM, you need 64-bit hardware
and software.
70 Chapter 2: Information Technology Foundations
Object Orientation
One of the most important concepts to understand with computers is that all data
are represented as binary data. The computer processor can handle only binary
data in the form of bits. Each bit can be on or off or mathematically, zero or one.
Processors operate on groups of bits at a time. The smallest group of 8 bits is
called a byte. The industry often refers to the maximum number of bits that a
processor can handle. Common machines use 32-bit processors, but the industry
is shifting to 64-bit processors. A 64-bit processor can process 8 bytes of data in
one operation.
The number of bits (or bytes) determines the size of individual data that can be
handled or addressed. Figure 2.2 summarizes some of the values of binary num-
bers that commonly arise in computing. In particular, note that a 32-bit system has
a limitation of about 4 gigabytes (GB). Consequently, a 32-bit Windows operating
system can only address 3 gigabytes of RAM. If you want to use more memory,
you need to install 64-bit versions of the operating system and other software.
It can be diffcult to deal with huge numbers. So instead of trying to write out
strings of zeros and commas, people create names for different levels of numbers.
Figure 2.3 lists the main prefxes in use today and some that might be reached in a
few years. Notice that there are some differences between decimal and binary val-
ues because binary is based on 1024 instead of 1000. These differences were mi-
nor at small numbers but become larger with higher powers. Consequently, there
is some confusion when you see a number expressed as gigabytes or terabytes.
For instance, disk drive vendors commonly count storage space in decimal values
(because it sounds bigger); but the Windows operating system reports drive space
in binary values so a 512 GB drive (in decimal) only contains about 488 gigabytes
of space counted in binary. Drive vendors would probably be happier if operating
system programmers reported data in decimal counts instead.
Figure 2.3
Terms and prefxes. The IEC (electrical) has proposed using different names for
powers of two instead of decimal. The new versions are sometimes used in Europe
and have been adopted as standards. The goal is to reduce confusion.
Term Name Power
of 10
Power
of 2
IEC
term
Binary value
Kilo Thousand 3 10 Kibi 1,024
Mega Million 6 20 Mibi 1,048,576
Giga Billion 9 30 Gibi 1,073,741,824
Tera Trillion 12 40 Tebi 1,099,511,627,776
Peta Quadrillion 15 50 Pebi 1,125,899,906,842,624
Exa Quintillion 18 60 Exbi 1,152,921,504,606,846,976
Zetta Sextillion 21 70 Zebi 1,180,591,620,717,411,303,424
Yotta Septillion 24 80 Yobi
1,208,925,819,614,629,174, 706,176
71 Chapter 2: Information Technology Foundations
In common business usage, the prefxes tera and peta are becoming relatively
common. Even desktops and laptops can have terabyte-sized drives. Some large
companies collect petabytes of raw data, which are a thousand times larger than
terabyte systems. A couple of companies have reached the exabyte scale for spe-
cialized data. Think about a million terabyte drives for a minute and you will be-
gin to see what happens as companies collect increasing amounts of data.
One of the key points in terms of data storage is that companies avoid delet-
ing data. It can be diffcult to know exactly which data might be valuable in the
future. Given falling prices for storage, many companies simply decide to keep
everything.
Beyond counting, humans do not deal well with bits or bytes. Real-world data
consists of analog objects such as numbers, text, images, sound, and video. Figure
2.4 illustrates the fve basic data types. Computers need input devices to convert
these objects into bits. Output devices then change this data back to a form that
humans can understand. Understanding these types makes it easier to see the in-
dustry trends and to understand applications.
Each of the basic data types has its own characteristics. Numbers have a preci-
sion and usually a scaling factor. Text has a typeface and display size, as well as
appearance attributes such as bold, underline, and italic. Pictures can be described
by their resolution and the number of colors. Digitized sound is based on a speci-
fed sampling and playback rate, and fts into frequency and amplitude ranges.
Video combines the attributes of pictures with a frames-per-second defnition.
Along with the attributes, several predefned functions can operate on each data
type. Basic functions dealing with numbers include totals, calculations, and com-
parisons. Standard methods to manipulate text include searching, formatting, and
Figure 2.4
Five basic types of data. Because processors only deal with binary data, each format
must be converted or digitized. Computer peripheral devices are used to convert the
binary data back to the original format.
Numbers
Images
Sound
Video
Input Process Output
12 + 8 = 20
000001100
000001000
---------------
000010100 20
0010000000000000000
0100000000000001001
0110000011000011011
0111111111111001111
1111111111111011111
1111111111100011111
000001000 000001001 000010100
pitch or
volume
Time
00101010111
11010101010
01010101010
11110100011
00101011011
8 9 0 5
00101010111
11010101010
01010101010
11110100011
00101011011
00101010111
11010101010
01010101010
11110100011
00101011011
00101010111
11010101010
01010101010
11110100011
00101011011
00101010111
11010101010
01010101010
11110100011
00101011011
Text
This is a test
84 104 73 115
This is a test
72 Chapter 2: Information Technology Foundations
spell-checking. Methods dealing with pictures involve artistic alterations such as
color or lighting changes, rescaling, and rotation. Existing functions for sound and
video are often limited to recording, playback, and compression/decompression.
Most application packages create their own objects as combinations of the ba-
sic data types. For example, graphs consist of numbers, text, and pictures. As a
result, all of the attributes, and functions that apply to the base types also apply
to derived graph objects. Hence, graphing packages can perform calculations on
numbers, select fonts for displaying text, and enable you to set colors and rotation
for the graph. Other applications, such as slide shows, provide additional func-
tions, like controls for how one slide is replaced by another (e.g., fades, dissolves,
and wipes). The point is, once you understand the properties and functions of the
basic data types, you can learn how to use any new application by concentrating
on the new objects, their attributes and functions. This approach is especially true
since many applications are designed and built using object-oriented methods. In-
creasingly, operating systems are designed around these data types. They have
search functions and applications to fnd and use fles that contain specifc types
of data.
Numbers and Text
Numbers and text are still the most common types of computer data used in busi-
nessfor example, each cell in a spreadsheet can display a number or text (la-
bels). Most business reports consist of tables of numbers with supporting text.
As shown in Figure 2.5, a key aspect of numbers is that you must be careful with
round offparticularly within spreadsheets. Consider the frst column of numbers
with three decimal digits. What happens when the format command tells a spread-
sheet to display those numbers in the third column with only two decimal places?
The computer will perform the addition frst and round off the displayed result,
which means the total will appear to be incorrect. If you really want only two dig-
its of precision, you should use the Round function to convert each number before
it is added, as shown in the second column. Precision of calculations is impor-
tant in business. For example, the 1999 European Union standards require that all
monetary conversions be computed to six digits to the right of the decimal point.
Since processors can handle only binary data, how can they deal with text? The
answer is that they assign a number to each character in the alphabet, which raises
Reality Bytes: RAM: Smaller, Faster, Less Power
In early 2011, Samsung announced the production of the frst DDR4 RAM module.
Based on 30 nanometer (nm) lithography the module doubles the access speed from
DDR3s 1.6Gbits/sec to 3.2Gbit/sec. Samsung also noted a 40 percent reduction in
power consumption when used in notebook computers. At the same time, prices for
existing DDR2 and DDR3 RAM was continuing to decline. The market research
frm iSuppli noted that in the last six months of 2010, the contract price for 2GB
DDR3 dropped from $44.40 to $21. Mike Howard, a principal analyst at iSuppli pre-
dicted that DDR3 prices might drop as low as $1 per gigabyte, which would be less
than the marginal cost of production.
Adapted from Lucas Mearian, Samsung Announces First DDR4 DRAM Module,
Computerworld, January 4, 2011.
73 Chapter 2: Information Technology Foundations
a very important, but tricky, question: How many letters are there in the alpha-
bet? The question is tricky because you need to frst ask: Which alphabet? Until
the 1990s (or later), most computer systems were based on an English-language
assumption that there are only 26 letters in the alphabet (plus uppercase letters,
numbers, and punctuation). The key to numbering the alphabet is that all hard-
ware and software vendors have to agree to use the same numbering system. It is a
little hard for everyone to agree on a system that only displays English characters.
Consequently, most computers today support the Unicode system. Unicode is an
international standard that defnes character sets for every modern language and
even most dead languages.
Figure 2.6 shows that a key feature of Unicode is that it can handle oriental
languages such as Chinese and Japanese that use ideograms instead of characters.
The challenge with ideograms is that each language contains tens of thousands of
different ideograms. Character-based languages like English used to be handled
by storing one character number in one byte. But one byte can only hold 256 (2
8
)
numberswhich is not enough to handle ideograms. Consequently, Unicode uses
two bytes to count each character or ideogram, enabling it to handle 65,536 (2
16
)
Precision ROUND( ) Format
5.563 5.56 5.56
0.354 0.35 0.35
6.864 6.86 6.86
12.781 12.77 12.78
Time Languages Character Sets
Early U.S.andEngland ASCII and EBCDIC
127 characters, 7 bits/1 byte
1980s Latin-based characters: tilde,
accent,umlaut,...
, ,
Code pages and extended character
sets
255 characters, 8 bits/1 byte
1990s Asian ideograms, plus any
language
Unicode
All modern langauges and most dead
languages
1 character, 2 (or 3) bytes
Figure 2.5
Numeric precision. If you tell a spreadsheet to display two decimal-digits, it performs
the additions in the full precision of the dataand displays the data in the right
column. If you really want two-digit precision, you should use the Round(x, 2)
function to roundoff the data before addinggiving the results in the middle column.
Figure 2.6
Character sets. Standards defne how alphabets and ideograms are converted to
numbers. Early systems were based on the English language and extended to handle
Latin-based characters. Today, Unicode is the preferred way to encode text because
it can handle any language. However, it takes twice as much space to store Unicode
data.
74 Chapter 2: Information Technology Foundations
ideograms in each language. It also has the ability to switch to three bytes if even
more characters or ideograms are needed.
Why do you care? Remember the increasing importance of international trade.
If you build a computer system or database that needs to be used around the
world, make sure that you use the Unicode character set so you can collect data
in multiple languages. Unfortunately, some systems by default still use the older
character systems, and you have to deliberately change the settings to ensure you
can handle other languages.
Figure 2.7 illustrates one of the more important properties of text: its typeface.
You can choose from several thousand typefaces to achieve a desired style. Be
careful with your choices. Some choices are obvious; for example, do not use an
ornamental (script) typeface to write a business report. Also, serif fonts are typi-
cally used for printed material, and sans-serif fonts are used for very small or very
large presentations. Other choices are more subtle and may require the assistance
of a professional designer. You will also have to choose font sizes. The basic rules
of thumb are that most printed text is displayed at 10 to 12 points. It is also useful
to know that letters in a 72-point font are approximately one inch tall.
Pictures
Pictures, graphics, and icons are used to display graphs and charts. Pictures are
sometimes used as backgrounds or as icons in presentations that are used to help
the audience remember certain points. In fact, almost all of the computer work
that you do today is based on a graphical perspective. Video screens and print-
ers are designed to display everything, including text, in a graphical format. The
graphical foundation provides considerably more control over the presentation.
For example, you can change the appearance of characters or combine fgures and
graphs in your reports.
Figure 2.7
Typefaces fall into two main categories: serif and sans serif. Serifs are little curls
and dots on the edges of letters. They make text easier to read; however, san serif
typefaces are useful for overheads and signs because the added white space makes
them easier to see from a distance. Ornamental typefaces can be used for headlines.
Size of fonts is measured in points. Characters in a 72-point font are about 1 inch tall,
and most books and newspapers use a font between 10 and 12 points.
Arial 20
Times New Roman 21
Century Schoolbook 16
Typeface Classification
Sans serif
Serif
Ornamental
Juice ITC 18
Script MT Bold 18
Garamond 24
Courier 18 (monospace)
A
72 points,
1 inch
leading
75 Chapter 2: Information Technology Foundations
Two basic ways to store images are bitmap and vector formats. The easiest
to visualize is bitmap (or raster or pixel) format. A bitmap image is converted
into small dots or pixels (picture elements). If the picture is in color, each dot is
assigned a (binary) number to represent its color. This method is often used to
display photographic pictures where subtle changes in color (such as blends) are
important. Bitmap pictures are evaluated in terms of the number of colors and
resolution of the picture. Resolution is often measured in dots per inch (dpi).
You will encounter certain problems with bitmap images. Consider what happens
if you create a bitmap picture in a square that has 50 pixels per side. How do you
make the image larger? Use larger dots? Then the lines are very rough. How can
you stretch the picture into a box that is 100 by 200 pixels? Although these opera-
tions are possible, they do not usually produce good results.
Historically, it took several years, and the Web, for companies to standardize
on the types of image fle formats. Today, although individual software packages
still have their own proprietary formats, most of them can save and edit fles in
the three major formats: GIF, JPEG, and PNG. All three are bitmap formats and
have slightly different benefts. The PNG format is newer and combines most of
the benefts of the other two formats, so it is a good default choice. However,
JPEG (Joint Photographic Experts Group) is still commonly used by most digital
cameras.
When you need to change the size of pictures and keep fne lines and smooth
edges, it is better to store pictures in vector format. Vector images consist of
mathematical descriptions instead of dots. In most cases, they take up less storage
space than bitmaps. For example, a line is described by a statement such as: line
from (0,0) to (10,10) in yellow. Do not worry: you do not have to be a mathema-
tician to use vector images. Most of the current drawing packages store their work
in vector format. Web browsers are beginning to support a new Internet vector
Reality Bytes: Print Your Own Parts
Have you ever tried to track down a replacement part for a faucet, a toy, a lawn
mower, printer, or some other device? You might be able to track down the manufac-
turer and order the part. Today, many of the manuals are online so it is feasible, but
you still have to wait. What about designing and building new objects? If you are an
inventor and have a new product idea, you need a fabrication shop with expensive
tools to create prototypes. What if you could build any small-size part you need us-
ing a 3D fabricator that essentially prints the part in plastic or metal powders? Man-
ufacturers could put design specifcations for replacement parts online, you could
download the design, run the fabber and have your part built from scratch in a few
minutes or a couple of hours. The really cool part? You can build your own fabber
for $2400 in parts! The Fab@Home Web site (fabathome.com) has a complete list of
parts and directions on how to build the fabber. It also has examples of the projects
they have built. The device is computer-controlled and works like a printer but uses
syringes to deposit silicon, epoxy, or cake icing in layersbuilding up the product
one layer at a time.
Adapted from Tom Simonite, Desktop Fabricator May Kick-start Home Revolu-
tion, New Scientist, January 9, 2007.
76 Chapter 2: Information Technology Foundations
image (SVG: scalable vector graphics) format that provides for faster image trans-
fers and scalable images.
Graphics devicesincluding displays, printers, digital cameras, and scan-
nersare evaluated largely in terms of resolution. Resolution is commonly mea-
sured by the number of pixels (or dots) per inch. Figure 2.8 shows the importance
of resolution. Doubling the number of pixels per inch delivers much fner lines
particularly for diagonal lines. But doubling the resolutions results in four times
the number of total pixelswhich requires substantially more memory and pro-
cessing time to handle.
Figure 2.9 shows how to compute the data size of an image. A photo taken with
a resolution of 100 dots per inch and a size of 6 x 4 inches has 600*400 or 240,000
pixels. How many bytes are needed to store one pixel? The answer depends on the
number of colors. How many colors do you need? The human eye can distin-
32
24
16
12
32/24 = (8/8)*(4/3)
total pixels: 24*32 = 768
768 = 4*192
16/12 = (4/4)*(4/3)
total pixels: 16?*12 = 192
Figure 2.8
Resolution. The image on the left has twice the resolution as the image on the right.
In total, the higher resolution image has four times (two squared) the number of
pixels, and provides more precise linesparticularly diagonal lines.
100 dots per inch
6 inches
4 inches
6*100 = 600 dots per line
4*100 = 400 dots per column
400*600 = 240,000 pixels
Figure 2.9
Resolution and size. Multiple the number of rows by the number of columns to get
the total number of pixels. Multiply by the number of color bytes per pixel (usually
3) to get the total raw size (720,000 bytes).
77 Chapter 2: Information Technology Foundations
guish at most about 16 million colors. Three bytes of storage is 24 bits and 2
24
is 16,777,216, so many systems use a three-byte color coding. Consequently, the
raw data for the image requires 3*240,000 or 720,000 bytes of storage. But, 100
dpi is a weak resolution, 200 dpi would be better for printing. Doubling the reso-
lution results in a total size that is four times larger (2-squared), or slightly under
3 megabytes. A few systems use 32-bit color for a broader color gamut and faster
processing.
Most digital cameras express resolution in terms of total pixels instead of dots
per inchlargely because the dpi changes depending on the size of the print.
Most of the time, you care about the total number of pixels available. More pix-
els means you get a higher-quality print. Figure 2.10 shows resolutions for some
common devices. Notice how the resolution of a photograph declines when it is
printed in a larger size. Print resolutions less than 300 pixels per inch (ppi) are
grainy and jagged. A similar effect occurs with video screens. On the other hand,
almost all operating systems draw text characters with a set font size. Increasing
a monitors resolution results in smaller text. For example, if you have a monitor
with a physical diagonal measure of 16 inches, an SVGA resolution produces 80
pixels per inch, so the dot on an i is 1/80 of an inch. Increasing the resolution to
UXGA creates 125 ppi, so every character and dot shrinks to a little over half the
original size (64 percent). Microsoft documents have suggested Windows might
someday be rewritten to solve this problem by separating the size of the fonts
from the resolution. Screen displays will behave the way printers do now, so that
increasing the resolution will leave the text the same height but provide sharper
characters with fner details. The main Microsoft tools including Offce and Inter-
net Explorer support this approach by providing a zoom feature that enables you
to increase the display of the font without changing the font size.
The aspect ratio is another topic in graphics that has become important
largely because it has been changing. The aspect ratio is the ratio of the horizontal
width to the vertical height of an image. It is usually expressed in terms of two
numbers, such as 4:3. Early flm projectors were limited by the physical size of
Figure 2.10
Resolution examples. Video screens use the 4/3 aspect ratio from the older television
standard. HDTV uses a wider 16/9 ratio and about 2.5 times the resolution of the
original VGA/TV screen. Final resolution values depend on the physical size of the
screen or paper.
Video Print Camera
Video Pixels Method Pixels/Inch Print
Size
Pixels/Inch
VGA 640 x 480 Fax 100-200 3 x 4 768
XGA 1024 x 768 Ink Jet 300-700 4 x 6 512
SXGA 1280 x 1024 Laser 600-1200 8 x 10 307
UXGA 1600 x 1200 Typeset 2400 pixels 3072 x 2304
WSXGA 1680 x 1050
HDTV 1920 x 1080
78 Chapter 2: Information Technology Foundations
the flm so the 4:3 ratio was selected to ft the flms properties. Photographs often
had a similar ratio. Television adopted the same ratio. Movie studios then adopted
a widescreen format with a 1.85:1 or 2.40:1 ratio. When computer displays ar-
rived, they followed the standard television 4:3 ratio; eventually leading to resolu-
tions of 640 x 480 and 1600 x 1200. Then HDTV was introduced, partially with
the goal of displaying higher-quality images for movies. The standard aspect ratio
adopted for HDTV was 16:9 (or 1.78:1). Eventually, computer monitors and lap-
top screens adopted the same aspect ratio. But, a tremendous variation still exists
in aspect ratios among monitors, laptops, tablets, and cell phones. As a designer
you cannot count on a specifc resolution or aspect ratio. Which often means it is
necessary to create images and layouts in multiple formats; or to choose a size that
will ft reasonably well on the most common displays.
Color
Color is an important component of images and video. It is also important in Web
sites and graphics design of print pages. To date, most organizations rely on black-
and-white for basic internal reports and memos. However, as color printing costs
decline and as organizations move towards electronic documents, color is becom-
ing popular in many reports. To begin to understand color, you need to study art
and graphics design. In particular, color and design convey emotion, so you need
to be careful about overall color schemes. Fortunately, most software packages
support templates, so you can choose a template that fts your needs without
needing to be a design expert. However, for complex designs and documents that
are published, you should get expert advice.
Figure 2.11 provides a brief introduction to three of the basic color models.
These models are used to identify colors, but do not do much to help you choose
colors appropriate to your job. In the computer world, RGB (red, greed, blue) is
the most common model. You should use a color picker to explore how the colors
work so you can fnd or adjust colors when you need them. Think of each color
byte as a spotlight. Increasing a single value increases the brightness of that color.
CMYK (cyan, magenta, yellow, key) is commonly used by print shops, so if you
create large print jobs that need to be sent to a print shop, you should work with
the CMYK model. Each color number represents the percentage strength of the
specifed color. The challenge to printing is that your display screen rarely shows
Reality Bytes: SSD Performance Surpasses Hard Drives
In the frst quarter of 2011, Micron Technology, the leading U.S. manufacturer of
RAM, began shipping the RealSSD C400 fash drive. The 1.8 and 2.5-inch drives
connect to laptops using SATA 3 which supports a data transfer rate of 6 G bit/sec-
ond. The drives are created from NAND fash chips using a 25 nanometer lithog-
raphy technology. The largest drive capacity is 512 GB and offers sequential read
speeds up to 255 MB/sec and write speeds up to 215 MB/sec. These speeds are faster
than hard drives and the half-terabyte capacity puts it in the range of many existing
hard drives. On the other hand, the $900 consumer price (for 512 GB) is substan-
tially higher than a hard drive cost; but a signifcant drop for SSDs.
Adapted from Lucas Mearian, Micron Releases Half-terabyte Laptop SSDs, Com-
puterworld, January 4, 2011.
79 Chapter 2: Information Technology Foundations
colors the same way they will appear in print. Different lighting strongly affects
the color and brightness of printed images. It also affects your display, but usually
to a lesser degree. If you need to see colors as they will appear in print, you have
to run a gamma correction program on your monitor. It can adjust the display
to match the desired output characteristics. High-end graphics packages, such as
those produced by Adobe, automatically install the gamma correction software
and provide instructions for adjusting it. A related problem you will face with
printing is that some colors you see on your monitor cannot be reproduced by
printers. For example, a pure high-intensity blue is usually printed in a darker
shade. The better graphics packages will show you the constrained color palette.
You probably do not need to become a color expert, but these concepts explain
why your system will sometimes display colors differently than you expected.
Style Sheets
When working on large documents, Web sites, or portfolios, consistency becomes
a critical design factor. Actually, even a small document quickly becomes ugly
and impossible to read if someone uses multiple typefaces, font sizes, and dis-
cordant colors. But the challenge with large documents is that it can be diffcult
to remember exactly which fonts were used for each element. It is even more dif-
fcult if the document or Web site is created by multiple people. Style sheets were
designed to solve these problems and ensure consistency across a collection of
documents. Style sheets have been used for many years in the publishing industry,
but computer tools have made them more powerful and easier to use.
Figure 2.11
Colors. RGB and CMYK are the primary color models in use. RGB for computer
colors created by generating light, and CMKY in printing for refected light. HSL is
used predominantly in the video world. Most software enables you to choose a color
model and enter values the way you prefer.
RGB: Red Green Blue, 1 byte each (0-255 values).
Visualize as lights:
255, 0, 0 is all red.
0, 128, 0 is half green.
255, 255, 0 is yellow.
0, 0, 0 = black.
CMYK: Cyan Magenta Yellow Key
Used for printing (Key is black).
Expressed as a percentage of pure color.
0, 0, 0, 0 = no color (white page).
HSL: Hue, Saturation, Luminosity
Used in video/television.
x, 0, 0 = black
Hue
Saturation
Luminosity
80 Chapter 2: Information Technology Foundations
The basic goal is to predefne all of the styles that will be needed in a document
and store these defnitions in one location. When creating a document or Web
page, you simply write the content and assign the appropriate style from the list.
For example, frst-level titles might have a Heading 1 style. The typeface, font,
color, and other attributes are defned within the style. By assigning the style to a
section of text, that text is displayed correctly. The power of a style sheet is that
a graphics designer can tweak the entire layout and design simply by modifying
the style defnitions in one location. Then every page automatically picks up the
new style. Without a style sheet, making a design change requires searching every
single page and editing multiple locations.
If your job consists of creating contentwriting articles, presenting data, and
so onyou simply have to use the predefned styles. But you must always be
careful. Any special font or emphasis that you want to add should never be made
directly to the text. Every design element has to be defned within the style sheet
and then attached to specifc objects. Any change that is made directly to a docu-
ment, such as setting a word or letter to boldface, will be almost impossible to
fnd and change later. Unfortunately, existing tools such as word processors make
it relatively easy to select a word and set it to bold or italicwhich bypasses the
style sheet. You should avoid this temptation and instead open the style sheet list
and assign a style instead of assigning bold or italic.
Reality Bytes: Choosing the Right Tools at Thule
In computer programming terms, the term spaghetti code represents logic that
wanders all over the placemuch like a plate of intertwined spaghetti. This code is
hard to read and diffcult to debug or change. Programmers are taught to write clearer
structures that are easier to follow. But, most people who use spreadsheets learn just
the basic concepts of the tools and then go and build complex monsters. Bicyclists
and Skiers know Thule as a company that makes high-end bike and ski racks for
cars. The Thule Vehicle Solutions North America division has 400 people and gener-
ates 15 percent of the corporate revenue. Vice President of Finance, Mark Cohen,
notes the importance of the data, particularly for budgeting and forecasting: Were a
seasonal company, so we have to have product ready to go or the sale will go to our
competitor. (The main competitor is Yakima.) Cohen noted that this data was main-
tained with spreadsheets. We had one person in accounting who kept all the data
as up to date as possible, including departmental expenses that outlined the costs of
running the factory. However, it wasnt unusual for it to take a week to consolidate
cross-company information, and it wasnt unusual to discover that what managers
were looking at wasnt the fnal spreadsheet. In 2008, Cohen threw out the spread-
sheet approach and went with an online system from Host Analytics Budget that
provides real-time collaboration and mobile access to the data and projections. Indi-
viduals are now responsible for entering their own data and everyone gets immediate
access to current values. The problem with the spreadsheet is that it was the wrong
tool for the job. Yes, it could generate forecasts, but the bulk of the requirements
were to collect and share current datasomething spreadsheets do poorly.
Adapted from Sandra Gittlen, Why Some Companies are Ditching Their Spread-
sheets, Computerworld, January 19, 2011.
81 Chapter 2: Information Technology Foundations
Sound
Digitized sound is increasingly important for computer users. For example, you
can use music to add emphasis and entertainment to a presentation. More impor-
tant, you can use your computer to send voice mail messages and to store notes
with your e-mail and documents. Tools exist to convert text to voiceso you
can have your computer read your e-mail messages over the phone. Increasingly,
voice input is being used both to control the computer and for dictation. Increased
storage capacity and declining costs make it easier for sound to be stored in digital
format.
As shown in Figure 2.12, sound consists of two basic components: volume
(amplitude) and pitch (frequency). These two values are changed over time to pro-
duce words and music. To digitize sound, volume and pitch are measured several
thousand times per second. The resulting binary numbers are stored in sequence.
Synthesizers convert the sampled numbers back into music or speech and play
them through amplifers and speakers. The challenge is to sample the source often
enough so no important information is lost.
Most audio applications store sound by digitizing the sound waves. These fles
can become very largedepending on the quality. If you tell the computer to sam-
ple the sound more often, you will get a higher quality recording, but it can take
considerably more storage space. Sound-recording systems generally allow you
to specify the sampling parameter to control the initial quality. From that point,
Figure 2.12
Sound sampling. At a specifc point in time, the system measures frequency and
amplitude using 16-bit numbers. The quality of the sample is largely determined by
the number of times per second the audio is measured. The CD standard is 44,100
times per second.
time
time
frequency (pitch)
amplitude (volume)
440.01
37.15
Frequency: (hertz) cycles per second
lower / higher
Amplitude: height of the wave
82 Chapter 2: Information Technology Foundations
compression methods can be used to reduce the fle size; but some of them result
in a loss of quality.
An even more effcient method of storing music is to fle it in the musical in-
strument data interchange (MIDI) format. MIDI is a method of specifying music
based on the musical notation and instrument, so it is substantially more effcient.
A version of this method was designed for the MP4 standard, but this standard has
not been widely adopted.
Video
Computerized video has dramatically increased in the past few years, even in
business. However, most of the video is relatively low quality, in terms of low
resolution and low frame rates. Some video applications are better than others, but
it is still challenging to transmit high-quality video. Yet, as transportation costs in-
crease, there is considerable incentive to use video communication for some types
of meetings.
Converting motion picture and television signals to binary form generates a
tremendous amount of raw data. The process is similar to that for single pictures,
except standard movies display 24 frames (images) per second, while U.S. televi-
sions display 30 frames per second. Video can also be completely computer-gen-
erated. These tools are commonly used in marketing and engineering to display
prototypes and product features.
It is relatively easy to display videoeven cell phones have enough processing
power to display high-resolution video. High-defnitionTV(HDTV) has become
popular, and most devices have the ability to play standard HDTV fles. Even rela-
tively inexpensive cameras have the ability to capture images in HDTV format.
The challenge arises in trying to edit videoparticularly HDTV fles. Editing re-
quires that the fles be decompressed and edited in raw format, which is a large
amount of data. The next sections illustrates some of the issues with data size.
Size Complications
To understand the importance of the fve types of data, it helps to examine the
size of each type. For many years, computers predominantly handled numbers and
limited text. Over time, usage has gradually changed to include images, sound,
Figure 2.13
Size complications. Lossy compression results in substantially less data but at a
lower quality. Text fle is compressed with a Zip folder. Image is compressed with
JPEG from high to low quality. Sound is compressed with a WAV fle (44.1 kbps) and
WMA (64 kbps). Video is compressed with the DV standard and WMV at 6383 kbps.
Object Raw Compressed Lossy
Text and numbers 5 KB/page 2.3KB/page N/A
Image (300 dpi, 24-bit color, 4 x 6
in.)
6.32MB 2.4MB 78-245 KB
Sound(44.1KHzstereo) 170 KB/sec 100 KB/sec 0.01KB/sec
Video (NTSC 30 fps, stero sound) 25 MB/sec 3.7MB/sec 1 MB/sec
HDTV (1080p: 1920 x 1080) MP4 6.8GB/min 1.5MB/sec
83 Chapter 2: Information Technology Foundations
and video. The more complex data types require much greater storage space, pro-
cessing power, and transmission capacity.
Consider a typical single-spaced printed page. An average page might contain
5,000 characters. A 300-page book would hold about 1.5 million characters. Now,
consider a picture. At 300 dots per inch, a full 8.5- by 11-inch page would require
a little over a million bytes if it were scanned in black and white. A photograph
in a base resolution with 16 million colors (24 bits per pixel) would require 18
megabytes (million bytes) of storage space.
Sound and video require considerably more storage space. Remember that
thousands of numbers are being generated every second. A typical CD holds 700
megabytes of data, which can store 72 minutes of stereo music or almost 10 mega-
bytes per minute. At lower quality, the current standard for digitizing telephone
conversations generates 64 kilobits per second, almost half a megabyte per min-
ute. Video generates approximately 3 megabytes of data every second, while the
highest resolution HDTV generates about 113 megabytes per second. Figure 2.13
summarizes the basic size characteristics for the standard data types.
Data Compression
An individual photograph at high resolution takes a large amount of space in raw
form (typically over 20 megabytes). Storing and handling raw video creates sub-
stantially larger fles. The answer in many cases is data compression. Look at the
photograph in Figure 2.14 for a second. Consider the line of data from the lower
left corner. To store it as raw pixels, you would have several lines of black pixels.
Instead of recording every one of these pixels, data compression builds up pat-
terns. It takes less space to encode a note that a section contains a large set of
black pixels, than to store every pixel. Some systems, such as the JPEG method,
support lossy compression. In these cases, patterns are matched as long as the
pixels are close to an existing match. When you compress the data, you get to
select how close of a match to allow. For example, with a tight match, the system
might allow a very dark gray pixel to count as black, but might not allow a dark
blue one to match a black pattern. Lossy compression methods are commonly
used to transmit photographs, audio fles, and videos.
Figure 2.14
Data compression. Storing every single pixel requires a huge amount of space.
Compression looks for patterns. For example, instead of storing 1,000 black dots in a
row, it is much shorter to store a note that says 1,000 black dots come next.
84 Chapter 2: Information Technology Foundations
Hardware Components
What are the main components of a computer? As a manager, you
need to understand the basic features of hardware. You do not have to be a com-
puter-repair expert, but you need to understand the fundamental structure and
characteristics of the computer components. The most important frst step is to
recognize that declining prices rule this industry. Because of technological ad-
vancements and standardization you know that you can buy a new computer next
year that is faster than the one you just bought today. Instead of worrying about
your new computer becoming obsolete, just accept that you will be able to buy a
faster computer next year, which raises the questions: How often should you buy a
new computer and what features should you buy? The answers to these questions
change over time and depend on your specifc uses, but as long as you under-
stand how to evaluate the major components, you will be able to make a rational
decision.
Along with declining prices, one of the most important trends in hardware is
the shrinking size. But regardless of the size, computers contain four primary
types of components to handle: input, output, processing, and secondary storage.
Of course, each category has hundreds of options so that you can tailor the com-
puter to your specifc needs. One trend that you have to remember is that the hard-
ware industry changes rapidly, especially for small systems. Most computers that
you buy today will have a short economic lifeperhaps only three years. At the
end of that time, each component will have changed so much that typically you
will want to replace the entire computer.
Figure 2.15
Computer performance and capabilities are highly dependent on the peripheral
devices. Most computers will use several devices in each of the four major
categories. Technological progress in one area often results in changes to all four
types of components.
Input Process Output
Secondary
storage
Video monitor
Printer
Plotter
Process control
Voice output
Music synthesizers
Other computers
Magnetic Disk
Floppy Disk
Optical Disk
Tape Drive
USB Drive
Processor
RAM
Device controllers
Keyboard
Mouse
Optical scanner
Voice input
Bar code
Touch screen
Light pen
MICR
Magnetic strips
Card reader
Other computers
seconds - milliseconds
nanoseconds seconds - milliseconds
milliseconds
85 Chapter 2: Information Technology Foundations
The relationship among the four components is summarized in Figure 2.15.
Note that the process subsystem consists of random access memory (RAM) and
at least one processor. In many ways, the processor is the most important com-
ponent of the computer. It carries out instructions written by programmers. It uses
RAM to temporarily store instructions and data. Data and instructions that need to
be stored for a longer time are transferred to secondary storage.
One of the interesting aspects of computers is that the various components op-
erate at different speeds. The processor is the fastest of the group and its perfor-
mance is measured in nanoseconds (billionths of a second). Processors are even
faster than RAM. As a result, processors contain separate memory caches embed-
ded in the chip. When the processor asks for data items from RAM, it loads a large
chunk of data at one time so that it can fetch related items from its internal cache
to save time. Secondary storage devices are substantially slower. Because most
disk drives are mechanical, performance time is measured in milliseconds (thou-
sandths of a second). Divide those numbers, and you see that the processor is a
million times faster than the disk drive! Of course, humans are even slowermost
people type a couple of characters per second. Why do these speed differences
matter? It means the processor can be told to do multiple tasksapparently at
Figure 2.16
Basic computer components. The motherboard has the connectors to integrate all of
the components. Expansion cards can be added for graphics processors, TV tuners,
and other add-on tools. The processor has a large heat sink and fan to cool it. RAM
is added to the board on strips. Disk drives are generally connected by serial (SATA)
connectors, but older drives might use parallel IDE cables. The motherboard also
has connectors for front-panel items such as lights and USB ports (hidden under the
wires in this photo).
Power
supply
Processor
--under the
fan and
heat sink
Keyboard, video,
and other connectors
Disk drives
RAM
Expansion
slots
Motherboard
IDE
SATA
Graphics
onboard and
external
86 Chapter 2: Information Technology Foundations
the same time. While you are typing, the processor can take a fraction of its time
to store your keystroke, then retrieve some data from the disk drive, then send an
item to the printer, then add some numbers together, and fnally return to get an-
other keystroke.
Figure 2.16 shows the basic components of a PC. The motherboard contains
connectors for the processor, RAM, drives, and expansion cards. Many boards
also contain built-in graphics processors; however, add-on graphics cards gener-
ally provide better performance. The processor is relatively smallabout the size
of a 50-cent coin, but it is covered by a large metal heat sink and the processor
fan to remove heat. RAM is added by installing strips. RAM styles change over
time to provide better performance, so you need to get the right type of RAM for
each board. Disk drives require a power connection and a data connection. Serial
(SATA) connectors are commonly used now because they can move data faster
than the older parallel IDE connections. Video connections and other data con-
nections for networks and USB devices also change over time as new devices and
technologies are introduced.
Warning: You should avoid taking apart your computer; and if you dobe
sure to unplug it frst! You also have to ground your body before touching any
computer component. Static electricity can instantly destroy almost any electronic
item. But, if you are careful, it is relatively easy to install new disk drives or even
RAM into a computer. But always remember that you can never force a part to ft.
Computer parts are designed to ft together with almost no effort. And remember
that static electricity is your enemy.
Processors
Processors come in a wide variety of formats, but most of the existing mainstream
processors (Intel and AMD) can run the same code sets. Increasingly, manufactur-
ers are placing multiple processors on a single chip. So a single processor chip can
contain 2, 4, 6, or more independent processing cores.
Processors are relatively complex today and include many components. Cache
memory is a factor that infuences the overall performance. The processor runs
faster than any other device in the computer, including RAM. Any time there is a
large speed difference performance can be improved by adding a memory cache
to the faster device. The processor chip contains several megabytes of high-speed
internal memory. When it retrieves data from RAM, the processor grabs the data
in large chunks. It then works from the internal (level 2 or level 3) cache, which it
periodically reflls.
The processor is the component that does the hard work of calculations and
executing the software code. You can check on the status of your processor and its
various tasks by opening the Task Manager. Right-click on the Windows menu bar
and select the Processes tab, but be careful not to end any of the processes or your
computer might crash. Most of the time the System Idle Process will be the main
userwhich means the processor is simply waiting. You can also watch the per-
formance chart to see the total demands placed on your processor. Windows has a
sidebar gadget to let you monitor your processor all the time. If you fnd that the
processor is consistently in heavy use, you should consider buying a new machine.
However, unless you are running huge computational tasks or video-intensive ap-
plications, it is more likely that something is wrong with your computer and you
should check it for viruses and spyware software described in Chapter 5. Typical
users will fnd that they have plenty of processing power for almost all tasks.
87 Chapter 2: Information Technology Foundations
Te Evolution of Processors
Figure 2.17 shows an approximate measure of Intel processor performance over
time, as indicated by an index value (estimated SysMark). The exponential in-
crease in performance arises because the industry has been able to follow Moores
Law: the number of components placed on a chip doubles every 18 months. But
three potential problems are facing the chip industry: (1) light waves are too wide
to draw increasingly smaller lines; (2) when the components shrink to the size of a
couple of atoms, the electronic properties no longer behave the same (quantum ef-
fects); and (3) the power requirements and heat generation increase dramatically.
For at least two decades, the IT industry has lived with and relied on this in-
creasing performance (and reduction in costs). Eventually, this pattern will stop
possibly within 10 or 20 years. With luck and research, the industry will develop
entirely new technology that will produce even greater performance. But in any
case, managers need to monitor technical developments and be prepared for sub-
stantial changes.
The industry is switching to new chemicals to improve the electrical properties
of the chips to buy some improvements. Several researchers are experimenting
with optical computing (using light instead of electricity), and more esoteric con-
cepts such as quantum computing and biological processors.
In practical terms, the biggest change to processors has been the switch to
multi-core processorswhere each chip contains multiple independent proces-
sors. Dual core processors gained importance in 2006, and the quad-cores made
it to standard production in 2007. Experimental designs have been built with doz-
ens, and potentially hundreds of processor cores on a chip. These features are dis-
cussed in the section on parallel processing.
Figure 2.17
To assist buyers, Intel provides a measure of its own processors. The rating is an
index that measures relative performance. A processor with a rating of 200 would
generally be about twice as fast as a processor with a rating of 100. Of course,
your other devices also infuence the overall system speed, so just buying a faster
processor does not guarantee that your machine will run faster.
0
50
100
150
200
250
300
1
9
8
9
1
9
9
0
1
9
9
1
1
9
9
2
1
9
9
3
1
9
9
4
1
9
9
5
1
9
9
6
1
9
9
7
1
9
9
8
1
9
9
9
2
0
0
0
2
0
0
1
2
0
0
2
2
0
0
3
2
0
0
4
2
0
0
5
2
0
0
6
2
0
0
7
2
0
0
8
2
0
0
9
2
0
1
0
2
0
1
1
SysMark 2007 Intel Processor Performance
Multi-core
88 Chapter 2: Information Technology Foundations
Random Access Memory
As processor speed has improved, RAM has become a crucial factor in system
performance. Because disk drives are mechanical, they are the greatest bottleneck
in a computer system. Hence, modern operating systems try to hold as much data
as possible in RAM. Figure 2.18 shows that RAM price has dropped substantially
over the last decades. In relative terms, RAM is virtually free. For a couple hun-
dred dollars, you can easily buy enough RAM to hold several applications and
their data in RAM at one time. Operating systems, particularly Windows, take ad-
vantage of RAM to cache as much data and code as possible. Disk drives are no-
toriously slow, so system performance is dramatically improved by adding RAM.
High-speed RAM enables the processor to pull data from RAM faster, leading to
improved performance, but it is relatively more expensive.
Parallel Processors
In the past, when processors were more expensive, designers used only one pro-
cessor in a machine. Today, many computers contain multiple processors. Al-
though it can be a desirable feature, you must be careful when evaluating parallel-
processing machines. If a computer has four processors (or four cores), it is tempt-
ing to say that the machine is four times faster than a computer with only one
processor. Indeed, many computer companies advertise their computers this way.
Can a computer with four processors really do your job four times faster? The
answer is that it depends on your job. Consider an example. A computer with two
processors has to add two sets of numbers together. Each processor works on one
pair of numbers and fnishes in half the time of a single processor. Now, the same
two computers have to work the problem in Figure 2.19.
Notice that the second calculation depends on the outcome of the frst one. The
second one cannot be computed until the frst one is fnished. Even if we assign
one processor to each calculation, the parallel-processing machine will take just
as long as the single processor. On the other hand, if you commonly run multiple
Figure 2.18
RAM prices over time. RAM prices have dropped at exponential rates as
manufacturing processes have evolved, even as RAM speeds have increased.
0
50
100
150
200
250
300
350
400
2000 2005 2006 2007 2008 2009 2010
$
/
G
B
Cost of RAM
89 Chapter 2: Information Technology Foundations
Technology Toolbox: Voice Input
Problem: You are a slow typist or need to use your hands for other tasks.
Tools: A voice input system is built into Microsoft Offce. You need a decent micro-
phone to use it, and a headset microphone is recommended because it minimizes ex-
ternal noise. The system is relatively easy to set up, but it takes a half hour to train so
that it recognizes your voice. Remember that no voice system is perfect, so you will
still have to edit the text that it enters. You can fnd information on speech recogni-
tion in the Offce help system by searching on the speech key word.
You can install the speech recognition software within either Word or the Micro-
soft Windows Control Panel. Within Word, select Tools/Speech. From the Control
Panel, select Add/Remove Programs, fnd Offce and Change it. Use Add or Remove
Features and fnd the option to add Speech under the Alternative User Input. Once
the software is installed, you have to train it. Follow the installation instructions to
perform the basic training. To improve recognition accuracy, you should also take
the time to read at least one of the additional training documents. Once the system is
installed and trained, you can dictate text into an Offce document. Remember that
the system works better if you dictate complete sentences.
The voice toolbar enables you to turn the microphone off, so that you can speak to
someone else or cough. Notice that it also enables you to switch between Dictation
and Voice Command modes. The help system provides additional information about
command mode and the additional things that you can say to control the computer
with voice. For example, in Voice Command, you can say the word font followed
by the name of the font to change the font in use. You can also start other programs
and select items on the menu. The help documentation includes information on com-
mands you can use during dictation. Some of the common commands are in the
table.
Command Result
period or dot
comma
new line
new paragraph
open paren or parenthesis
close paren or parenthesis
force num, pause, digits
spel it or spelling mode
microphone
correct that
scratch that
go to top
move up
backspace
select word
.
,
enter key/new line
Enter twice
(
)
numbers (for several numbers in a row)
spell out a word
turn microphone on or of
change or delete the last phrase entered
delete the last phrase entered
move to top of the document (or use bottom)
move up one line (also accepts down, left, and right)
delete one character to the left
select a word (or use phrase with several options)
Quick Quiz: Use the help system to fnd the commands for the following:
1. !, ?, #, $
2. Make a word boldface or italic.
3. Print the current page.
90 Chapter 2: Information Technology Foundations
applications at the same time, multiple processors will improve performance be-
cause each processor can handle the applications separately.
Massively parallel machines can include thousands of processors. They are
used for some highly specialized applications. For example, governments use
them to break codes; physicists use them to simulate large-scale events such as
nuclear explosions and weather patterns; computer artists use them at special-ef-
fects studios, such as Industrial Light & Magic, to create movies. This concept has
been extended with the use of grid computing, where thousands or millions of
separate computers are assigned portions of a task. The search for extraterrestrial
intelligence (SETI) project is the most famous example using a grid approach.
Users are encouraged to download a small program that runs in the background
on the computer. The program retrieves portions of radio-astronomy data from
an Internet site and scans them looking for patterns. The millions of participating
computers provide a huge (free) resource to process data that could not be handled
by any other method. Using similar software, the grid concept can be applied to
business and scientifc applications. A company could use existing clerical com-
puters or, since personal computers are so inexpensive today, could buy hundreds
of machines and tie them together to handle large databases.
Todays computers take advantage of multiple processors in more subtle ways.
Most computers today utilize a separate graphics processor to draw items on the
screen. It is a sophisticated processor with its own RAM that handles complex
three-dimensional calculations. This additional processor is particularly important
for 3D graphics, such as those used in games. However, Windows Vista takes
advantage of the processor for all display chores and offoads the drawing tasks
to the graphics processorcreating faster graphics and enabling special effects
within applications.
Connections
Even if two computers have the same basic components, it is still possible for one
machine to be substantially faster than the other. The reason is that the compo-
nents need to exchange data with each other. This communication typically uses a
short-distance electrical connection. Most computers have special slots that form
the connection between add-on boards and the processor bus. Various manufac-
turers make boards that ft into these slots. The processor can exchange data with
these other devices, but it is constrained by the design of the bus. For example,
even if a processor can handle 64 bits of data at a time, the bus might not have the
connections to allow it to transfer that much data at a time. Standards enable users
to exchange cards and devices from one computer to another. The problem is that
a bus designed for todays computers will eventually become obsolete as the pro-
Figure 2.19
Some computations must be performed in sequence, so there is little to be gained
with multiple parallel processors. In this example, the second computation (yyy)
must wait for the frst one to fnish.
23 xx
+ 54 + 92
xx yyy
91 Chapter 2: Information Technology Foundations
cessor improves. At some point, the standards need to be changed. In the personal
computer market, standards for the bus have gradually evolved. For several years,
the industry has relied on an Intel-sponsored design known as the Personal Com-
puter Interconnect (PCI) bus. PCI was also designed to make it easier for users
to set up their computers. Over time, manufacturers have increased the transfer
speeds of PCI, but it is increasingly a limitation in computer performance.
External components also need to be connected to computers, such as thumb
drives, external disk drives, cameras, and video cameras. For example, the IEEE
1394 or frewire standard is commonly used to transfer data from video equipment,
but can also be used to connect disk drives to the computer. USB 2.0 is a similar
standard used to connect peripherals including disk drives and RAM drives. Fiber
channel and serial ATA are used to connect disk drives at high speeds. Ultra-wide-
band wireless (UWB) might eventually be used to connect devices at high speeds
without using cables. For example, you could tell your video camera to send the
signal to your television simply by setting it next to the TV and pushing a button.
Figure 2.20 shows the common connection methods available and their maximum
transfer rates. Be cautious with the transfer rate numbers. No system ever reaches
those numbers, but they do impose a speed limit. For example, hard disk drives
are limited by their write speed (perhaps 400 mbps), so a SATA 3 connection will
provide no improvement over a SATA II cable. But you would see better perfor-
mance if you connect that drive through USB 3.0 or eSATA than with USB 2.0.
With overhead transfer costs, USB 2.0 is probably restricting the data transfer.
The basic rule is that when you purchase newer, faster peripherals, you need to
connect them through faster cables. So do not expect to be happy connecting a
new high-speed device to a three-year old computer running USB 2.
Figure 2.20
Common methods to connect peripheral devices to computers. The max speed is
never achieved but it can reveal bottlenecks. Hard drive transfer rates are often
limited by drive write speeds. But the newer methods (SATA 3 and USB 3.0) will
improve the performance of large data transfersparticularly with large solid state
drives.
Method Max Speed Primary Purpose
PCI-e 2.0 x16 500 M Bytes/s * 16
64 G bits/sec
Connect peripherals, particularly graphics
cards
SATA II 3 G bits/sec Disk drives
SATA 3 6 G bits/sec Disk drives
Fibre Channel 20 G bits/sec Data center storage network
Firewire 2.0 800 M bits/sec Video, drives
HDMI 3.4 G bits/sec HDTV video
USB 2.0 480 M bits/sec External drives
USB 3.0 4.8 G bits/sec External devices
Intel
Thunderbolt
10 - 100 G bits/sec External devices
LAN/gigabit 1 G bits/sec Computers, drives
92 Chapter 2: Information Technology Foundations
Input
A variety of input devices are available because of the need to handle the many
data types. Hundreds of variations exist because of the challenges of adapting the
devices to human needs. People have different preferences and styles, so manu-
facturers are constantly improving their products. The purpose of an input device
is to convert data into electronic binary form. Keyboards are the most common
method of entering new text and data. Note that you can purchase different types
of keyboards to suit individual users. For example, some keyboards enable you to
change the layout of the keys. Keyboards have their own feel; some individuals
prefer sensitive keys requiring a light touch, while others like stiffer keys to sup-
port their hands.
Ergonomics is the study of how machines can be made to ft humans better.
One of the main conclusions of this research in the computer area is that individu-
als need to be able to adjust input (and output) devices to their own preference.
Forcing people to adapt to rigid devices can lead to complaints and even physical
injuries. Since the mid-1980s, some workers have encountered a disabling condi-
tion known as repetitive stress injury, which some people claim results from ex-
tended use of tools that do not physically match the worker.
Although there is limited scientifc study of these injuries and causes, some
people have found relief after ergonomic changes to their work environment.
Complaints typically involve back pain, eye strain, headaches, arm and shoulder
pain, and fnger or wrist pain due to carpal tunnel syndrome. Common ergonomic
suggestions include adjustable chairs, footrests, armrests, adjustable keyboards,
high-resolution low-ficker monitors, and improved lighting. Most of these adjust-
ments are relatively inexpensive today, but can add up if new chairs and desks are
needed for thousands of workers.
Reality Bytes: People Cant Memorize Computer Industry Acronyms
The computer industry lives on acronyms. Any time a new product is created, a new
acronym is developed so that everyone can use shorthand letters to refer to it. TLAs
(three-letter acronyms) are best, but sometimes they are longer. Actually, every in-
dustry uses acronyms to save time when communicatingbut the computer and net-
work industries change so quickly that they continually develop new products and
new acronyms. But, ordinary people have considerable diffculty memorizing the
acronyms. Read any computer ad and try to fgure out the specifcations if you do not
know the acronyms. Mike Molloy, USAF, Ret. and his wife, Susan Ebert, have come
to your rescue. They have created a Web site, www.AcronymFinder.com, that lists
any acronym you can imagine and the various interpretations. Many acronyms have
multiple defnitionsdepending on which industry or feld is using it. If you spend
hours a day writing text messages, you might think you are an expert on acronyms,
but remember that new ones are introduced every day. As a central source, where all
of the acronyms are validated by Mr. Molloy and his wife, the site can save you time
in your research.
Adapted from Barry Newman, BTW, if You Need Info About C4ISR, Read This
ASAP, The Wall Street Journal, January 13, 2007.
93 Chapter 2: Information Technology Foundations
Pointing Devices
With the increased use of graphics and pictures, it is common for computers to
use pointing devices for input. A mouse is the most popular device in use today,
although pressure-sensitive pens, touch screens, and digitizer tablets are heavily
used in some applications. Touch screens are commonly used for displays that
involve customers or other atypical computer users, but they are also common on
tablet PCs. Many tourist bureaus, hotels, and shopping areas use computer dis-
plays with touch screens to give directions to visitors. Besides the fngerprints, the
biggest problem with touch screens is that the tip of your fnger is often too large
to be a useful pointer. For more detailed use, an engineer who is designing a wir-
ing diagram for an automobile would use a digitizer tablet with a special pen to
draw fne lines and select individual points that are close together.
Scanners
When you are dealing with pictures, it is often helpful to have a scanner convert
a paper-based image into digital (bitmap) form. For certain types of images (line
drawings and text), vector tracing software can convert the bitmap image into vec-
tor form. Most digital cameras also have the ability to take photographs of paper
documents. The beneft of the camera approach is that the camera is much faster
at capturing the image. Some photocopiers use a similar process to enable workers
to scan documents and e-mail them to a computer.
The quality of a scanner is measured by the number of pixels per inch that it
can distinguish as well as the number of colors. Most scanners can read at least
600 dots per inch. More dots mean you get fner lines and sharper pictures.
Scanners also can be used to input text and data into a computer. The scanner
frst converts the page into a picture of dots. Then optical character recogni-
tion (OCR) software examines the picture and looks for text. The software checks
each line and deciphers one character at a time. Although OCR software is im-
proving, it is not 100 percent accurate. Some systems automatically look up each
word in a dictionary to spot conversion errors and improve accuracy. Even then,
users report about a 95 percent accuracy ratewhich is highly dependent on the
quality of the original document.
Digital cameras can also function as scanners. The principle is the samethe
camera has a sensor that captures individual pixels. Most cameras have a setting
optimized for taking pictures of black-and-white pages of text. It can be useful for
quick captures of a couple of pages, or for storing notes taken on a board.
Sound
Sound is initially captured with a microphone that converts sound pressure waves
into electrical signals. A sampler then converts these signals into numeric data that
can be stored on the computer. Musical synthesizer technology is used to con-
vert the numbers back to electrical signals that can be heard with speakers. Sound
boards can be purchased for personal computers that contain both the sampler
and synthesizer technology. Digital sound conversion occurs on almost every long
distance telephone call you make. Your voice is converted to 1s and 0s to be sent
across fber-optic telephone lines.
Speech Recognition
As long as computers have existed, individuals have dreamed of being able to talk
to them and have their words translated into text. Today, computers can digitize
94 Chapter 2: Information Technology Foundations
and record speech, and they can convert spoken words into computer text. Some
problems still exist, and the systems need to be trained to a specifc user. Common
problems include the use of homonyms, variations in speech patterns or dialects,
and the effects of punctuation on meaning.
Initially, speech recognition systems were adopted by occupations that require
note taking along with two hands to do the job. Quality control inspectors and
surgeons use them regularly. As performance continues to improve, we will see an
expanded use of speech recognition systems among all users. Ultimately, speech
recognition will be a key element in dealing with computers. Keyboards do not
work well in a wireless environment. They are too large to be portable and hard
to use.
Today, speech recognition is built into the Windows operating system. Speech
recognition generally requires you to train the system to recognize the way you
pronounce various words and phrases. If you enunciate clearly and learn to dictate
in complete sentences, speech recognition is relatively accurate. You can also use
voice commands to start applications and issue simple commands to the computer.
However, the industry still has a long path ahead for speech recognition to begin
replacing keyboards.
Video Capture
As technology improves, companies are increasingly adding video clips to pre-
sentations and Web sites. Digital video transmissions are also being used for com-
munication. Today, most television monitors can be used as computer monitors.
The HDMI connector that is common on HDTVs is becoming a standard way
of connecting video equipment, including computers. On the fip side, capturing
or displaying television signals on your computer requires additional hardware
specifcally a tuner or capture card. A common television digital video recorder
(DVR) is really just a computer with a capture card and a large hard drive. The
challenge is that the capture card has to be matched to the type of input: over-
the-air digital broadcast, cable-TV digital signal, satellite signal, or video camera
input. Throw in the complication that most digital broadcasts are encrypted, and
it becomes diffcult to build your own capture system. Interestingly, it is actually
Reality Bytes: People Really do Want Digital Content
For several years, book publishers have resisted shifting to digital books. Part of
the reason is because several early e-book readers were weak, had limited support,
and were not adopted by customers for those reasons. After Amazon introduced the
Kindle e-book reader, and then dropped prices with the second and third versions,
people began buying them in large numbersalthough Amazon does not report the
actual number of Kindle sales, which are estimated to be in the millions. Several oth-
er companies, including Apple through its iPhone and iPad apps also provide reading
devices for digital text. At the end of 2010, Amazon reported that it had sold 15 per-
cent more Kindle e-books than paperbacks. By the middle of 2011, Amazon reported
that sales of e-books exceeded the sales of all print books. And that is not counting
downloads of the free, public domain e-books.
Adapted from Matt Hamblen, Amazon.com Touts More e-Book Sales than Paper-
backs, Computerworld, January 28, 2011.
95 Chapter 2: Information Technology Foundations
easier to deal with over-the-air HDTV broadcasts in 2011. The quality is generally
good (often better than cable TV), the signal is not encrypted, and it is free.
Output
Most people are interested in two types of output: video and paper copy. Video
output is created by a video card and displayed on a monitor. Computer projec-
tion systems for meetings and presentations use high-intensity light to project an
image onto a screen. In addition to resolution, they are evaluated by the intensity
of the light, measured in lumens. Other display technologies have been developed
including heads-up displays for cars, personal projection systems that project an
image from special glasses, and electronic ink that displays text and images on
fexible displays.
The other common output device is the printer. Printers come in many differ-
ent forms. The most common formats are laser and ink jet, where the output is
created by printing dots on the page. Common resolutions include 600 dpi and
1200 dpi lasers. In contrast, standard typesetters, such as those that are used to
print books, operate at resolutions of at least 2,400 dots per inch. Again, higher-
resolution devices are more expensive. Also, the increased amount of data being
displayed takes longer to print (for the frst copy).
Laser printers operate much like photocopiers. In fact, newer copiers include
hardware to connect to a local network so the departmental copier can function
as a high-speed printer. From your desktop, you can tell the printer to make mul-
tiple copies and collate and staple themat speeds of over 70 pages per minute.
As noted in Figure 2.21, the initial cost is usually only a minor component of a
printers price. It is more important that you look at the cost per pageparticu-
larly for color copies.
Secondary Storage
Why are there secondary storage devices? Why not just store everything in high-
speed RAM? The main reason is that standard RAM is dynamicwhich means
that the data disappears when the power is turned off. The second reason is cost:
a terabyte hard drive costs less than $100. Even at todays relatively low prices,
the equivalent amount of RAM would cost several thousand dollars. On the oth-
er hand, because disk drives are mechanical, they are slow and can fail. Some
companies, notably Google, have invested in huge RAM drive storage. All of the
Figure 2.21
Printer evaluations. Printers are evaluated in terms of initial cost, cost per page,
resolution, and speed. There are many types of printers, led by laser, ink jets, and dot
matrix printers. Prices vary depending largely on speed and resolution. Technological
changes are leading to new varieties of printers that can produce full color at a cost of
around 5 to 10 cents per page.
Printer Initial Cost
(dollars)
Cost per Page
(cents)
Quality
(dots/inch)
Speed
(pages/min)
Laser: B&W 300 - 20,000 0.6 - 3 600 - 1200 4 - 8 - 17 - 150+
Laser: Color 500+ 5 - 75 600 - 1200 1 - 30
Ink jet 50 - 800 5 - 150 300 - 1200 1 - 20
96 Chapter 2: Information Technology Foundations
search indexes are stored in RAM, resulting in substantially faster searches in-
stead of relying on disk drives.
Hard disk drives are the most common method of secondary storage. The pri-
mary drawback to disk drives is that data transfer is limited by the physical need
to spin the disk and to move the read/write heads. Besides being slower, mechani-
cal processes are sensitive to movement and deteriorate faster than pure electron-
ic systems. Consequently, several manufacturers have developed static memory
chips that hold data for portable deviceslike Sonys memory stick. The USB
drives are a popular method for transporting data and have quickly replaced fop-
py disk drives.
A more recent variation is the solid state drive (SSD) which has even faster
read/write speeds and is packaged similar to a standard hard drive. In particular,
SSDs for laptops plug into the same slot as a standard hard drive. Todays USB
and SSD drives are as fast or faster than hard driveseven for write speeds. So,
the biggest problem is price. SSDs are roughly ffty times more expensive than
hard drives. But, this price difference has been declining, and as vendors focus on
improving the chips and the production capacities increasethese prices should
continue to drop.
Except for prices (declining) and capacity (increasing), typical hard drives have
changed little during the last few years. Secondary storage is needed to hold data
and programs for longer periods. Secondary storage is evaluated by three attri-
butes: capacity, speed, and price. Figure 2.22 shows the values for different types
of storage.
With the increasing importance of data, companies are searching for ways to
prevent loss of data by providing continuous backups. One straightforward meth-
od is to install an extra disk drive and keep duplicate copies of all fles on this mir-
ror drive. If something goes wrong with one of the drives, users simply switch
to the other drive. A second method of protecting data is known as a redundant
array of independent drives (RAID). Instead of containing one large drive, this
Figure 2.22
Secondary storage comparison. Hard drive prices and speed make them the best
choice for secondary storage. Tapes make good backup systems because of the cost
per gigabyte and 50-100 gigabyte storage per tape, but the sequential storage makes
it harder to retrieve data.
Drive Capacity
(gigabytes)
Speed
(Write MB/s)
Initial Cost
(dollars)
Cost/GB
(dollars)
Magnetic hard 80 - 3,000 60 - 200 65 - 200+ 0.07
SSD 16 - 512 60 - 320 200 - 900 1.76
USB drive 2 - 64 25 - 150 10 - 115 1.80
Tape 250 - 2,000 20 - 120 300 - 5,000+ 0.50-1.00
CD-ROM 0.70 2 - 8 50 0.18
DVD 4.77(8.5DL) 2 - 21 50 0.04
Blu-Ray 25 (50 DL) 4.5 - 36 80 0.12
Blu-Ray BDXL 128
97 Chapter 2: Information Technology Foundations
system consists of several smaller drives. Large fles are split into pieces stored on
several different physical drives. At the same time, the pieces can be duplicated
and stored in more than one location. In addition to the duplication, RAID sys-
tems provide faster access to the data, because each of the drives can be searching
through its part of the fle at the same time. Essentially, RAID drives use parallel
operations to dramatically improve the storage and retrieval of large documents.
On personal machines, even if you do not want to spend the money for a RAID
solution, it can be a good idea to buy two hard drives instead of one large drive.
Particularly for data-intensive applications like video editing, it is wise to put the
operating system and application software on one drive and place the data fles on
the second drive. Two drives are better than one because the computer can retrieve
the data simultaneously from both drives. In fact, video and large database appli-
cations often beneft from using three drives: one for the system, one for the main
data, and one to hold temporary fles. Putting everything on one drive forces the
computer to trade between tasks and wait for the single drive to spin to the proper
location.
Magnetic tapes are also used to store data. Their biggest drawback is that they
can only store and retrieve data sequentially. That means you have to search the
tape from the beginning to fnd any data. A single tape can hold 20 to 400 gi-
gabytes of data. Compression can double or triple the capacity of a single tape,
driving the cost per gigabyte from $0.50 down to $0.20 or lower. Because of these
two features, tapes are most commonly used to hold backup data. Just be careful
to store the tapes safely, and stay away from ultra low-cost drives that might fail.
With the increased use of images, sound, and video, there is a need for substan-
tially greater storage capacity for data fles. Optical disks have provided substan-
tial capacity at relatively low costs. The optical (or magneto-optical) disk drive
uses a laser light to read data stored on the disk. CD-ROM stands for compact
disk-read only memory, the format used to store music CDs. The ROM portion
of the name means that you can only read data from the disk. But, actual storage
depends on the type of blank disk and your CD burner. Standard disks can be writ-
ten once, or you can use rewritable disks. However, rewritable disks might not be
compatible with other systems. The biggest drawback is that saving data to a CD
is relatively slow. And, 700 megabytes does not go far these days.
The DVD (digital video disk or digital versatile disk) is a signifcantly better
technology. DVD was created to distribute digitized video. Compared to CD, the
strengths of DVD are (1) increased capacity, (2) signifcantly faster access speeds,
and (3) standards for audio, video, and computer data. A basic DVD holds 4.77
GB of data. However, the commercial DVDs for movies can hold as much as 8.5
GB of data by using an advanced writing technique (dual layer).
Blu-Ray is the most recent format created for storing high-defnition digital
video data. Sony, the leader in the Blu-Ray consortium, reports that a dual-layer
Blu-Ray disk can hold 50 GB of dataenough for about four hours of high-def-
inition video recording. You can also purchase Blu-Ray recorders. The burners
have dropped in price, but the blank disks are still expensive. Probably too expen-
sive to use as backup devices. But, the prices should drop over time and it would
be useful to be able to store 50 GB at a time on a backup disk.
Operating Systems
Why is the operating system so important? Computers follow instruc-
tions called software that are written by programmers. Every computer needs one
98 Chapter 2: Information Technology Foundations
special type of software known as the operating system. The operating system
(OS) is software that is responsible for communication among the hardware com-
ponents. The operating system is also a primary factor in determining how the
user deals with the machine.
As shown in Figure 2.23, the OS handles the interaction with other devices
through device drivers, which are small software programs that provide hooks
that are called by the OS to execute commands on the device. For example, a
printer driver provides a standard set of commands to the operating system, and
handles the details of drawing text and objects on the specifc printer. These soft-
ware drivers are routinely updated by the vendors to fx bugs and add new fea-
tures. The power of this approach is that any vendor can create a new device. By
creating an appropriate driver, even older computers can take advantage of the
new device.
Historically, each computer manufacturer created its own operating system tai-
lored for that specifc hardware. Proprietary operating systems caused many prob-
lems; in particular, changing vendors typically required purchasing new applica-
tion software. AT&T researchers began to solve this problem when they created
a hardware-independent operating system. It is known as UNIX and was designed
to work with computers from many different manufacturers. However, UNIX is
not a complete standard, and application software must generally be rewritten or
at least recompiled before it can function on different computers.
Today, fewer operating system choices exist. Personal computers generally run
a version of Microsoft Windows. The other main alternative is a variation of the
UNIX operating system. Several years ago, much of the UNIX code was essential-
ly released to the public (although a few lawsuits remain over exactly who owns
parts of the code). Linus Torvalds used the code to create an inexpensive and rela-
Figure 2.23
Operating system and device drivers. Every peripheral device uses device driver
software to connect to the operating system. The software uses defned interfaces to
transfer data and monitor status of the device.
Operating System
Device
driver Device
driver
Device
driver
Device
driver
99 Chapter 2: Information Technology Foundations
tively popular version for personal computers. His base versions are called Linux
and form the core of several open source systems. The Linux system is available
in several varieties for personal computers. It is also embedded in many devices
such as eBook readers. Apple computer also adopted the UNIX foundation with
its OS X operating system. Most midrange computers and many servers also run
an operating system derived from UNIX. Notably, IBM (AIX and Linux) focuses
on UNIX versions for its servers. IBM also continues to support some older, pro-
prietary operating systems. For servers and midrange systems, you still typically
use the operating system provided by the hardware manufacturer.
The battle over operating systems continues today. At least some portion of
Microsofts market strength is tied to its ownership and control of the desktop op-
erating system (Windows). The standardization of the operating system has made
it possible for vendors to create thousands of useful software applications. The
relatively open platform has encouraged the development of thousands of new
hardware devices that can be easily installed in millions of computers worldwide.
Yet the common operating system has also made it easier for hackers and viruses
to attack millions of machines. And many smaller companies are concerned about
the ability to compete against a company as frmly entrenched as Microsoft.
The operating system battle now extends into cell phoneswhich are essen-
tially small handheld computers. For years, cell phone manufacturers used their
own proprietary operating systems. As smart phones became more popular, the
operating system became more important and vendors began to choose among
a few standard versions. Apple phones use their iOS system; many other phones
use the Android operating system developed and maintained as open source by
Google. Microsoft also provides a Windows operating system for cell phones, and
some vendors (notably Blackberry) use their own systems.
To a user or manager the choice of an operating system is probably not impor-
tant. However, it does affect how you use the device, and it might limit the appli-
cations or software available for the device. In general, you pick a device based on
reliability, capabilities, and the availability of the software you want to use.
Computers in e-Business
How does the Internet change the role of computers? The Internet
and the Web changed computing and business in several ways. Beyond the issues
of connectivity, the key feature of the Web was the introduction and acceptance
of the browser. The reason the browser is so important is that it has become the
standard display mechanism. Increasingly, applications are being built that rely
Reality Bytes: Where Are You Going to Put Everything?
Most large corporations are reluctant to trust their data to anyone else. A survey of
247 Fortune 1000 frms by TheInfoPro in 2011 revealed that only 10 percent were
even considering the public cloud for even the lowest tier of data. Most companies
(73 percent) are relying on Fibre Channel storage area networks (SANs), even over
network-attached storage (NAS). Although companies are unwilling to trust data to
public cloud providers, they were willing to store data on private clouds.
Adapted from Lucas Mearian, Fortune 1000 Firms Shun Public Cloud Storage,
Computerworld, May 4, 2011.
100 Chapter 2: Information Technology Foundations
on the services of the browser. When the browser becomes the most important
display device, then nothing else matters. To emphasize the point, in 2011, Google
introduced an operating system for simple hardware that is based completely on
their Chrome browser. All operations are designed to work across the Web. Al-
though this approach might seem extreme to those used to working on traditional
PCs, it is similar in many respects to mobile computing on cell phones and tablet
computers.
A Web-based approach with a stripped down operating system has several po-
tential benefts. The hardware can be simpler and cheaper. The computer and start
up and shut down much faster. All data is automatically stored on central Web
servers, which provide backup and access from any location. Software is upgrad-
ed and replaced on the servers instead of each PC.
In terms of drawbacks, the most important one is that you need good access
to an Internet connection. Without the Internet, you might as well be carrying a
brick. You also rely on the serversboth in terms of uptime and maintenance and
in terms of pricing. Services that are free or low-cost today might suddenly be-
come expensive if the service providers decide to charge higher prices. Your data
is also no longer in your controlyou run slightly higher security risks in terms of
data transmission and data storage.
Many of these issues refect ongoing decisions between centralization and de-
centralization, which are covered in more detail in Chapter 12. In the past, the de-
cisions applied primarily within companies. The Web now makes them pertinent
to everyone.
What Is a Browser?
At heart, browsers are simply software display devices. They read incoming fles,
recognize the data type, and display the data as instructed. The data could be text,
images, sound, or even video. However, the sound and video are usually handled
Reality Bytes: How Safe is Your Data?
Check out an ad for a disk drive and you will see many specifcations. The mean
time between failure (MTBF) is an important one because it indicates the reliabil-
ity of the drive. Manufacturer data sheets often indicate MTBF between 1 and 1.5
million hours. However, a Carnegie Mellon study coauthored by Garth Gibson of
100,000 disk drives in data centers run by Google indicate that actual failure rates
are substantially higher. The posted MTBF numbers would indicate annual failure
rates of at most 0.88 percent. In reality, typically 2 to 4 percent of the drives failed,
with some systems having failure rates of 13 percent. Professor Gibson pointed out
that not all of the drives had actually failed. Sometimes it is diffcult to identify the
cause of a problem and drives are removed in the testing process. Vendors report that
as many as 50 percent of returned drives actually work fne. The dirty, hot, vibration-
prone environment of a data center is also harder on drives than a clean-room testing
center. Regardless of the failure rates, disk drives are mechanical so they are less
reliable than pure electronic equipment. Consequently, you must always assume that
a drive can fail and ensure that you have proper backups to recover your data.
Adapted from Robert L. Scheier, Disk Drive Failures 13 Times what Vendors Say,
Study Says, Computerworld, March 2 ,2007.
101 Chapter 2: Information Technology Foundations
Technology Toolbox: Creating Effective Charts
Problem: You need to create a chart that users can understand.
Tools: Spreadsheets contain powerful tools for creating charts; however, you must
be careful when using the tools to ensure that the features are used to make the chart
more informative and easier to read.
The frst step in creating a chart is to enter the data correctly and perform any
needed transformations. The second step is to choose the correct type of chart to
emphasize your message. The third step is to clean up the chart and make sure it
contains the proper title and labels. The table shows the main purpose for each chart
type and the common mistakes made by novices.
Chart Type Purpose Most Common Mistakes
Bar or
column
Showcategoryvalues. Too many series
Unreadable colors
Not zero-based
Pie Comparecategorypercentages. Too many observations/slices
Unreadable features/3-D
Poorly labeled
Line Showtrendsovertime. Too many series
Poor or missing legend
Not zero-based
Scatter Show relationship between two
variables.
Poor choice of variables
Not zero-based
One major mistake that is common to all chart types is to use excessive orna-
mentation. As Edward Tufte points out in his book The Visual Display of Quantita-
tive Information, graphing software offers many temptations that should be avoided.
Make sure every option you choose highlights the main purpose of the chart. Avoid
cluttering your graph with excess lines, images, or garish color schemes. The goal of
any design is to strive for elegance.
Creating a chart in Excel is straightforward. In this example, export the sales by
model by month from Rolling Thunder Bicycles. Open the generated spreadsheet
and select all of the data cells. Click the chart button and build the line chart. To sim-
plify the chart, remove the Hybrid and Tour models.
Quick Quiz: Create the following charts:
1. Use the export data form in Rolling Thunder Bicycles to generate sales by state.
Create a column chart and a pie chart for this data. Briefy explain why one chart
is better than the other.
2. Using Bureau of Labor Statistics data, plot the unemployment rate and the hour-
ly wage rate over three years.
0
100,000
200,000
300,000
400,000
500,000
600,000
700,000
800,000
900,000
1,000,000
1
9
9
4
-
0
1
1
9
9
4
-
0
8
1
9
9
5
-
0
3
1
9
9
5
-
1
0
1
9
9
6
-
0
5
1
9
9
6
-
1
2
1
9
9
7
-
0
7
1
9
9
8
-
0
2
1
9
9
8
-
0
9
1
9
9
9
-
0
4
1
9
9
9
-
1
1
2
0
0
0
-
0
6
2
0
0
1
-
0
1
2
0
0
1
-
0
8
2
0
0
2
-
0
3
2
0
0
2
-
1
0
2
0
0
3
-
0
5
2
0
0
3
-
1
2
2
0
0
4
-
0
7
2
0
0
5
-
0
2
2
0
0
5
-
0
9
2
0
0
6
-
0
4
2
0
0
6
-
1
1
2
0
0
7
-
0
6
2
0
0
8
-
0
1
2
0
0
8
-
0
8
2
0
0
9
-
0
3
2
0
0
9
-
1
0
2
0
1
0
-
0
5
2
0
1
0
-
1
2
2
0
1
1
-
0
7
Rolling Thunder Bicycle Sales
Mountain
Mountain full
Race
Road
102 Chapter 2: Information Technology Foundations
by an add-in component for the browser because standards are still evolving. To
add more interactivity, browsers also have an internal programming language (Ja-
vaScript). Developers can include program code that gives detailed instructions to
the browser and reacts to changes users make. For example, when users move the
cursor, the code can highlight an object on the browser. Browser code is also used
to check user data. This code runs entirely on the local machine, but can send data
in batches to the Web server.
The beauty of the browser approach is that it standardizes the way data is dis-
played, so that everyone is free to choose any hardware and software platform
they prefer. Since browsers are relatively easy to implement and do not require
huge amounts of hardware, they can be built into smaller, portable devices. Com-
bined with the wireless Internet possibilities, these new devices have the ability to
change the business world.
As technology and the Internet become more important in our lives and busi-
nesses, portability becomes increasingly critical. Even the portability offered by
laptops is useful. For example, you might need to pull up sales data in a meeting
or take some work home with you. In other cases, even more portability is needed.
Tablet PCs and PDAs provide the ability to access the Internet and your corporate
servers as long as you can fnd a network connection. Wireless connections are
available in many locations, but still have limited range. Newer cell phones offer
greater connectivity to the Internet from any major city or transportation area in
the world. As people demand greater continuous access to the Internet, portable
devices become more important. At the same time, the servers that store the data
and provide the major processing will also become more important.
What Is a Server?
Do you want to run a Web site? Being a participant in the Internet and running a
browser is one thing. Running a Web server is completely different. Establishing
an e-business requires that you either run a server or pay someone to run it for
you, so you should understand some of the main issues in Web servers.
Reality Bytes: GPU Processors Go High Performance
Gamers and other users of high-end graphics know that Nvidia is one of the largest
providers of high-powered graphics cards. The cards are based on a graphics process-
ing unit (GPU) architecture where each car contains many small high-speed proces-
sors. Although a high-end graphics card might appear to be expensive, on a per-GPU
basis, the costs if considerably lower than for traditional processors. Consequent-
ly, Nvidia also builds specialty cards for supercomputers that use thousands of the
GPUS to handle massively parallel computations. In 2011, a single TeslaM2090 card
could produce up to 665 Gigafops of computations. The M2090 has 512 Cuda
cores and GDDR5 memory cards. Transferring heat off the cards is a major design
consideration and the cards come complete with liquid-cooled heat sinks. The cards
support code written in common languages including C++, FORTRAN, Java, and
OpenCL. The M2090 can be plugged into relatively standard computers through an
arrangement with HP. Nvidia also sells plug-in modules for supercomputers, includ-
ing those from Cray Research.
Adapted from Jonathan Angel, Nvidia Taps GPUs for Worlds Fastest Parallel
Processing, WindowsForDevices.com, May 17, 2011.
103 Chapter 2: Information Technology Foundations
Technically, almost any reasonably up-to-date PC can function as a Web server.
A Web server is essentially a piece of software that monitors the full-time Internet
connection and delivers the requested pages. But to perform e-business tasks, the
server also needs to evaluate programmed Web code and interact with a database.
In most cases, the primary issue with Web servers is scalability, the ability to in-
crease the computing power without changing the application. The goal is to build
a server inexpensively enough to make the application proftable, yet capable of
expanding to handle increased demands of the future.
In terms of hardware, the primary characteristics that you want in a Web server
are (1) scalability, (2) easy backup, and (3) easy maintenance. One solution to
all of these problems is splitting the major computer components into separate
pieces. For example, server farms use multiple small computers instead of one
large machine. A storage area network (SAN) can be built using fber channel con-
nections to a set of external disk drives.
High-end servers have built-in backups for all critical components. For exam-
ple, they have dual power supplies, network cards, and hot-swappable disk drives
in a RAID confguration. If a power-supply or disk drive fails, the other copy au-
tomatically picks up the load. In most cases, the failed component can be replaced
without turning off the computer (hot-swapped). More sophisticated servers can
be built into server farms that contain multiple computers that distribute the com-
puting load and have access to the same databases. If one computer fails, the oth-
ers automatically handle the incoming tasks. More importantly, the system can be
scaled up by adding more computers.
Reality Bytes: International Notations
Most applications today have the ability to use characters that are not found in the
U.S. alphabet. For instance, in France or Mexico, you might need to use an acute
mark (). However, different software packages handle the characters differently, so
you might have trouble converting a document from one word processor to another
or to a different computer. For example, if a French subsidiary is using WordPerfect
and the Canadian headquarters is using Microsoft Word, they can both print reports
using the special characters. However, the document might change when the Cana-
dian users attempt to retrieve a French document electronically.
Furthermore, if you work for an international organization, remember that peo-
ple in different countries write dates differently. For example, 5/10/93 means May
10, 1993, in the United States but would be interpreted as October 5, 1993, in Eu-
rope. Most word processors enable you to choose how automatic dates should be
displayed.
Numbers are also handled differently in European nations. The use of commas (,)
and points (.) is reversed from the U.S. version where commas separate thousands
and the decimal point delineates the fractional component. (the number 126,843.57
in the United States should be denoted as 126.843,57 in Europe.)
You also need to be careful with currencies in spreadsheets. When you transfer
documents to other languages or fonts, be sure to check any currency symbols. A
few systems will automatically change the symbol to the local units (e.g., change $
to ), but unless the numbers are converted by exchange rates, these changes would
be incorrect.
104 Chapter 2: Information Technology Foundations
Virtual Machines
With multiple-core processors and tons of memory available, it is common prac-
tice today to set up computers as virtual machines. A virtual machine (VM) is the
process of running a separate computer in software on top of one set of hardware.
Generally, the process is used to run multiple virtual computers on a single set of
hardware. Basically, one physical set of hardware is confgured to run multiple
operating systems at the same time so it appears to be several separate computers.
Figure 2.24 illustrates the basic concept of a virtual machine. One physical com-
puter is used to host three separate computers. The hosted VMs are often servers,
but the technique can also be used for personal computers. The goal is to allocate
hardware resources to the VMs that need the additional computing power. The
technique can save money, space, and electrical power, by reducing the amount
of physical hardware. It is also useful for separating tasks. Some server software
can interfere with other tools and it is often easier to run them separately. VMs
also make it signifcantly easier to backup and restore the entire computer. Once
the VM is created, it is stored as a software fle on the disk drives. If anything
goes wrong, the fle can be reloaded and the entire VM is recreated immediately
without needing to reinstall the operating system and all of the applications. On
personal computers, the VM technique can be used for creating development and
test environments. One system could be used for day-to-day work, and another for
testing experimental software. If the experimental software causes problems, the
entire VM can be deleted with no effects on the production computer.
VMs can be useful, but keep in mind that you usually need separate software
licenses for each VMboth the operating system and the application software.
If the systems are based on open-source software, or the organization has a site
license these costs are minimal.
Application Software
What are the main software applications used in business? The
main reason for buying a computer is its application software. Regardless of your
job, you will always perform certain tasks. As a manager and decision maker, you
Figure 2.24
Virtual machine. One set of computer hardware is confgured to run multiple,
independent operating systems. Particularly useful for servers, the goal is to allocate
the hardware to the tasks that are busy.
One physical Computer
Multiple core processor
Shared Memory
Shared network
Allocated
disk
space
VM1: Windows Server
1 processor, 4 GB RAM
VM2: Linux Database Server
2 processors, 8 GB RAM
VM3: Windows PC
1 processor, 2 GB RAM
105 Chapter 2: Information Technology Foundations
frst have to gather data (research). Then you analyze the data and determine al-
ternatives (involving calculations). Next you will make decisions and implement
them (requiring writing, communication, and organizing resources). Each of these
tasks can be supported by computer resources. The trick is to use the appropriate
tools for each task. The objective is to use the tools to make you more productive
in your job.
The catch is that productivity is a slippery problem in businessespecially
with respect to computer tools. One measure of productivity involves effciency:
Can you perform tasks faster? A second, more complicated measure of productiv-
ity involves effectiveness: Can you make better decisions? Early uses of comput-
ers focused on improving effciency by automating manual tasks. The tools were
often justifed on the basis of decreased labor costs. Today, managerial uses often
focus on effectiveness, which is harder to measure.
An important concept to remember with application software is that it was cre-
ated by teams of designers and programmers. In the old days, when software
was custom-written for specifc companies and users, users could tell the design-
ers how the software should behave. Today, most companies rely on commercial
off-the-shelf (COTS) software that is created to support the needs of millions of
different users. In creating the software, designers had to make thousands of de-
cisions about what the software should do and how it should appear. Sometimes
their fnal choices might seem strange, and software does not always work the
way you might prefer. Some issues can be resolved by customizing the software
to your particular situation. Other times, just remember that you acquired the soft-
ware for a tiny fraction of the price you would have paid for custom software.
Research: Databases
Almost any job involves workers searching for information. This search could
involve any of the fve basic types of data. Computers have made it substantial-
ly easier to fnd, compare, and retrieve data. Two important strengths of a data-
base management system (DBMS) are the ease of sharing data and the ability to
search for data by any criteria. In terms of productivity, a DBMS can both make
you more effcient and improve your decisions. It improves effciency by provid-
ing easier and faster data retrieval. By providing more complete access to data, a
DBMS helps ensure that your decision incorporates all relevant data.
One complication with research is that you must frst determine where the in-
formation is located. It could be located on your personal computer, the groups
networked server, the companys central computers, a computer run by the gov-
ernment, or one purchased from another company. Unless all of these databases
are connected, you must frst determine which database to search. Chapter 5 fo-
cuses on the use of database management systems. Today, along with numbers
and text, DBMSs can handle large text fles, pictures, sound, and video. DBMSs
form the foundation of almost all business applications.
Today, almost all data in a company is stored in a DBMS, and the things that
are not stored in the DBMS really should be there. Even data outside the company
such as government data and data from suppliers is often stored in a DBMS. Re-
search typically involves fnding and retrieving the relevant data from a DBMS.
Analysis: Calculations
Almost everyone performs computations in a job. Spreadsheets were initially cre-
ated to overcome the limitations of simple calculators. They are useful for com-
106 Chapter 2: Information Technology Foundations
plex calculations and for creating charts. Most people fnd spreadsheets useful
because their disciplines began with models on paper that used columns and rows
of numbers. For instance, most accounting systems and fnancial models were de-
signed for ledgers in this way. Whenever software mimics the way you already
work, it is easier to learn.
Spreadsheets have many additional features. Graphs can be created with a cou-
ple of mouse clicks. Most packages enable users to modify the graphs by adding
text, arrows, and pictures. Spreadsheets also perform various statistical and math-
ematical analyses. You can perform basic matrix operations such as multiplication
and inversion. Statistics capabilities include multiple regression to examine the re-
lationships among different variables. Linear programming can be used to search
for optimum solutions to problems. These additional features are designed to help
you make better decisions by providing more powerful decision-evaluation tools.
The problem with spreadsheets is that people use them to store data. It is also
too easy to make mistakes on spreadsheets that are diffcult to spot. What often
happens is that someone develops a spreadsheet to analyze some data, then other
people use the spreadsheet and modify the data and formulas. Fairly quickly, there
Reality Bytes: Keyboards are Faster than Mice
Key Task
Ctrl-A Select all
Ctrl-C Copy
Ctrl-V Paste
Ctrl-P Print
Ctrl-S Save
Ctrl-X Cut
Ctrl-Z Undo
Alt Menu, then number or letter
Alt-Tab Switch application
Windows-# Start applications in taskbar
Windows-D Show desktop (and restore)
Windows-L Lock the computer
Windows-P Projector/switch display
Windows-R Run box
Ctrl-F4 Close document
Alt-F4 Close application
Ctrl-F6 Switch document within application
Shift-Select Click or arrow, select contigous items
Ctrl-Select Click, select multiple discrete items
Adapted from Patrick Miller, Windows Toolkit: 50 Super Software Secrets, Com-
puterworld, July 2, 2010.
107 Chapter 2: Information Technology Foundations
are multiple versions of the spreadsheet, out-of-date data, and errors in the calcu-
lations. And managers want to use these to make decisions. Yes, it is possible to
improve the way spreadsheets are built, and Chapters 3 and 8 show ways in which
spreadsheets can be shared. But, ultimately, spreadsheets are often better used as
short-term tools. They are useful if you need to analyze a small set of data or make
one-time calculations. Any decision that requires large, changing, data sets, mul-
tiple people, and critical analyses should be built as a specifc application. Chapter
9 examines some of the more powerful analytical tools available that can be used
for complex decisions.
Communication: Writing
The primary gain from word processing is increased effciency. Word processors
improve communication by making it easier to revise text, fnd writing errors,
and produce legible reports. Word processors today also include a spell-checker,
a thesaurus, and a grammar-checker. Although they are not the same as having a
human editor correct your writing, these are all useful tools for writers. Grammar-
checkers use standard measures to estimate the reading diffculty level of your
writing. For instance, if you write an employee policy manual, you want to make
sure that an average employee can understand it. Most word processors also have
outline tools that help you organize your thoughts and rearrange a document, im-
proving the communication.
The proliferation of word processors creates additional advantages. Today, all
documents should be electronic. It should be possible to search electronically for
existing reports, manuals, and so on.
Communication: Presentation and Graphics
In many cases, the difference between a good report and an outstanding report is
the presence and quality of the artwork. Graphs and pictures are used to commu-
nicate information and feelings. Charts and graphs are easy to create, store, and
modify using graphics software. Even if you are not an artist, you can buy clip art
that was created by someone else and use it in your reports or charts. By using ex-
isting art libraries, you can create reports and presentations in a few hours. In the
past, reports and presentations took days or weeks to fnish by a staff of artists. By
improving the appearance, a well-designed graphic can also improve communica-
tion and decision making.
To create or modify your artwork, you need a graphics package and an input
device such as a mouse that enables you to draw on the computer screen. Most
commercial artists use scanners so they can draw the original on paper and con-
vert it to computer form. The digitized form enables you to make very precise
changes, since you can zoom into a specifc area. Zooming is helpful if you need
to force lines to meet exactly or you want to make changes to small items, such as
eyelashes on a person.
Although you do not have to be an artist to incorporate artwork into your re-
ports and documents, you do need an element of artistic sensibility. The goal is
to use art to enhance your presentation, not clutter it. Knowing what looks good
and using restraint are signs of artistic talent. Remember that faster does not al-
ways mean better. Use some of the time savings to put more thought into your
presentations.
108 Chapter 2: Information Technology Foundations
Communication: Voice and Mail
All jobs require communicationwith coworkers, managers, and customers or
clients. Word processors help with reports and memos, but much of our commu-
nication is less formal. Everyone is familiar with answering machines for tele-
phones. Businesses have taken this concept a step further by using voice mail
systems. Voice mail systems record messages much like an answering machine,
but they store the messages in digital form on computers. They usually give the
caller control over where the message is sent. Most people in the United States
have dealt with systems that direct you to press buttons on the telephone to make
choices. Some voice mail systems enable you to send the same message to several
people. Some systems also enable you to skip messages or fast-forward to the end.
Many are now tied to e-mail systems so your messages can be integrated into a
single site. This process also makes it easier for companies to back up fles and
store data for later use. In particular, e-discovery systems can be used to archive
all message data for easy search and retrieval during a lawsuit.
Networked computers can be used to send messages directly to other users.
These electronic mail (e-mail) systems are typically used to send written notices
to various people. They can be used to send pictures, facsimiles (faxes), or even
voice messages if the computers have sound boards and speakers. Instant mes-
saging (IM) is also relatively popularoften in the form of text messages sent by
cell phone. It is nice to have several options for communication. The challenge is
to choose the appropriate method for each conversation and each person. Some
people prefer the immediate response of voice communication, others prefer the
asynchronous nature of e-mail, so they can schedule communications around their
work.
The basic problem with any communication system is that sooner or later it
becomes cluttered with junk mail. One of the advantages of text e-mail is that the
recipient can have the computer scan the messages to search for items that are im-
portant or interesting. With the appropriate mail flters, junk mail can be discarded
automatically. Messages also can be retrieved and stored for future reference or
forwarded to other people.
Organizing Resources: Calendars and Schedules
An important task of managers is to organize company resources so that they are
used most effectively. An important function is scheduling workers. Schedules in-
volving line workers entail making sure that there are enough employees to get
the job done, but no extra employees. Schedules involving managers typically in-
volve meetings and require trade-offs between competing demands for a manag-
ers time. Several software tools are available to improve both types of scheduling
and make more effcient use of the human resources.
Most managers spend a considerable amount of time in meetings. In fact, it
becomes diffcult to keep track of appointments, set up new meetings, and re-
schedule meetings. The process is even more diffcult when some participants
are traveling or are based in another city or country. Several software packages
store appointments and schedules on electronic calendars. Electronic calendar and
scheduling software enables data to be shared with other people. For instance,
each person in a department would use the electronic calendar to keep track of his
or her personal, departmental, and corporate appointments. To schedule a meeting
with departmental members, the manager selects an approximate time, specifes
the priority of the meeting, and flls in the participants, location, and subject infor-
109 Chapter 2: Information Technology Foundations
mation. The calendar software then searches each personal calendar for the best
time for the meeting. It overrides lower-priority meetings and places the complete
notice on each persons calendar in a matter of seconds. Employees have to check
their calendars periodically to see whether meetings have been added or changed.
Augmented Reality
Augmented reality is a specialized tool is useful in some business operations.
So far, it has minimal uses in management, and the applications are still evolv-
ing. Augmented reality consists of overlaying computer-retrieved data on top of
images of real-world items. One of the more useful applications was developed
several years ago for mechanics working on highly-complex engines, such as jet
engines for the military. Workers with special glasses would look at engine com-
ponents and the computer would display an overlay of the schematics and the
part numbers. The part numbers enabled the mechanic to easily order the correct
replacement item for worn parts.
Today, people are more familiar with examples of cell phones, where the com-
puter (phone) overlays information on images taken through the phones cam-
era. The technique combines location data with image recognition and retrieves
matching data from online databases. A variation that has been proposed is to add
facial recognition software and tag images with peoples names. It might be useful
for executives who meet hundreds of people a day, enabling them to add a per-
sonal touch by talking to people by name and retrieving background information.
Or, the technology might lead to creepy versions of stalking.
Figure 2.25
Paper (and paperboard) consumption appears to be declining in the U.S. and
possibly in the world as well. As video screens improve and people become more
adept at handling data online, there should be less need for paper. Raw data: UN
Food and Agriculture Organization, http://faostat.fao.org/site/626/DesktopDefault.
aspx?PageID=626.
0
2
4
6
8
10
12
14
16
18
Paper Consumption: Kg/Person/Year
World
USA
110 Chapter 2: Information Technology Foundations
Te Paperless Ofce?
You might think that with increased use of electronic data, there would be less
need for paper. For many years, the opposite was true. People tended to waste
paper when they knew they could easily reprint a report. However, as display de-
vices have improved, and people have become better at adjusting to electronic
screens, it appears that the use of paper is decreasingat least in some countries.
Figure 2.25 uses UN data to show consumption of paper per person per year in the
U.S. and the world. The world fgures show a slight decline, but the drop for the
U.S. is relatively strong over the last decade.
Some issues exist with long-term storage of electronic data. In terms of paper,
libraries have stored books for hundreds of years. It is not clear that electronic
data can survive even a few decades. First, the data might not physically last that
long. Magnetic drives, Tapes, and even CDs and DVDs might lose their data over
time. There are also unresolved issues about future compatibility. The hardware
and software to read them may disappear in a short time.
Open Software
It is diffcult and time consuming to create software. Commercial vendors spend
billions of dollars researching customer needs, developing software, and updating
and revising the code. For a few decades, major software development has been
performed by large corporations that hire thousands of programmers and sell the
software for a proft. Microsoft alone spends over $6 billion a year on research
and development. On the other hand, the marginal cost of a software product is
almost zero. Almost all of the expenses are front-end fxed costs, except for mar-
keting, distribution, and dealing with customers.
In the past few years, led by visionaries such as Richard Stallman with GNU
and Linus Torvalds with Linux, a new approach to software development has
arisen. Complex programs have been created by using the volunteer talents of
thousands of programmers around the world. The result is software specifcally
developed to be distributed free of charge for anyone to use. The operating system
Linux is a popular example, but several application packages exist as well.
As a manager, you will eventually have to answer the question of whether you
should use open-source software or continue to rely on commercial packages. The
answers are diffcult, and discussions are often tinged with religious fervor. Al-
though free seems like a good price, how much do you really pay for software?
Today, the Windows operating system price is largely embedded in the cost of
buying a new computer. On the other hand, more expensive packages such as the
Offce suite, graphics editor, or database management system can represent large
sums of money.
Other issues in open-source software remain unresolved. Often, the open-
source packages have minimal support and can be harder to use. Certainly, nov-
ices fnd the Linux/UNIX operating system diffcult to learn. Issues about security
are unresolved. With thousands of programmers working on millions of lines of
code, it might be possible for someone to sneak in a tiny, but nasty, routine. On the
other hand, with thousands of people looking through the code, the problem might
be caught early. You also need to consider whether the open-source programs will
be around for a long period of time. With no real income stream, can they survive?
Will the leaders remain in charge? These are important questions to ask any soft-
ware vendor. But the risks are slightly higher with open-source programs. On the
other hand, you do get copies of the source code, so in theory, you could edit and
111 Chapter 2: Information Technology Foundations
maintain the software indefnitely by yourself. But how many managers or com-
panies have that ability?
In the end, the choice of software comes down to the features and the cost of
support. Commercial software is generally supported and updated with the costs
covered by the initial purchase price, and sometimes annual license fees. With
software such as Microsoft Offce, millions of people use the software and gener-
ally need minimal training. Open-source software usually has no up-front cost,
but often carries annual costs for help, installation, and sometimes updates. Sever-
al companies, such as Red Hat and Oracle, make money selling support for open-
source software.
Cloud Computing
Is it possible to handle all computing tasks with online servic-
es? When computers were frst invented, they were large, expensive, and needed
large numbers of support personnel. Consequently, all applications and data were
run in a single location. Eventually, slow networks were created and display ter-
minals were installed in various locations in a company. These terminals were
basically keyboards with simple text displays but they enabled people to work
on computer applications from their offces. All of the data and applications re-
mained on the central computer. As minicomputers and personal computers were
developed, computer applications and data moved outside the central computer.
Figure 2.26
Spreadsheet in Google Docs. http://docs.google.com. Google Docs is a cloud service
that is free for individuals or $50/user/year for companies that need more services.
You can create documents, spreadsheets, presentations, and drawings. The features
are limited compared to standard Microsoft Offce products but can be created using
only Web browsers and are easy to share.
112 Chapter 2: Information Technology Foundations
Gradually, computers got smaller and more powerful. At the same time, network
speeds increased dramatically, making it possible to connect handheld devices at
high speeds from almost anywhere in the world. These networks are explored in
Chapter 3 and the consequences of data management are covered in Chapter 13.
But, the key for this chapter is that these capabilities exist now, which provide a
method to change the way people use computers. Today, central Web servers can
hold all of the data and run applications, while users access them through power-
ful, but relatively inexpensive portable devices such as cell phones, tablets, and
laptops.
Cloud computing is the popular term for storing applications and data on Web
servers. The Internet is sometimes referred to as a cloud (and drawn that way) be-
cause the servers are interconnected and it does not matter where they are located.
Often, cloud computing costs are based on variable prices with low or no fxed
costs. Sometimes costs are low enough to be supported by advertising revenue
so services are provided free to users. Most people are familiar with the social
network services (Facebook, YouTube, and Twitter), as well as the search engine
services (Google, Bing), and other specifc applications such as photo sharing and
editing sites (Picasa, Flickr, Photoshop). Thousands of cloud computing applica-
tions and sites exist and it seems that more are being created every day.
Figure 2.27
Spreadsheet in Microsoft Web Apps. http://offce.microsoft.com/en-us/web-apps. The
user interface is similar to the standalone Offce tools with slightly fewer features.
It is easy to upload and download documents to the standalone version and easy to
share with other users. Online documents can be created and edited in a browser even
on cell phones and tablets.
113 Chapter 2: Information Technology Foundations
Think about cell phones and tablets for a second. For the most part, these de-
vices use special-purpose operating systems (often Apple iOS or Google An-
droid). These systems were not designed to run the commonly used business tools
such as word processors, spreadsheets, and presentation software. But, do you re-
ally want them to run that software? And if they do, where are you going to store
all of the data? Instead, it makes more sense to use the devices to display the
applications, but leave the applications and data on a Web server. The two main
cloud computing sites that provide these services are Google Docs and Microsoft
Web Apps. Figure 2.26 and Figure 2.27 show a simple spreadsheet created on
the Google and Microsoft services. The Microsoft applications are similar to the
standalone Offce applications, and it is easy to transfer the documents between
the Web and standalone software. Both Google and Microsoft provide free access
for individualsbut the advertising can be distracting. Google also sells a version
for businesses that integrate a few additional features (such as a shared calendar)
and eliminates the advertising for $50 per user per year. With both the Google
and Microsoft cloud services, documents can be created and edited using a basic
browser, so they can be accessed by relatively simple devices include cell phones
and tablets. But, most people would fnd it tiring to write a long document on a
touch-screen keypad, so it would be useful to have a separate keyboard in many
cases.
One of the strengths of cloud computing is the ability to share documents with
other people. As long as the people sign up on the same service, it is straightfor-
ward to give them access to your documentsto view or even edit the document.
Generally, the cloud providers handle backups and keep the servers running with
high reliability. However, cases exist where documents have been lost. On the oth-
er hand, many other companies provide storage space online, so it should be pos-
sible to make your own backup copies using multiple storage or e-mail services.
So, is it possible to run most common applications online using cell phones and
tablets? Possibly; but it would be tiring to create large documents with a touch-
screen keyboard. Most people would fnd it easier to type using a separate key-
board. Still, the main documents could be created using a laptop or perhaps a
tablet, then they will be available for viewing and small edits using a cell phone.
Summary
One of the original purposes of computers was to make it easier to perform basic
tasks. Over time, as computers have become more powerful, they have come to
support increasingly complex tasks. Today, in addition to increasing effciency,
computers can help you make better decisions. One major change is in the type
of data routinely processed. The fve major types of data are numbers, text, imag-
es, sound, and video. To handle more sophisticated data and more diffcult tasks,
computer hardware and software have grown increasingly complex.
To choose a computer that best meets your needs, you must evaluate the four
basic hardware components: input, processor, output, and secondary storage de-
vices. Each component is measured by slightly different characteristics. Input de-
vices are selected based on the specifc task (such as a keyboard for typing, mouse
for pointing, or a microphone for voice input). Processors are often selected based
on speed and price. Output device quality is appraised by resolution and color
capabilities as well as initial and ongoing costs. Secondary storage is evaluated
based on speed, capacity, and price.
114 Chapter 2: Information Technology Foundations
Application software is the primary source of improved productivity. Packages
exist to assist in research, analysis, communication, and organizing resources. Da-
tabase management systems are used for research and data sharing. Spreadsheets
and other analytical tools assist in calculations. Word processors, drawing pack-
ages, voice mail, and e-mail are used for communication. Electronic calendars and
scheduling software are used to help organize human resources.
With the presence of global high-speed networks, it is now possible to store
most applications and data using cloud computing on the Internet. Companies and
individuals now have the choice of carrying smaller, simpler display devices that
access everything stored on Web servers. Some limitations exist today, and cost,
security, and reliability questions remain but this approach can simplify the man-
agement of fundamental computing.
Key Words
aspect ratio
augmented reality
binary data
bitmap image
byte
cache memory
CD-ROM
clip art
cloud computing
CMYK
commercial off-the-shelf (COTS)
device drivers
dots per inch (dpi)
DVD
e-discovery
electronic mail (e-mail)
ergonomics
grid computing
hardware
high-defnition TV (HDTV)
icons
input
instant messaging (IM)
megabytes
milliseconds
motherboard
nanoseconds
operating system (OS)
optical character recognition (OCR)
output
pixels
processor
random access memory (RAM)
redundant array of inde-
pendent drives (RAID)
resolution
RGB
scalability
software
solid state drive (SSD)
style sheets
synthesizer
templates
Unicode
vector images
virtual machine (VM)
voice mail
A Managers View
Technology constantly changes. New features are added every day to hard-
ware and software. How do you know which features to buy and which to
ignore? The key is to evaluate the features of the main components and to
understand how you will use the computer. Given the declining prices of
processors, RAM, and secondary storage, it is relatively easy to buy a rea-
sonable computer today for most common business applications. When you
get to issues of portability or Web servers, you need to evaluate the choices
more carefully.
115 Chapter 2: Information Technology Foundations
Web Site References
Free News Sources
Associated Press www.ap.org
CNN www.cnn.com
ESPN espn.go.com
Fox News www.foxnews.com
Internet News www.internetnews.com
MSNBC www.msnbc.msn.com
News.com www.news.com
News Map newsmap.jp
USA Today www.usatoday.com
United Press International www.upi.com
Wired www.wired.com
ZDNet www.zdnet.com
Almost any Magazine or Newspaper (some charge)
Fortune www.fortune.com
Te Economist www.economist.com
Wall Street Journal wsj.com
Washington Post www.washingtonpost.com
Review Questions
1. List and describe the fve basic types of data.
2. What are the two main color models? What are the color codes for yellow
and green in each of the models?
3. What is lossy data compression and why does it create smaller fles?
4. What are the primary hardware components in a computer?
5. How do you know which components to upgrade to improve your computers
performance?
6. Why are style sheets important for large documents and Web sites?
7. Why are SSDs better than traditional hard drives? What are the drawbacks?
8. What are the advantages and drawbacks to using removable disk drives as
backup devices?
9. How does the operating system defne the way a computer works?
10. How does the use of Web browsers change the way applications operate?
11. How does a virtual machine reduce the costs of large server farms?
12. Briefy describe fve tasks you expect to perform in your job as a manager
and list the application tool you will use.
13. What will it take for people to adopt a paperless offce?
116 Chapter 2: Information Technology Foundations
Exercises
1. What are the current best prices of disk drives ($/GB) and RAM ($/GB)?
How much does it cost for the fastest processor you can fnd (not counting
exotic supercomputers)?
2. Using a common Web site or retail store, fnd the price of a mid-level laptop.
List the primary specifcations. Identify the cost of doubling the amount
of RAM on the laptop at the time of purchase. Use a discount Web site
to compare the price of purchasing the RAM separately and installing it
yourself.
3. Find or create a color chart that identifes and displays at least the 27 primary
colors for the RGB color model. Use three levels (0, mid, max) for each of
the three colors.
4. Find a high-resolution digital photograph. Using photo editing software,
save several copies of the photo in JPEG format with different levels of
compression. At what point do you begin to notice the photograph quality
degrade? Compare the fle sizes as well. Print the photo (a black and white
print is fne) and compare the results to the original.
5. What is the highest capacity common SSD available? What is a typical price?
How fast is the write speed?
6. How much would it cost to purchase the current release of Microsoft Offce
for a group of 10 people? How much would it cost to use similar software
from an online provider? What are the drawbacks to going with an online
provider?
7. Estimate the storage space (number of bytes) required for each of the
following items:
a. A textbook of 700 pages. Create two single-spaced pages with a small
PowerPoint drawing on one page. Convert it to PDF format and estimate
the size. Compare this number to other sources.
b. A full-color image from a 7-megapixel camera. Both in raw form (TIFF)
and an estimate of the size in high-quality JPEG format.
c. A 15-minute lecture recorded with the PC audio recorder. Make and
save a 30-second recording and use the fle size to estimate a 15-minute
recording.
d. If you wanted to store your favorite half-hour television show in digital
form, how many bytes of storage would it take? Extra credit: How much
space would it take if you remove the commercials? (Hint: Time the
commercials.) How much space would it take in HDTV format?
e. A Unicode document of about three pages of single-spaced text.
8. You have a photo from a 7-megapixel camera at 3072 x 2034 pixels. Your
image editing software defaults to 72 pixels per inch, and claims the image is
42.667 x 32 inches. You want to convert to a standard 10-inch wide photo but
keep the aspect ratio. You need to fnd a new resolution that sets the proper
dpi and the height.
117 Chapter 2: Information Technology Foundations
9. Use research to determine the percent of computers running the Linux
operating system.
10. Operating systems defne drive space in terms of binary numbers where
1024 = 1 kilobyte, and 1 gigabyte is 1024*1024*1024. But disk drive
manufacturers advertise storage space in decimal values, using 1,000 instead
of 1,024. If you buy a drive advertised as 200 GB, how many bytes will the
operating system recognize on it?
11. Identify at least two competitors to Microsoft Offce software and fnd
reviews from people who have used them to comment on their viability for
business use.
Technology Toolbox: Speech Recognition
12. Set up speech recognition on your computer and train it. Choose a paragraph
of text and dictate it into Word. Do not make corrections to the text as
you dictate it. When you have fnished, copy the paragraph and make the
corrections to the copy. Count the number of mistakes and hand in both
paragraphs.
13. Do a quick survey of other students (not in the class) to fnd out how many
have used speech input. Of the ones who have tested it, how many use it on a
regular basis? Report the results and comment on the low usage rates.
14. How are the speech recognition systems used in other devices, such as cell
phones, different from those used in basic personal computers?
Technology Toolbox: Charts
15. Identify the best chart to use for the following datasets, and give a brief
justifcation for your choice:
a. Sales by department for the last fve years.
b. Sales by employee for the last month.
c. Production data for output quality and percent of carbon.
d. Share of sales to fve nations.
e. Total customer billings by employee for the last 24 months.
16. Find at least two data series from the government (try www.fedstats.gov)
and plot them. Briefy explain any patterns or trends.
17. Enter the following sales data into a spreadsheet. Create two charts, one
showing total sales over time and one showing the changing percentage sales
over time by product type. Briefy comment on the two charts and describe
the difference in the information content.
Year Soft Goods Hard Goods Movies
2007 425 632 265
2008 531 789 378
2009 618 865 425
2010 692 897 581
2011 753 933 792
2012 829 989 882
118 Chapter 2: Information Technology Foundations
Technology Toolbox: Spreadsheets
18. A company is evaluating the purchase of a machine that costs $50,000. The
company will have to pay money each year for maintenance costs. However,
the machine will increase profts by several thousand dollars each year. Enter
cost and proft data into a spreadsheet. Since the costs and profts occur over
time, you have to discount them to a single point in time. Use the net present
value (NPV) function to compute the present value of the costs and profts.
Initially, assume the discount rate is 4 percent, but build the spreadsheet so
managers can change the value easily. Use the Goal Seek tool to fnd the
discount rate at which the investment breaks even. That is, search for the
discount rate that sets the computed net value (net profts-net costs) to zero.
Year Cost Proft
2008 -50,000 10,000
2009 -2,000 12,000
2010 -2,000 13,000
2011 -2,000 14,000
2012 -5,000 15,000
19. Create a new spreadsheet for a company that has sales of two products (shoes
and hats) in two regions (East and West). Put data for the East division in one
worksheet and data for the West division in a separate worksheet. Create a
third worksheet to display the totals of the two divisions. Chart the changes
over time.
Year Shoes Hats
2008 456 110
2009 571 98
2010 632 87
2011 771 69
2012 780 120
East
Year Shoes Hats
2008 1024 234
2009 1305 198
2010 1525 178
2011 1598 165
2012 1652 208
West
Year East West Total
2008
2009
2010
2011
2012
Total
20. You need to evaluate your employees. You have a list of their performance
on four tasksmeasured in terms of time. The time is the number of minutes
they fnished behind the fastest person. So smaller numbers represent better
performance. Two of the employees were injured at different points and did
not complete all of the tasks. Enter the data into a spreadsheet and analyze it
by computing the mean and standard deviation for each stage. Then compute
four new columns that contain the individual Z-score for each employee in
each stage: Zi = (Xi average)/Std Dev. Compute the average Z-score for
each person and rank them. Remember that smaller (negative) numbers are
better. Chart the fnal averages. One extra credit point if you can identify the
employees.
119 Chapter 2: Information Technology Foundations
Employee S0 S3 S5 Sf
Basso 0.23 3.05 1.05 7.23
Cruz 0.53 14.85 3.13 31.80
Danielson 0.17 9.92 1.33 11.50
Davis 0.32
Hincapie 0.13 3.05 0.67
Leipheimer 0.00 0.00 0.00 0.00
McCartney 0.32 0.07 0.42 0.90
Vandborg 0.30 14.85 3.03 25.30
Teamwork
21. Compare your cell phones. Build an Excel table and compare them based
on screen resolution and camera resolution. Indicate if the phone has speech
recognition and rate how well it works (on your own phone). What data entry
methods are supported? How well does the Web browser work (if it has one)?
22. Each person should research a current version of a tablet computer and write
a short list of its strengths and weaknesses. The group should choose one
tablet that could be used by business managers, and list the main tasks for
which it would be useful.
23. Find a good quality photograph or take one yourself. Have one person
save the photograph to at least three copies using different levels of JPEG
compression. Hint: Adobe Photoshop gives complete control, but if it is
not available, use Microsoft Picture Manager or try an online site such as
imageoptimizer.net. Have each team member look at the compressed photos
and try to rank them from highest-to-lowest quality. Compare the rankings
with the actual order. What do the results tell you about how you should store
and display photographs?
24. Have each person on the team fnd an example of a good chart and a bad
chart using newspapers and the Internet. Combine the results from each
person into a document so that each person can vote on the best and worst
charts.
25. Set up free accounts on one of the online application sites (such as Google).
Create a short document to describe a recent movie or television show. Have
each person add a couple of lines of comments about the movie. When
fnished, comment on the benefts and drawbacks of using the online system
to write documents versus the traditional method of using separate copies and
e-mailing them.
120 Chapter 2: Information Technology Foundations
Rolling Thunder Database
26. Using the Export Data form, copy the data to a spreadsheet and create graphs
for the following situations. (Choose the type of graph you feel is best suited
to present the data.)
a. Sales by model type.
b. Sales by month.
c. Sales by model type for each month.
d. Sales by state.
e. Sales by employee by month.
27. Using the existing forms, enter data for a new bicycle order.
28. Find at least two other bicycles (e.g., on the Internet or from a dealer). Create
a spreadsheet comparing the features and costs with a similar bicycle built by
Rolling Thunder Bicycles.
29. Using the Export Data form, copy the data to a spreadsheet and compute
the average proft margin for each type of bicycle for one different year.
Comment on any differences that you fnd.
30. Assume you have to give a presentation to the marketing manager. Create a
slide show to compare the sales of each model type for the last two years.
Additional Reading
Adams, S., R. Rosemier, and P. Sleeman Readable Letter Size and Visibility for
Overhead Projection Transparencies, AV Communication Review, 1965, 412-
417. [An early discussion of creating good presentations.]
Science: The Numbers Game, Time, February 20, 1988, p 54-58. [Short history
of computers.]
Simonds, D. and L. Reynolds, Computer Presentation of Data in Science: A Do It
Yourself Guide, Boston: Kluwer Academic, 1989. [Ideas for presentations.]
121 Chapter 2: Information Technology Foundations
Cases: Te Computer Industry
Te Industry
How often should you replace a personal computer? Hardware and software are
continually changing. To run new software and take advantage of new peripher-
als such as Blu-Ray players or high-speed drives, you often need to purchase new
computers. Typically, personal computers are replaced after three years. Yet frms
can often delay purchasing new computers in a weak economyto save money.
All of these decisions affect the industry, and overall sales can skyrocket one year
and die down the next. The industry is also driven by brutal competition. Between
Dells quest for low prices and effcient production, and relentless price cuts by
Chinese, Taiwanese, and Korean manufacturers, PCs have largely become com-
modity items.
Where do you buy PCs? Some people like to physically see the items they
buy and be able to take them home immediately. So there is some incentive to
sell computers in retail stores. But remember that PCs have a limited shelf life.
A model can become obsolete in a few weeks, and its value can drop in a matter
of days. How can a retailer stock items when they depreciate so quickly? Stores
can try to forecast demand, but if the economy drops, people may stop buying and
the store will be stuck with obsolete computers. Yet selling strictly by mail order
means that a manufacturer might miss out on sales to a relatively large market.
These conficts have caused considerable grief to computer frms over the last
few years. Dell, the leading mail-order/Internet vendor, at one time tried retail
sales and gave up. Gateway tried to ride the middle line by running its own retail
stores. It, too, lost money and closed the stores. Apple has opened retail stores
and been relatively successful. But Apples target has largely been consumer, not
0
20
40
60
80
100
120
140
1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010
$
B
i
l
l
i
o
n
Annual Revenue
HP
IBM
Dell
Apple
Sun
Acer
Lenovo
-5
0
5
10
15
20
1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010
R
a
t
o
Net Income / Revenue
HP
IBM
Dell
Apple
Sun
Acer
Lenovo
122 Chapter 2: Information Technology Foundations
businesses. As HP as increased sales through stores such as Best Buy, Dell has
countered by offering a few models through Wal-Mart.
After several years of dismal growth, demand for personal computers increased
in 2003 and 2004. PC unit shipments in both the second and third quarters of 2003
were higher than expected. Consumer buying remained strong, and a transition
from desktop computers to notebooks has helped to fuel growth in the category.
As the average age of the existing machines increased, companies began replacing
their computers. Aggressive price competition is a signifcant factor in stimulating
demand. Vendors have reported disappointing PC revenues due to price compe-
tition. Competitive pricing pressures continue to drive pricing decisions. In ad-
dition, business pressures have not recovered. Consumer demand for notebook
computers has also driven demand.
International sales are an increasingly important element in growth for the ma-
jor computer vendors. Growth in Europe and the Middle East has seen an 18.7
percent year-to-year increase in PC shipments for the third quarter of 2003. This
growth was built on the robust sales of portables, which rose 51 percent in con-
sumer and business demand. Aggressive price competition was a signifcant factor
in stimulating demand.
The top frms continue to fght for dominance in the industry, but the weaker
frms are attempting to gain ground by consolidating. In 2004, Gateway purchased
eMachines. In the process, Gateway fred most of its existing managers and re-
placed them with managers from eMachines. Gateway eventually fled bankrupt-
cy. In 2006, Dell claimed that it made 1/3 of the PCs sold in the U.S. (2006 An-
nual Report). By 2009, HP had overtaken Dell as the leading PC manufacturer.
For 2009, the worldwide rankings were: 1. Hewlett-Packard, 2. Dell, 3. Acer, 4.
Lenovo, 5. Toshiba (Whitney 2010). By 2011, the argument about ranking was
whether or not tablets should be counted as PCs. If so, Apples market share
would be signifcant.
Te Consumer Electronics Market
The PC vendors are attracted to the appealing growth projections for consumer
electronics markets. For a while, fat-panel TVs helped Dell and Gateway improve
profts. By 2007, Gateway/e-Machines had dumped all of its stores and stopped
selling televisions. Dell still listed televisions, but the market had been stolen by
retailers engaged in vicious price-cutting (including Wal-Mart, Best Buy, and Cir-
cuit City).
Apple Computer had success with its retail outlets in 2003. Its stores are locat-
ed in high-traffc areas, such as upscale malls, near sizable Apple customer bases.
Apples concept has been to create a setting where salespeople can demonstrate
some of the new digital camera, digital music, and digital video products, and cus-
tomers can work with and experience these offerings in the store. The hope is that
the consumer will buy not only a new PC but also all the software and peripherals
needed for the complete digital solution.
Given the trend toward maturing growth rates in the PC industry, the strategy
of broadening product lines to tap higher-growth opportunities appears to be rea-
sonable. However, the margin benefts to the vendors remain in question, given
the highly competitive market dynamics of the consumer electronics industry and
the uncertainty of growth projections and product life cycles.
In late 2010 and 2011, manufacturers were focused on tabletsled by Apples
success with the iPad. Yet, early tablets were largely consumer devicescapable
123 Chapter 2: Information Technology Foundations
of displaying movies, retrieving fles, playing music, and handling small e-mail
messages and Facebook updates. But, with low resolution (typically 1024 x 768)
and no keyboards, they were not replacements for full-blown laptops because it
was diffcult to enter data and create content on them. Continued evolution and
features might change these relationships.
Case: Dell
Dell posted rapid sales growth since July 1994, when it discontinued retail chan-
nel sales to focus exclusively on its direct business. After entering the market for
Windows-based workstations in 1997, the company quickly became the worlds
leading supplier. As of the frst quarter 2003, Dell was the worlds largest PC mak-
er, retaking the title from Hewlett Packard Company, which with its May 2002
acquisition of Compaq Computer became Dells largest rival. Desktop computer
systems made up the largest segment (53 percent) of the business. Dell ranked
frst in the United States and second worldwide in desktop shipments in calendar
2002. At the end of fscal 2006, Dell had net revenue of about $56 billion. By
2007, Dell was rapidly losing ground to Hewlett-Packard. PC shipments increased
by 13.1 percent in the frst quarter of 2006 but Dells sales grew by only 10.2 per-
cent (ZD Net 2006). By the frst quarter of 2007, Hewlett-Packard surpassed Dell
as the worlds largest producer and Dells worldwide shipments fell by 6.9 percent
in the frst quarter of 2007 and U.S. shipments fell by 14.4 percent leaving Dell
barely in the lead with 26.8 percent of the market compared to HP at 25.5 percent
(Darlin 2007). In 2009, HPs share of shipments was 19.7 percent, Dells was
12.9, and Acer was close behind at 12.7 percent.(Whitney 2010).
The companys higher margin notebooks and portables include the Latitude
product lines, for corporate users, and the Inspiron line, for consumers and small
businesses. Dell offers services that include professional consulting, custom hard-
ware and software integration, and network installation and support. Manufactur-
ing sites include Austin, Texas; Limerick, Ireland; Penang, Malaysia; and Xiamen,
China.
Dell is aggressive in pricing its products. As a direct seller of PCs, Dell benefts
because it can pass lower component costs through to customers faster than its
rivals. As such, it can lead the competition in price cuts. The company strategy
includes the ability to gain market share by leveraging its position as the low-cost
producer in the PC industry. Dells market share gains over the past year refect
the successful implementation of this strategy. This strategy is cramped, however,
by the rapid growth in component prices.
In February 2007, Michael Dell, fred Kevin Rollins who had been CEO since
2004, and Mr. Dell took the job back in an effort to turnaround the company.
Dells sales model was good at holding down costs, but sales were shifting. Dell
had been focused on business and educational customers who were more than
willing to purchase direct from Dell. But sales to consumers surpassed sales to
businesses and it turns out that individuals preferred to buy computers from retail-
ersnotably Best Buy, Circuit City, CompUSA, and Offce Depot. Markets that
H-P had locked up several years earlier (Lawton and Lublin 2007). Mr. Dell con-
tinued the takeover by removing or replacing a third of its executive board.
In May 2007, Dell announced a deal with Wal-Mart to sell two desktop models
directly to consumers. Bob Pearson, Dell spokesman, said our customers are ask-
ing us for additional ways to purchase our products and we plan on delivering on
124 Chapter 2: Information Technology Foundations
a global levelTodays announcement with Wal-Mart represents our frst step.
Stay tuned. (Lawton 2007). Perhaps Dell will recognize that two desktops are not
going to change the world, and that many people prefer to buy laptops. But, if you
put Dell laptops side-by-side with those from H-P, Sony, Apple, and IBM, will
consumers reject them because of a lack of style and engineering?
Keys to Success
Much of Dells success has been credited to the built-to-order model. Nothing is
manufactured until someone buys it. This reduces inventory holding time to three
to fve days. Dell also applies this just-in-time approach to its marketing efforts.
Advertising dollars and resources are focused on the segments that are growing
the most. For example, the fourth quarter is always focused on the holiday gift
season for consumers. Quarters 2 and 3 are focused on the public sector when
schools and the government begin their buying cycles.
While Dell has always sold to the education market, in 1996 the sector became
more interesting, thanks to the federal governments E-Rates program that pro-
vided from $2.5 billion to $3 billion per year to subsidize schools technology
budgets. Apple had previously addressed this market by engaging in emotional
marketing, pitching warm and fuzzy computing to teachers in the hope that they
would lobby their schools. In contrast, Dell had realized that computers in the
schools had moved from freestanding desktop tools to nodes in an increasingly
complex web of technology that included wireless networks, handheld devices,
software, and servers. While Apple advertised personal creativity, Dell marketed
standardization and commoditization. Dell did not go to its education buyers and
say, Well sell you desktops and laptops. They offered solutions including edu-
cation software, packages, and IT services. They addressed storage and the lever-
age of the existing technology. This approach proved to be more compelling for
people with limited budgets and no resources or staff.
Perhaps Dells most important weapon was its huge customer database, the re-
sult of Dells sales model. This provides a direct relationship with the customer.
Since it sells directly, Dell can get immediate feedback from customers before,
during, and after the sales process. Dell courts such feedback, maintaining a Plati-
num Council of buyers to offer their insight at the executive level, and also invit-
ing customers to work with product development teams in a direct feedback loop.
Due to tight supply chain management, Dells made-to-order model is also a
fnancial gold mine. Dell orders and receives components as they are needed to
build a machine. The computer is shipped within a few days, and the customer is
charged. But Dell does not have to pay the suppliers until 30 days later. So Dell
earns interest on the revenue for a couple of weeks before it pays suppliers.
Database Applications to Better Service Customers
Valerie Hausladen knew that she could get Dells customer database to work hard-
er. I used to be more of a traditional marketing person, she says. But I learned
that unless I could measure and show ROI on marketing, my budget kept getting
cut. I realized at Dell, you have to be able to show results (Kuchinskas 2003).
Hausladen set up a pilot program to test whether better customer relationships
could be established in the interactive channel. Smaller Dell accounts were initial-
ly targeted in three areas: health care, K-12 schools, and colleges and universities.
Dell divides its accounts into the three categories of acquisition, development,
or retention. Development accounts are those that the company thinks could grow,
125 Chapter 2: Information Technology Foundations
or that are not spending all their budgets on Dell products. The tactical goal of the
campaign was to get the name of one buying decision maker for each account.
The strategic goal was to become more actionable on how the company served
customers with right information at the right time. The implementation goal was
to send laptop information to customers who were interested in laptops and server
info to server buyers.
Dells database group went to work. They analyzed Dells customer list to es-
tablish benchmarks. To fnd out if Dell knew a decision maker at an organization,
they analyzed job titles, asked salespeople, and even called the customer to ask.
They also began outreach via e-mail and direct mail, renting mailing lists and
building and refning the Dell customer database through opt-in methods.
To implement the program, Web portals were built for each of the customer
verticals, offering tools and information to aid them in their technology decisions.
This was aided by the fact that the three Knowledge Centersfor K-12, institu-
tions of higher education, and government purchaserswere similar in their ap-
plication. The visual identity and content for the Web pages were crafted to serve
as a virtual account executive for each market.
The direct mail campaign focused on two goals. First was the desire to alert
customers to deals and sell more products. Second was the effort to improve infor-
mation in the customer database and turn names into relationships. When custom-
ers registered on the Knowledge Center sites to read content or request e-newslet-
ters, they also selected products they were interested in from a list. The next time
Dell communicated with them, it focused on the items they had checked. The Dell
team set up a control group to measure the effects of their marketing and defne
subsequent benchmarks. Dell began to see results from this database marketing
effort in 2002. The short-term gains included the maximization of tactical things
like response rates. This included the establishment of 5,000 new accounts in eight
months. The Web interface lets the marketers compare different campaigns, dif-
ferent media, and calculate the current ROI. Three years into the program, Dells
information-rich database contains at least one key decision maker for each ac-
count. The goal is to expand this list to the names of fve key decision makers for
each location in the database.
Dell addresses the budget-conscious public sector market by talking to them
about getting what they need, supporting them, and saving them money. In direct
mail, e-mails, and on the Web, it uses a straightforward style and packs its com-
munications with information. The postcards are not fancy. They include a couple
of generic hardware close-ups and text. They follow a simple formula: one close-
up of the product, another that shows the entire case, a photo of smiling custom-
ers, and lots of text, with prices prominently featured.
All this leads back to the Knowledge Center Web page, where Dell is building
a deep resource that offers quick links to shopping, customer service, and tech-
nical support backed by articles that can help Dells customers evaluate, plan,
and use technology more effectively. They are also integrated with more offers,
sweepstakes, and discounts. Every time a customer clicks within a newsletter,
navigates around a Knowledge Center, or responds to a postcard electronically or
via a call center, the choices are recorded in Dells customer database. Over time,
the Knowledge Center begins to appear differently from the one encountered by
another education decision maker. This system results in a more interesting inter-
action with Dell each time the customer comes to the Web page.
126 Chapter 2: Information Technology Foundations
Dell has Rerouted its US Support Calls to the United States
In November 2003, Dell rerouted calls from its U.S.-based users to a U.S.-based
call center instead of to its facility in India. Some customers had complained
about the quality of the help they had received from the offshore center. Sup-
port operations for Dells Optiplex line of desktop PCs and its Latitude notebooks
were moved back to facilities in Texas, Idaho, and Tennessee.
Ned May, an analyst at the market research frm IDC, said he had heard criti-
cisms from corporate IT managers about the support they were getting from Dells
call center in Bangalore, India. Barry French, a Dell spokesman, said a portion
of the calls from U.S. PC users would still go to India, where support has been
handled since mid-2001. He indicated that Dell may shift all of the support back
offshore at some point. We are increasing the number of people we have provid-
ing support in India, he said. Dell has a number of call centers around the world,
and we will continue to optimize those to provide the best customer experience
(Brewin 2003).
In 2011, Dell and HP both began buying companies to expand offerings for
business servers. Dell paid $800 million for Compellent, which provides data tier-
ing. A network attached storage box contains multiple levels of drivessome fast
and expensive (fash drives), and some slower but large and cheap (SATA). The
software automatically moves lesser-used data to the cheaper drives (Mearian
2011).
Also following HP, in 2009 Dell purchased Perot Systemsone of the large
outsourcing vendorswhich happens to be located in Texas (Niccolai 2011). As
part of its new services unit, Dell is focusing on providing private cloud-based
computing to business users. Dell partnered with SAP and several other compa-
nies to be able to host SAP applications on its servers (Kanaracus 2011). With its
traditional emphasis on business sales, Dell has been building server farms to pro-
vide private cloud-computing to businesses that need high-speed facilities. Dell
also expanded its server offerings including blade servers with up to 96 processor
cores. Dells moves into enterprise servers and cloud-based hosting helped pro-
vide large increases to net income in 2011.
Questions
1. Is the pace of technological change slowing? Can a business wait longer now
to refresh computers?
2. How is information technology critical to Dells success?
3. What is the current status of Dells recycling program and is it successful?
4. Why is Dell expanding into consumer electronics and corporate networking
products?
5. Is there a limit to the number of computers Dell can sell through its current
methods? Should it reconsider retail sales?
Case: Gateway and Acer
Gateway was the third largest manufacturer of PCs in the United States, but it
struggled for several years. It tried selling computers, and plasma TVs, through
standalone stores, but struggled to make profts. Gateway gained market share in
127 Chapter 2: Information Technology Foundations
the PC industry until the second half of 2000. Since that time, its rapid growth
has reversed. In 2002, Gateway estimated its market share to be 6 percent, but
the company still believed it had a strong presence in the U.S. consumer market.
In early 2001, management reviewed its operations and discontinued unproftable
revenue streams beginning in the second quarter of 2001 with roughly $200 mil-
lion per quarter. In the third quarter 2001, it exited its international operations. In
March 2003, management planned to save $400 million annually from workforce
cuts, cost programs, and a reduction in the number of its stores. In March 2007,
the former CFO and controller of Gateway were found guilty of manipulating
earnings and revenue statements. Gateway also acquired a new CEO in late 2005.
Sales in 2006 were just shy of $4 billion with a net income of about $9 million.
But the company has to grow profts considerably to overcome its half-billion
dollar loss in 2004. Slightly over half the sales value was for desktop computers.
Most of sales ($2.7 billion) were through retail outlets (2006 Annual Report).
In the beginning, Gateway focused on providing high-end personal computers
at relatively low prices. The company led the industry consolidation through the
1990s and dominated PC sales for a time. Based in South Dakota, the company
featured a cow motif as a means to create a brand identity. Eventually, headquar-
ters was moved to San Diego. In 1997, Gateway introduced an innovative exten-
sion of its traditional business model. Instead of relying on developing customers
solely through the Internet, Gateway opened 37 Gateway Country stores in which
customers could test-drive PCs. One of the goals was to expand sales of consumer
electronics goods such as printers, cameras, and eventually plasma televisions.
After several years of expansion, the company began closing certain stores. As
of December 31, 2002, Gateway had 272 retail stores in the United States, down
from 327 at the end of 2000. In the frst quarter of 2003, the company closed
another 80 stores. In 2004, Gateway acquired eMachines largely in exchange for
stock. Ted Waitt, founder and chairman, quickly replaced Gateway management
with eMachines managers. In April 2004, the new management shut down all of
the remaining Gateway retail stores (Zimmerman 2004).
In 1997, Gateway also launched its Internet service. In October 1999, the com-
pany announced a strategic alliance with America Online, calling for Gateway
to package AOL service into all its computers. AOL was to invest $800 million
in Gateway over two years, including $150 million in AOL stock. In December
2001, Gateway extinguished its convertible note to AOL through the issuance of
50,000 shares of Series C redeemable convertible preferred stock. This resulted in
an extraordinary gain of $4.3 million, net of tax.
Realizing the price competitiveness in technology, Gateway was among the
frst PC vendors to shift its focus to beyond the box revenues. These revenues
incorporate the sales of software and peripherals, Internet access, fnancing, and
warranty and training revenue. In 2002, these sales were $692 million, down from
$1.2 billion in 2001 and $1.9 billion in 2000. These sales have wide margins.
Several categories offer recurring revenue streams. Gateway reported a net loss of
$0.95 in 2002. By 2006, revenue from non-PC sales had dropped to about $650
million.
The merger with eMachines appeared to represent a refocusing on the value
end of the computer spectrum. Originally, eMachines succeeded by building stan-
dard computers in China and beating the cost of equivalent Hewlett-Packard ma-
chines by $150. As PCs become a commodity industry, people are less interested
in the raw technology. Instead, certain features become important, such as more
128 Chapter 2: Information Technology Foundations
memory or larger disk drives. John Hui, the owner of eMachines, explained that
they created what we called a value formula that Wayne [Inouye] developed at
Best Buy. They attach value to every single component of a PC. They can at any
time tell you if you use, lets say, a DVD RW versus a CD ROM how much more
the consumer is willing to pay. Now that has nothing to do with the cost. Because
(its) the value that the consumer will attach to every single component. For ex-
ample, how much is the consumer willing to pay for a 512MB system versus a
256? They can attach value to it, because the consumer knows they can easily buy
the memory and stick it in themselves. But the memory prices go up and down
every day. So they have a certain perceived value. And when that perceived value
is high and the cost is low, thats when eMachines would put those components in
there. Inouye became CEO of Gateway after the merger (Zimmerman 2004). By
August 2007, Gateway had failed and the name was purchased by Acer (Lemon
and Nystedt 2007). Acer, a Taiwan-based manufacturer quickly became one of
the leading PC manufacturers. A large part of the growth came through selling
low-priced netbookssmall laptops designed for basic Web browsing and e-mail
tasks.
By 2011, Acer was being squeezed on the low end by tablets, particularly the
Apple iPad. People chose to purchase the small, lightweight tablets instead of
buying the small netbooks that had increased Acers growth. Later in 2011, Acer
decided to re-enter the server market. Servers often have higher proft margins,
but reliability is critical and manufacturers build in duplication in case compo-
nents die (Thibodeau 2011). Acer plans to use third-party makers to put the serv-
ers together. Todd Mottershead, senior manager for servers and storage noted that
I want to make sure that we can build very, very quickly and deliver much faster
than everyone else. One interesting, but unanswered, question is whether Acer
will go with a proprietary server format. In late 2010, Facebook began pressuring
vendors to develop a generic server. The company created design specifcations
down to the cabinet and motherboard layouts. Up to this point, server manufac-
turers built incompatible systems. Although they used off-the-shelf components
for drives, RAM, and processors, it generally was not possible to even transfer a
motherboard from one case to another. Standardization will make it easier to sub-
stitute parts; which ultimately increases competition and drives down prices. But
it is not clear yet if vendors will be willing to build to the standards.
Questions
1. Why did the Gateway stores fail?
2. Can smaller vendors like Acer and Toshiba survive?
3. Are tablets PCs and will they replace laptops?
Case: Sun
Sun was the No. 3 manufacturer in server technology, with 13.5 percent of the
market, and its market share and revenue were dropping in the early 2000s. Sun
focused on the UNIX market where it was the No. 1 vendor. Founded in 1982, Sun
Microsystems invented the workstation. It relied on the concept that the network
is the computer. Sun was a leading supplier of networked computing products, in-
cluding workstations, servers and storage products that primarily used Suns own
129 Chapter 2: Information Technology Foundations
Scaleable Processor Architecture (SPARC) microprocessors and its Solaris soft-
ware. Computer systems accounted for 55 percent of net revenues in 2003, net-
work storage products 14 percent, support services 25 percent, and professional
services 7 percent.
Suns workstations were primarily used for engineering applications (CAD/
CAM), desktop publishing, software development, and other applications that
need a moderate amount of computing power and high-quality graphics capabili-
ties. In terms of computing power, workstations fall between PCs and mid-range
computers. UNIX has been the most common operating system for workstations,
but Microsofts Windows has posed a formidable challenge. Suns workstations
ranged from low-cost UltraSPARC-based workstations to high-end, multiproces-
sor color graphics systems. Sun servers can be used for fle sharing, letting us-
ers access data distributed across multiple storage devices and networks, or as
computer resources, to distribute computer-intensive applications across multiple
processors.
In June 2000, Sun shifted its focus to include storage, launching its StorEdge
T3 line, as well as software and services to enhance its storage solution offerings.
In 2002, Sun introduced Solaris 9, the latest upgrade of its popular UNIX operat-
ing system. Its features include identity management and enhanced security and
manageability.
Sun has concentrated on software development as well. It invented the Java
object-oriented programming language. Java has attracted signifcant interest in
the software development industry because of its portability; software created in
Java can run on any type of system. As a result, it is a popular tool for designing
software for distribution over the Internet.
Sales at Sun were weak through the early 2000s as customers realized that
Intel-based personal computers could perform as effectively as workstations and
midrange servers, at a substantially lower upfront cost. In 2004, Sun received $1.6
billion in a settlement with Microsoft over the use of Java. Yet Sun lost $0.75
billion in just one quarter of that year and was forced to lay off 9 percent of its
workforce. In 2004, Sun began selling Intel- and AMD-based workstations that
could run the Windows and Linux operating systems. But Sun could not compete
in the low-end and midrange markets. Suns 2006 Annual Report shows increas-
ing sales revenue (to $13 billion in 2006), but it sustained net losses from at least
2002-2006. A huge portion (15 percent) of Suns sales were to GE. Demand for
high-end data center servers declined in 2006 in favor of smaller systemswhere
Sun faces greater competition.
For years, Sun had relied on proprietary processors. By 2006, most production
had shifted to high-end processors available from Intel and AMD. The company
also expanded into the data storage market, buying StorageTek in 2005, in an at-
tempt to provide a market for storage applications. In 2006, revenue from data
management products and support services exceeded revenue from computer sys-
tems products. On the high-end, Sun lost out to IBM and Cray Research in a bid
to provide supercomputers for the U.S. government. According to Suns 2006 An-
nual Report, most HRM and IT functions for the company have been outsourced
and are provided by other companies.
In 2009, Oracle, the database vendor, paid $7.4 billion to acquire Sun (Clark
and Worthen 2009). The general presumption was that Oracle wanted to gain con-
trol over Java, which is an important element in developing systems in the Oracle
database. Sun still produces some servers, but the workstation market had largely
130 Chapter 2: Information Technology Foundations
disappeared by 2011. Sun still markets the Sun Ray system which is one of the
original thin-client approaches. All of the computing work is handled on a server
and users interact with basic graphics terminals and a keyboard. The primary ob-
jective is to keep the software and data in a central location to make it easier to
install and maintain. The problem is that the client terminals cost almost as much
money as a complete PC and the servers are expensive. The original goal was to
reduce management costs by centralizing the software and data, but with network-
based controls available today, there is little reason to spend the extra amount of
money on the server. In any case, Sun was struggling for years to sell servers. The
business continued to decline due to uncertainty after the purchase by Oracle. But,
in the frst quarter of 2011, Sun saw an increase in the sales of servers hitting $773
million in the frst quarter (Niccolai 2011).
Questions
1. Can Sun survive? How will it compete against Linux and generic PCs?
2. Since much of the world has accepted Java as a Web-based programming
language, can Sun make any money from it?
Additional Reading
Boslet, Mark, Sun Microsystems Posts Big Loss in 3Q As Sales Slump, The
Wall Street Journal, April 16, 2004.
Brewin, Bob, User complaints push Dell to return PC support to U.S.,
Computerworld, Vol 37(48), December 1, 2003, p. 6.
Clark, Don and Ben Worthen, Oracle Snatches Sun, Foiling IBM, The Wall
Street Journal, April 21, 2009.
Darlin, Damon, Dells Share of PC Market Slumped Further in First Quarter,
International Herald Tribune, April 19, 2007.
Guth, Robert A., Microsoft Settles Another in String of Antitrust Suits, The
Wall Street Journal, April 20, 2004, p. B5.
Kanaracus, Chris, SAP, Dell Partner on In-Memory and The Cloud,
Computerworld, May 16, 2011.
Kuchinskas, Susan, Data-based Dell, Adweek Magazines Technology,
Marketing, Vol 23(6), September, 2003, p. 20-23.
Lawton, Christopher and Joann S. Lublin, Dells Founder Returns as CEO as
Rollins Quits, The Wall Street Journal, February 1, 2007.
Lawton, Christopher, Dell to Sell PCs at Wal-Mart, The Wall Street
Journal, May 24, 2007.
Lemon, Sumner and Dan Nystedt, Acer to Acquire Gateway in $710 Million
Deal, PC World, August 27, 2007.
Mearian, Lucas, Dell to Add Compellents Tiering Technology to its Storage,
Computerworld, February 22, 2011.
Niccolai, James, Dell Services Chief to Leave Company, Computerworld,
January 13, 2011.
131 Chapter 2: Information Technology Foundations
Niccolai, James, Oracle Returns Growth to Sun Server Business: IDC,
Computerworld, May 24, 2011.
Plamondon, Scott, PC Recycling Made Easier, PC World, December 29,
2003.
Skillings, Jonathan, Dell To Get Green With PC Recycling, News.Com, May
16, 2002.
Thibodeau, Patrick, Acer Returning to U.S. Server Market, Computerworld,
February 21, 2011.
Whitney, Lance, Acers PC Market Numbers Add Up, CNet, March 10, 2010.
http://news.cnet.com/8301-1001_3-10466669-92.html
ZD Net, Dell Could be Losing its Shine, April 19, 2006.
Zimmerman, Michael R., Why the eMachines Model Is Paying Off, eWeek,
April 18, 2004.
Summary Industry Questions
1. What information technologies have helped this industry?
2. Did the technologies provide a competitive advantage or were they quickly
adopted by rivals?
3. Which technologies could this industry use that were developed in other
sectors?
4. Is the level of competition increasing or decreasing in this industry? Is it
dominated by a few frms, or are they fairly balanced?
5. What problems have been created from the use of information technology
and how did the frms solve the problems?
132
What You Will Learn in This Chapter
What is the value of a single computer?
Why are computer networks so important in todays businesses?
What components do you need to install to create a network?
How can multiple users share a single network?
How is it possible that you can connect your computer to a network at the offce, at
home, or while on the road, even overseas?
What is the Internet, how is it controlled, and how does it work?
Are personal computers necessary anymore?
What problems are you likely to encounter if you need to connect to a supplier in a
different country?
Chapter Outline
Networks and
Telecommunications
3
Chapter
Introduction, 133
Network Functions, 134
Sharing Data, 135
Sharing Hardware, 142
Sharing Software, 144
Components of a Network, 145
Computers, 145
Transmission Media, 147
Connection Devices, 157
Network Structure, 159
Network Packets, 159
Shared Connections, 160
Managing Shared Networks, 163
Standards, 166
The Need for Standards, 166
A Changing Environment, 167
Internet TCP/IP Reference Model, 167
The Internet, 171
How the Internet Works, 172
Video and Heavy Use Complications,
174
Telephones and The Internet, 175
Internet Addresses, 177
Domain Names, 179
Internet Committees, 181
Internet 2, 181
Wireless Networks and Mobile
Commerce, 183
Cloud Computing, 185
Global Telecommunications, 186
Technical Problems, 186
Legal and Political Complications, 187
Cultural Issues, 188
Summary, 188
Key Words , 190
Web Site References, 190
Review Questions, 191
Exercises, 191
Additional Reading, 195
Cases: Wholesale Suppliers, 196
133 Chapter 3: Networks and Telecommunications
Owens & Minor
Introduction
What is the value of a single computer? This question almost sounds
like the old Buddhist Zen koan: What is the sound of one hand clapping? You do
not need to debate the complexities of Zen to understand that the value of com-
puters is multiplied by connecting them and sharing information. Today, many
applications exist only on the networkthey are built to use servers to store and
process data and they are accessed across the Web from any location in the world.
And communication ranging from text, to voice calls, to video conferencing has
largely moved to Internet-based formats.
As shown in Figure 3.1, networks are useful on two levels. Internal compa-
ny networks are used for teamwork and sharing data; the Internet connects you
to external organizations, including suppliers, customers, and service providers.
Actually, you use many other networks in your daily life, including cell phones,
television, and even electricity. Today, almost everything you do in business re-
lies on computer data networks. You use them for communication, sharing data,
team work and collaboration, and simpler things such as backing up your data and
printing.
Even though you will probably not be responsible for creating or maintaining a
network, knowledge of the underlying technologies makes it easier to understand
some of the problems that can arise, and helps you see how the technology is
likely to change in the future so you can be prepared. Network technologies have
experienced some of the most rapid changes in the past few years, and new tech-
nologies are being deployed now. You need to plan ahead so you can create new
organizations and new methods of handling work.
The Internet has changed many aspects of daily life, and has the capability of
fostering even more changes. To understand these opportunities and recognize the
challenges that need to be overcome, you need to learn a little about how the In-
ternet is designed and how it works. The Internet is an interesting organization
because it is governed purely by committees and individuals and works because
of standards. These organizations face diffcult questions and the answers will
dramatically infuence your life and the role of businesses in the years to come. If
nothing else, as an informed citizen, you need to be aware of these discussions.
Many times the decisions hinge on social, economic, and political issues instead
of purely technical ideas.
How do suppliers connect to customers? Owens & Minor sells thousands of prod-
ucts to hospitals. It is one of three large companies in the market, competing with
Cardinal Health (which owns the system built by American Hospital Supply). Like
other wholesalers, Owens & Minor exists in a highly competitive environment with
low margins. Whether you call it logistics or supply chain management, buyers con-
tinually search for ways to reduce their purchasing costs. Companies like Owens &
Minor use information technology to reduce inventories throughout the purchasing
system. By building links with customers and suppliers, Owens & Minor can im-
mediately react to changes in demand and plan the most effcient method to deliver
supplies.
134 Chapter 3: Networks and Telecommunications
The global economy makes life more interestingparticularly in terms of net-
works. Sharing data, or even using cell phones, across international borders raises
many complications. Because technology continually changes, nations implement
the technology at different points in time. Compatibility across borders is an even
greater challenge when nations have differing goals and income levels. As man-
agers, you need to be aware of some of the issues, both to communicate and to
travel.
The objective of a network is to connect computers transparently, so that the
users do not know the network exists. The network provides access to data on cen-
tral computers, departmental computers, and sometimes other workers personal
computers. Networks can create shared access to fax machines, modems, printers,
scanners, and other specialized hardware. To the user, it does not matter where
these devices are located. The network makes them work the same as if they were
on any desktop. The Internet expands these capabilities across the world. Wireless
makes the services available to you wherever you travel in major cities.
Network Functions
Why are computer networks so important in todays business-
es? Most companies did not seriously begin installing networks until the early
1990s. The Internet expanded into the commercial world in the mid to late 1990s.
Trends
In many ways, the communication systems available today began with
the telephone. Originally, sounds were converted into analog electrical sig-
nals, and calls were connected through physical switches. As computer tech-
nology evolved, it became possible to convert everything into digital data
and the computerized switches simply transfer digital packets to a desired
destination.
A key aspect of communication systems is that some connection medium
is required to transmit data. Most homes have two major connections: tele-
phone and TV cable. The phone and cable companies have been expanding
their services by providing better and faster connections to houses. Thanks
to the long-distance phone companies, hundreds of thousands of miles of
national and international fber optic cable connect cities and nations around
the world. These backbone connections carry almost all of the Internet data,
voice, and video connections.
But, the biggest trend in the past few years has been the switch to cellu-
lar phones including smart phones used as computers to access the Internet.
People are increasingly giving up wired connections in favor of mobile con-
nections that operate over radio waves. As nations move to provide more
bandwidth for cellular service, data transmission capabilities for mobile
phones is approaching the speeds available for fxed-line connections.
As connections and usage have grown, so have the applications and data
available. Consequently, it is increasingly important to be able to connect
to the Internet from anywhere at any time. Which leads to an increasing cy-
cle: As connection capabilities improve more applications and data become
available, which means connection capabilities need to improve even fur-
ther, which leads to new applications, and so on.
135 Chapter 3: Networks and Telecommunications
Perhaps the better question is: Why did it take so long? The answer: cost. Think
about that time frame for a minute. The digital world as you know it is only about
15 years old, and it has already had a huge impact on business and society. But,
the world is still only at the beginning of the network evolution. New opportu-
nities in both communications and applications will continue to arise. And you
will face new questions about choosing technologies and applications. To under-
stand the value of networks, you need to look at the business applications and new
procedures that have been created with networks. Then, you can start thinking
about the future networks and new applicationsparticularly wireless and mobile
applications.
Sharing Data
Sharing data is one of the most obvious uses of networks and it can make pro-
found changes in the way an organization works. Managers can see customer and
marketing data immediately as it is collected. Employees in one department can
easily share data with other departments. A network facilitates the use of teams. In
particular, it enables informal teams to spring up throughout the company to solve
problems as they arise. Instead of waiting for a higher-level manager to appoint a
team, employees can use the network to ask questions, notify others involved, and
fnd in-house experts. A local area network (LAN) is commonly used to connect
computers and share data within a company. A LAN uses the same technologies as
any other type of network, but is recognized separately because all of the compo-
Figure 3.1
Networks. Managing an organization requires communication and teamwork.
Networks facilitate teamwork and create opportunities for new organizational
structures. The Internet makes it easy to connect to customers and suppliers and
access new services and Web-based applications.
Teamwork
Communication
Scheduling
Sharing
Internet
Suppliers
Customers
Banks
Internal
External
Services
Applications
Research
Hosting
136 Chapter 3: Networks and Telecommunications
nents of the network are owned by your company or organization (or household).
Since you own everything, you get to make all of the decisions, and you do not
have to pay anyone else to transmit the data.
Transactions
One of the most important reasons for connecting computers is the ability to share
data. Point of sale (POS) systems were some of the frst networks installed in
businesses.
Consider a retail store with fve checkout registers. Each register is actually a
computer. If these computers are not connected, it is diffcult to compute the daily
sales for the store. At the end of the day, someone would have to manually collect
the data from each computer and enter it into another computer. Also, imagine
what would happen if a customer asked a clerk to determine whether a product
was sold out. The clerk would have to check with each of the other clerks or per-
haps call the storeroom.
As shown in Figure 3.2, with e-commerce transactions can take place across
a wider network, with the Internet as the network and customer browsers as the
client computers. The product data and sales transactions are stored in the central
database connected to the Internet. Using a central database provides inventory
data to customers. When a customer asks whether an item is in stock, the Web
site can provide the answer. Managers can get daily sales fgures from any loca-
tion with a Web browser and an Internet connection. Payments and bills can also
be handled directly online. The same diagram can be used for traditional in-house
Figure 3.2
Network for transaction processing. Networks are often used to collect data in a
central database. From there, the data can be queried and analyzed by managers.
E-commerce sales represent transactions across the Internet.
Database Management
System and Web Server
Or Point-of-Sale System
Internet
137 Chapter 3: Networks and Telecommunications
POS systems by replacing the Internet with a simple LAN. The main point is that
a central server holds all of the data and handles the actual transactions.
Decisions and Collaboration
Many types of data need to be shared in a company. But beyond simple data shar-
ing, people often work on teams. Teamwork entails developing reports together. It
requires searching for data, editing documents, and sharing comments. A portion
of a network for making decisions and sharing work with team members is illus-
trated in Figure 3.3. Centralized data and shared documents ensure that everyone
has the same version of the data and the same fnal documents.
In any job, it is rare for one person to work alone. Most businesses are arranged
as teams. Within the teams, individual people are given specifc assignments, and
each team member contributes to the fnal product. For instance, the marketing
department might have to prepare a sales forecast for the next six months. Each
person could work on a specifc sales region or product category. These individual
pieces would then be merged into a single document. If the computers are net-
worked, the managers computer can pull the individual pieces from each of the
individual computers. Also, each team member can be given access to the others
work to ensure that the reports use the same data and assumptions.
Groupware includes software that enables several people to work on the same
document. Each individual computer has access to the master document. When
one person makes a change to the document, the change is highlighted for every-
one to read and approve. With existing international networks, each person might
be located in a different country. E-mail systems can work as simple groupware
Team Document
File Server and Database
Report and
Comments
Figure 3.3
Network for decisions and collaboration. The fle server holds basic data and
software tools. Managers retrieve data and create reports. The reports can be shared
with other managers. With collaborative software, revisions are automatically tracked
and combined to form the fnal document.
138 Chapter 3: Networks and Telecommunications
tools by routing copies of fles to everyone on the team. More sophisticated tools
are included in Web sites built by systems like Microsofts SharePoint. These
tools are discussed in greater detail in Chapter 8.
Messages
Most people are familiar with electronic mail, or e-mail. With e-mail, you can
send a message to any person with a mail account. Many people have come to
prefer e-mail contacts to phone calls. As shown in Figure 3.4, e-mail messages
are asynchronous since the sender and recipient do not have to participate at the
same time. A mail server holds the message until the user logs in and retrieves the
e-mail. Moreover, users can create mailing lists and send a message to many peo-
ple at one time. Messages can be stored, retrieved, and searched for later usage.
In most systems, the computer can automatically notify you when the recipient
reads your message. You never have to worry about whether your message was
received. Voice mail systems, which resemble answering machines, have some of
these same advantages. However, e-mail takes less space to store. More impor-
tant, e-mail can be scanned electronically to search for key topics.
E-mail has some drawbacks. For one, some people do not check the computer
often enough to keep up with their mail. Another problem is that in 1991, the U.S.
courts ruled that public transmission systems such as e-mail are not subject to the
same legal protections for privacy as paper mail and phone calls. Unless the laws
are rewritten, therefore, it is legal for employers (and almost anyone else) to read
everyones e-mail messages. Of course, the fact that it is legal does not make it
ethical.
Examine the fgure for a few seconds and another aspect of e-mail becomes
fairly obvious. How can you delete e-mail (once it has been sent)? The answer
is that it probably cannot be done. Even though some systems appear to give you
Figure 3.4
Networks for communication. With e-mail, a server holds the mail until the recipient
logs on and can receive the message. Because several servers might be involved and
each makes backup copies, e-mail messages are hard to delete.
Internet
1. User creates e-mail message.
2. Message
transferred to
account on
server.
3. Transferred
via the Internet
to the destination
account.
4. Message received
when user checks
e-mail.
139 Chapter 3: Networks and Telecommunications
the option to delete or retract e-mail that has been sent, it generally will not work.
Copies of the e-mail can exist in several locationsthe original computer, the
senders e-mail server, the recipients server, and the recipients computer.
E-mail, and the fact that it is diffcult to delete, has become an important as-
pect in legal casesboth private and those involving government offcials. In
court cases, many lawyers automatically ask for copies of all relevant e-mail in
discovery motions. Consequently, many companies build e-discovery databases
that contain copies of all e-mail messages sent through their servers. These sys-
tems have keyword search facilities so administrators can retrieve specifc mes-
sages when required. The systems also have rules-based systems to handle reten-
tion policies. For example, company policies might specify that routine messages
should be deleted after six months. The system can enforce retention and deletion
policies automatically. Many of these systems also integrate voice mail messages
with e-mail messages, so they are subject to the same retention, deletion, and dis-
covery rules. The main point to remember is that any digital data might be stored
for an unlimited time. So, although it is easy to think of electronic text and mes-
sages as ephemeral and feeting comments, you should always remember that the
potential exists for any message to be retrieved later.
You need to pay attention to two key aspects to any communication method:
(1) Whether it is synchronous or asynchronous, and (2) The level of interruption it
creates and the preferences of the people you work with. For example, a personal
visit and phone call are synchronous, and the other person has to stop working
on a task to talk with you. IM or texting is also synchronous, but users often feel
more comfortable delaying these communications. E-mail is asynchronous, so
each person works on his or her own schedule, and deals with mail during breaks.
As the message sender, you have to choose the appropriate method of communi-
cation for each message and person. You also have to learn to allocate your own
communication time, to leave suffcient time to fnish your own work.
Reality Bytes: Worldwide Broadband Rankings
Akamai is an Internet company that provides services to many other companies.
It specializes in distributing data around the worldputting it on servers closer to
where it will be needed. This positioning gives the frm the ability to measure data
fows and speeds around the world. An interesting statistic is the connection speeds
of the people in each country. In 2010, the nations with the highest average connec-
tion speeds and their average speed in Mbps, were: 1. South Korea (17), 2. Hong
Kong (8.6), 3. Japan (8.0), 4. Romania (6.8), 5. The Netherlands (6.5). Note that In
South Korea, over 75 percent of the population connected to the Internet at speeds
over 5 Mbps. The U.S. ranked 16 on the list of average speeds at 4.6 Mbps, and only
30 percent of the population had access to speeds over 5 Mbps. It is easier to build
high-speed networks in nations with small physical space and large populations such
as South Korea and Japan. Similarly, population areas in the U.S. such as the North-
east have more people with faster connections. But, ultimately, the speed available to
the average person begins to matteras companies rollout Web-based applications
with sound and video.
Adapted from Karl Bode, Akamai: U.S. 33rd Fastest Broadband Country, www.dsl-
reports.com, July 9, 2009. Updated data: http://www.akamai.com/stateoftheinternet
140 Chapter 3: Networks and Telecommunications
Web Site Basics
Web sites have evolved considerably, with several well-known sites providing
services and applications to address many new tasks. However, many sites still
exist in the early formatproviding information and data. As a step up, some sites
provide limited interaction, such as sales, feedback, discussion, and fle sharing.
At a higher level, a few sites provide greater interactivityincluding games and
online applications. The frst decade of 2000 also saw the expansion of social net-
working sitessuch as Facebook and Twitter. Social networking sites facilitate
communications among groups of users. These types of sites and other capabili-
ties are covered in more detail in Chapter 7 on e-business.
A key element of communication that is emphasized with the Internet and the
Web is that communication only exists through the adoption of standards. Stan-
dards are simply agreements among the major users to handle tasks and data in a
specifc way. In terms of the Internet, standards exist for connecting networks and
transmitting packets through routers. Common Web standards include hypertext
markup language (HTML) which is the standard format for telling browsers
how to display a page of text and images. These same standards can be used for
other types of networks, including intranets and extranets. Intranet sites employ
Internet technologies but use security methods to restrict access to internal users.
For example, employees probably use an intranet to retrieve and update personal
data in the human resources database. Similarly, extranets are sites specifcally
designed for companies that partner with your organization. For example, your
suppliers can log into a special section to check on your production schedule, pick
up technical specifcations, or bid on jobs. Intranets and extranets use the same
technologies as the common Internet, but are limited to special groups of users.
Several common Web tools can be used to support communication. Initial Web
sites were designed primarily for one-way communication. They are still used
for posting centralized data that is needed by many other people. However, in-
teractive tools have also evolved to support feedback and communication within
groups. Tools such as instant messaging (IM) can be used to send short messages
to friends or coworkers. The messages are delivered instantly and can provide a
way to ask questions or share ideas with team members who are online. Of course,
cell phone texting services operate the same way, but the interaction requires a
cell phone, or preferably a smart phone with a decent keyboard. The computerized
IM tools can also be used to see when someone is online. If you are working late
a night, you can quickly see which of the other team members are also online, so
you know that you can ask a question without having to call everyone just to see
if they are available.
A Web log or blog is an interesting variation of a Web site. The tools were cre-
ated to make it easier to create and post content online and facilitate comments
and feedback. Several sites provide public blogs enabling you to write comments
on any topic. The software is also readily available for installation on internal
company servers so managers can create blogs on topics that can be targeted to
employees or to external partners. For instance, a blog could be used by managers
to keep a log of the daily issues, problems, and solutions. Other managers in the
company could skim the logs to see if problems arising in one area might cause
problems in their own sections. Similarly, if a manager encounters a problem, he
or she could search the blogs for similar problems, ideas on how to approach it, or
even solutions that worked in the past. In essence, the blogs become a knowledge
base that is accessible to other managers. Of course, the sites would be secured
141 Chapter 3: Networks and Telecommunications
so that only managers within the organization could read them. Some people are
so dependent on blogs that they want to be notifed whenever the information
changes. Really simple syndication (RSS) feeds can be established so that your
browser or reader automatically checks for new information and displays it auto-
matically. It is even possible to connect your reader to your desktop so that any of
your subscriptions are automatically displayed on the desktop when information
changes. However, this approach is likely to be a major distraction to your work.
With the introduction of the Apple iPod, the concepts of blogs and RSS feeds
was extended into audio notes that can be downloaded to the iPod and played
later. These podcasts can be useful if you have time to listen to voice notes, but in
business, it is faster to read and search written notes.
Wikipedia, the online user-supported encyclopedia has led to a new form of
Web-based communication. You can use the same software to create in-house wi-
kis where workers on a team can write their own descriptions, edit work by other
people, and add comments. The entire system contains a search engine, so other
employees can search the system for problem descriptions, work documents, and
approaches or solutions used in prior cases. It is a powerful and inexpensive sys-
tem when you want to record case-based data.
Calendars and Scheduling
Managers spend a great deal of time in meetings. Yet sometimes the greatest chal-
lenge with meetings is fnding a time when everyone can get together. Several
software packages use computer networks to solve this problem. As shown in Fig-
ure 3.5, managers enter planned meeting times and scheduled events into their
personal electronic calendar fle, where each event is assigned a priority number.
For example, a time allotted for a haircut would be given a low priority; a meet-
ing with a supervisor would receive a higher rating. If the CEO wants to set up a
meeting, the CEO tells the computer which people are to be included, sets a pri-
Figure 3.5
Sharing calendars. With the appropriate software, you can open your calendar to
other members of your team. A team member can check the calendar and have the
software fnd a common open time for a meeting.
8:00 Mgt meeting
8:30 (open)
9:00 Staff meeting
9:30 Staff meeting
10:00 new meeting
142 Chapter 3: Networks and Telecommunications
ority level, and gives an approximate time. The computer then uses the network
to check everyone elses schedule. When it fnds an open time (overriding lower
priority events if needed), it enters the meeting into each persons calendar. These
systems can be useful when the calendar on your cell phone is connected to the
shared calendar.
Sharing Hardware
Networks also enable workers to share expensive hardware. For example, net-
works are used to provide users access to special output devices, such as high-
speed printers, plotters, or color printers. Networks can be used to give people
access to special computers, such as when an engineer needs to use a high-speed
supercomputer. Figure 3.6 shows some of the hardware devices commonly shared
using a LAN: printers, tape drive backups, server processing, and external access
to the Internet.
Printers
A common use of networks is to give users access to high-speed, high-quality
printers. Even if each computer has a small personal printer attached, some jobs
need to be handled by a high-speed laser printer. Many modern copiers now func-
tion as network printers and can collate and staple large quantities of documents.
Similarly, even at $1,000 each it would be expensive to buy color laser printers for
everyone who might need one, yet it might be reasonable to buy one for a depart-
ment to share. With a network, users can choose from among two or three differ-
ent printers by selecting them on the screen.
Another advantage is that if one printer breaks down, users can send their jobs
to another printer on the network. Think about what happens if there is no network
and your printer breaks down. You have to copy the fle to a USB drive and in-
terrupt someone elses work to borrow their computer to send the fle to another
printer. What happens if you are using a special software package that no one else
has on his or her computer? You will probably have to physically move a printer
from another computer desk to yours, connect the hardware, print your document,
Figure 3.6
Networks for sharing hardware. The workstations use the server to perform backups.
Files are picked up by the server and transferred to tape. The LAN administrator can
reload a tape and restore fles as needed. Networks are often used to share printers
and storage devices. Networks can be used to share access to supercomputerseven
if they are in a different city or different country.
Corporate or
external computer access
Server
Shared Printer
Workstations
tape drive
(backup)
143 Chapter 3: Networks and Telecommunications
and return the printer. When you are on a network, you simply select a different
printer from a list displayed on your computer and go pick up the output.
Several e-commerce printing companies enable you to send your large print
jobs over the Internet and have the boxes of papers shipped to you. All of the
setup, pricing, and payment can be handled over the Internet.
Storage Devices
The arguments used for network printer sharing can be applied to sharing storage
devices. If you have huge data fles that you want to share across the organization,
it is best to put them in a central location and provide network access to everyone
who needs them. The central location makes it easy to upgrade the drives, provide
suffcient capacity, and control the access rights and monitor security. A special-
ized storage area network (SAN) is often used to provide vast amounts of fex-
ible storage. The disk drives are separated from the computers and connected by
a high-speed network using fbre channel or high-speed LAN connections. Physi-
cally separating the secondary storage from the computer box makes it easy to
expand the capacity, provide redundancy, and move the drives to safer locations.
Because of the high transfer speeds across the SAN, the drives appear as simple
local devices to the computer, so no software changes are needed.
Backup
Another important reason for sharing data over computer networks is that most
people are not very good at maintaining backup copies of their workespecial-
Reality Bytes: Network Switches for Servers hit 10Gbps
As the amount of data on Internet and corporate servers continues to increase, net-
work vendors are pushing new technologies to improve the transfer of vast amounts
of data. In 2010, 10 Gigabit Ethernet is pushing into data center network design.
Most data centers are built as vertical racks of servers, where each rack has a net-
work switch at the top. In the past, these top-rack switches were connected to a mid-
dle-layer switch that then connected to the primary Internet backbones. But, hard-
ware servers are increasingly used to host multiple virtual serversand each virtual
server pushes data across the network. Replacing the top-rack switches with 10 Gbps
speeds and eliminating the middle layer speeds the data to the Internet connection.
Robin Layland, an advisor to companies and vendors, notes that Over the next few
years, the old switching equipment needs to be replaced with faster and more fexible
switches. This time, speed needs to be coupled with lower latency, abandoning span-
ning tree and support for the new storage protocols. IEEE standards are also being
ratifed for new switches to handle 40G and 100G Ethernet in the future. The speed
increases are important in a cloud-based world where Layland notes that applica-
tions require less than 10 microseconds of latency to function properly, compared
to existing 50-100 microseconds. Jayshree Ullal, CEO of Arista Networks, a com-
pany that makes some of the new high-speed switches, notes that most of the [exist-
ing] switches are 10:1, 50:1oversubscribed. Ultimately, companies save money by
reducing the number of network switchesboth in the cost of the equipment, main-
tenance, power, and air conditioning.
Adapted from Jim Duffy, 10G Ethernet Shakes Net Design to the Core, Network-
world, September 14, 2009.
144 Chapter 3: Networks and Telecommunications
ly on personal computers. If each computer is attached to a network, automatic
back up can be confgured two ways for individual personal computers. Individual
workers can save their data fles to a central fle server. The network manager then
makes daily (or hourly) backups of the data on the central server. A few compa-
nies even provide this service over the Internet. For a monthly fee, you can trans-
fer your fles to their server, giving you a backup copyplus they keep backup
tapes for the server. The second approach is to have backup software running on
the server query each users computer to obtain changed fles and save them au-
tomatically. This approach requires that the client computers remain connected to
the server and remain running, so it does not work well with laptops.
Special Processors and Grid Computing
Special computers that are relatively expensive can be attached to a network to
save costs and make it easier for users to access these machines. Parallel-process-
ing computers and other supercomputers can perform calculations thousands of
times faster than ordinary computers, but they are expensive. Consider a small
engineering company. For the most part, the engineers use their workstations to
develop their designs. They occasionally need to run simulations or produce de-
tailed graphics images. Both of these tasks could take many hours to perform on
individual computers. With a network, each workstation can be connected to a
supercomputer. When an engineer needs to perform high-speed calculations, the
job is sent directly to the supercomputer. The results are returned via the network
to the workstation so they can be added to the fnal report. More likely, a univer-
sity could own the supercomputer, and the frm would lease time to run each job.
If the network is designed properly, it makes no difference where the machine is
located.
Grid computing extends the concept of parallel processinginstead of having
multiple processors in one computer, you simply attach multiple computers to-
gether across a network. Remember that personal computers are relatively fast and
inexpensive. When you can buy a new computer for $500, it becomes possible to
build a huge amount of computing power by purchasing hundreds or thousands of
computers and spreading the work across all of them. With special software, the
job is split into multiple pieces and assigned to spare time on each computer. SETI
@home is probably the best-known example of this type of computing. However,
the same tools can be used within a single companytaking advantage of ma-
chines running overnight. Just keep in mind that running computers 24-hours a
day substantially increases the power consumption.
Sharing Software
Networks have been used at different times to share software. When disk space
was expensive, it was cheaper to put one copy of the software on a server and
download it to each computer as it was needed. Today, it is possible to run soft-
ware applications directly from a server, where client computers use Web brows-
ers to connect to the server and run the software. This centralization of software
and data leads to new ways to work and to manage companies. However, it raises
issues of reliability and security. Some of these are covered in more detail at the
end of this chapter. But the overall topics of management, centralization, and se-
curity arise in several other chapters.
145 Chapter 3: Networks and Telecommunications
Components of a Network
What components do you need to install to create a network?
As networks have become more important, the connection components are in-
creasingly built into the computers. However, you still face many decisions about
which technologies to use and how to solve problems, so all managers should un-
derstand the basic elements of a network shown in Figure 3.7. Each of these com-
ponents (computers, transmission medium, and connection devices) is discussed
in greater detail in this section.
Computers
Virtually any type of computer device can be connected to a network. The earliest
computer networks consisted of one computer with several terminals and printers
attached to it. These networks were fairly simple, because the one computer per-
formed all of the work. Substantially more problems are involved in connecting
several computers together. For starters, each computer needs to know that the
others exist and that they have a specifc location (address) on the network. The
computers need to know how to send and receive information from each other.
Just to connect to the network, they need LAN cards. Most desktop computers
have built-in LAN cards and connectors for wired networks. Most laptops also
have wireless network cards; some even have cards for cellular networks. For
now, most companies run a combination of both wired and wireless networks.
Most homes rely solely on wireless networks because no one wants to run cables
through the house.
Computers attached to networks tend to perform one of two functions: serv-
ers or clients. Servers are computers that store data to be used by other comput-
ers attached to the network. Clients are computers used by individual people.
Figure 3.7
Network components. Networks require a transmission medium and each device
connected must have a network card to make the connection. A switch connects the
devices in the LAN, and a router connects the LAN to the Internet. A frewall is often
used to flter out certain types of packets or messages so they do not transfer from the
Internet to the LAN.
LAN card
LAN card
LAN card
LAN card
Shared Printer
Server
Personal Computer
Personal Computer
Router
Internet
Firewall
Switch
146 Chapter 3: Networks and Telecommunications
Sometimes a computer is used as both a client and a fle server. Networks where
many of the machines operate as both clients and servers are called peer-to-peer
networks.
Servers
A wide range of servers exists todayfrom a simple PC to huge, expensive spe-
cialized computers. The main questions you face in choosing a server are the op-
erating system and the issue of scalability, and the two questions are intertwined.
Scalability is the ability to easily move up to greater performancewithout hav-
ing to rewrite all of your existing applications. Figure 3.8 shows two common
methods used to provide scalability: (1) a vendor-provided range of servers from
low-cost machines to handle small loads, to midrange, to high-capacity computers
that can handle millions of users simultaneously; and (2) integration technology
that enables the workload to be distributed across hundreds or thousands of small
servers, known as a server farm.
Both approaches have their benefts. The single server is easier to confgure and
administer. The server farm can be expanded easily and cheaply without disrupt-
ing the existing applications. The operating system software is crucial to making a
server farm work effciently. Several vendors sell enterprise versions of software
that assigns applications to the least-busy server and makes it easier to manage the
server farm.
Figure 3.8
Server scalability. Two common methods of providing easy expansion of
performance are (1) to purchase a faster performance server within the same product
family, and (2) to build a server farm where the workload is automatically distributed
across machines and new low-cost servers can be added at any time.
IBM Blue Gene/L
IBM PS700 Express
HP
Increasing
performance
within a
product family.
Server farms distribute
the workload. Add
more computers for
more power.
Rack mount
server farm.
IBM PS702 Express
(multiple blades)
https://asc.llnl.gov
147 Chapter 3: Networks and Telecommunications
Client Computers
The networked computers could be any type of machine. Because individual peo-
ple at their own desks typically use these computers, they are often called client
computers. These computers need to access the network and be able to send infor-
mation to at least one other computer. A network interface card (NIC) (or LAN
card) is installed in each computer. These cards are connected together by some
transmission medium (e.g., cable). In addition, these computers might have to be
confgured to connect to the network and set security parameters. Client comput-
ers today include laptops and PDAs that can be connected with wireless networks
to enable workers to maintain connections and share data while they move around
the building.
Many of the mobile devices have limited capabilities and essentially run brows-
ers, e-mail, and calendars. Hence, more of the processing is done on the server,
and the mobile device is only responsible for displaying data and basic user inter-
face tasks. This type of environment is considerably different from the situation
where all workers have desktop machines capable of handling large amounts of
the processing. The thin-client cell-phone applications rely on the server, while
the desktop applications simply use the server for basic data sharing. Develop-
ing applications for this new environment requires some major changes in de-
sign, programming, and securityissues that will be explained in detail in other
chapters.
Transmission Media
All communication requires a transmission medium. As illustrated in Figure
3.9, common methods include electric wires, light waves, and radio waves. Each
Figure 3.9
Signals can be sent via several types of media. They can be carried by electricity,
light waves, or radio waves. All of these methods have advantages and disadvantages.
Fiber optic cabling offers the fastest transmission rates with the least interference, but
because it is relatively new, the initial cost tends to be higher.
Radio or Micro Waves
Example:
Cellular phones
glass or plastic
Fiber Optic Cable
Example:
Long distance phone lines
antenna
Twisted Pair
Example:
reflective cladding
Coaxial
Example:
Cable TV
Local phone lines
148 Chapter 3: Networks and Telecommunications
method offers certain advantages and disadvantages, so they are designed for spe-
cifc applications. Installation costs for all types of cables are high, and most or-
ganizations keep cabling in place at least 10 years. Consequently, you have to be
careful to research the technologies when installing new cables to ensure you will
be able to support future needs.
Electric Cables
The two basic types of electric cables are twisted pair and coaxial. Twisted pair
is the oldest form of electrical wiring. Since electricity must travel in a closed
loop, electrical connections require at least two wires. Twisted-pair wires are
simply pairs of plain copper wires. Telephone cables are the most common ex-
ample of twisted-pair wires in households. Because of the cost, most businesses
have already installed twisted-pair wirestypically a specifc version known as
Cat 5 or Cat 6. These standards defne four pairs of wires. Older, slower networks
(100Base-T Ethernet) uses only two of the pairs (4 wires), but higher-speed net-
works (gigabit Ethernet) require all eight wires. Because of the extensive use of
Cat 5 cables, the network industry has invested considerable research into maxi-
mizing the data that can be carried over that type of cable. However, newer high-
speed transmissions systems might require better cables. The Cat 5e (enhanced)
standard would be the minimum for installing new cables, and depending on price
and location, you might consider Cat 6 or Cat 7, which is heavily shielded. But
check the prices. Cat 7 cable can be fve times more expensive than Cat 6
The biggest drawback to twisted-pair wires is that they are not usually shielded.
Consequently, the data signal is subject to interference from other electrical appli-
ances or cables. In particular, never run data cables next to power lines or electri-
cal motors. Additionally, the data cable length for most LANs must stay under 90
Reality Bytes: Excess Capacity
Partly because of crazy predictions of Internet growth, partly because of economies
of scale, and partly because of improved technologies, several long-haul data-trans-
mission companies overbuilt when installing fber-optic cables. In late 2002, only
2.7 percent of the fber was being useda whopping 97.3 percent was dark. Over
time, economics prevailed and bandwidth prices droppedat a rate of 65 percent per
year. Many of the large telecommunications frms fled for bankruptcy. The bank-
ruptcy flings generally erased the debts of the companiesenabling them to charge
even lower prices when returning. Prior to 1995, telecommunications companies
could send the equivalent of 25,000 one-page e-mails per second over one fber-optic
line. By 2002, advances in technology enabled them to send 25 million messages
over the same linean increase of one thousand times. The new technology called
dense-wave division multiplexing (DWDM), effectively splits light into multiple
colorsenabling the companies to send different messages on each color frequency.
By 2011, demand had started to cut into some of the excess capacity, but not enough
to begin installing signifcant new cables.
Adapted from Dreazen, Yochi, J., Wildly Optimistic Data Drove Telecoms to Build
Fiber Glut, The Wall Street Journal, September 26, 2002; and Berman, Dennis K.,
Technology Races Far Ahead Of Demand and the Workplace, The Wall Street
Journal, September 26, 2002.
149 Chapter 3: Networks and Telecommunications
meters (about 300 feet). You can extend the length by adding switches, but you
will be amazed at how quickly you can run into the limit when a cable needs to
turn corners and travel multiple foors. Despite these drawbacks, twisted-pair wir-
ing is the most common LAN cabling method in use today. Largely because of the
cost and the research that has led to huge performance capacities. Standard Cat-5e
wiring is capable of carrying data at 1,000 megabits per second (gigabit).
Coaxial cables were designed to carry more information than twisted pairs, with
lower chances of interference. Coaxial cable (often shortened to coax) consists of
a central wire surrounded by a nonconductive plastic, which is surrounded by a
second wire. The second wire is actually a metallic foil or mesh that is wrapped
around the entire cable. This shielding minimizes interference from outside sourc-
es. Cable television signals are transmitted on coaxial cables. Coax is capable of
carrying more information for longer distances than twisted pair. But, it is more
expensive and is rarely used outside the television industry.
Fiber Optics
A relatively recent invention (early 1970s) in communication uses light instead
of electricity. Because light generally travels in a straight line, it could be diffcult
to use for communication. Fiber-optic cable allows light to travel in straight lines
but still be bent around corners. A fber-optic cable consists of a glass or plas-
tic core that is surrounded by a refective material. A laser light is sent down the
cable. When the cable bends, the light is refected around the corner and continues
down the cable. Fiber-optic cable provides the advantages of high capacity with
almost no interference. The limitation in using fber is the higher cost of the cable
and the cost of the connectors and interface cards that convert computer electri-
Reality Bytes: LightSquared v. GPS
LightSquared is a startup company with a new technology to create a national wire-
less broadband system. The plan would entail installing 40,000 antennas around the
country. In early 2011, the company signed agreements with Best Buy and Leap
Wireless to enable them to sell wireless Internet access. Adding a new provider like
LightSquared would ultimately provide more options for consumers and provide
competition to ISPs such as the cable and phone companies. It would also provide
competition to mobile phone carriers. However, the frequencies LightSquared wants
to use are near the frequencies used for satellite signalsparticularly low-powered
GPS signals. In testing, the LightSquared devices were found to interfere with high-
end GPS devices, particularly those used by aviation, police, and agricultural appli-
cations. For instance, John Deere, the tractor company, said the devices created se-
vere interference as much as 20 miles away and complete loss of service between
four and 22 miles. LightSquareds executive vice president for regulatory affairs and
public policy, Jeff Carlisle, noted that LightSquared and BPS can and will be able
to coexist peacefully. Were committed to identify and resolving the issues through
this process. Ultimately, the FCC will decide whether to move forward and what
changes might have to be made. LightSquared later announced that it was moving to
a different frequency farther away from the GPS signals.
Adapted from Amy Schatz, LightSquareds Wireless Network Interferes With
GPS, The Wall Street Journal, June 2, 2011.
150 Chapter 3: Networks and Telecommunications
cal signals into light. For example, NICs for coaxial or twisted-pair cables can be
purchased for around $10, whereas NICs for fber-optic lines that run directly to
personal computers range from $50 to $400 (in 2011). The cards are harder to fnd
and more expensive, because it is rare to use fber lines to the desktop. A study by
Partha Mitra and Jason Stark showed that even fber-optic cables have limits. The
theoretical capacity of a single fber-optic cable is at least 100 terabits per second
(The Economist June 28, 2001 or Nature June 28, 2001). In 2011, two researchers
achieved this speed in demonstrations reported by New Scientist. Although it is
possible to run fber optics directly to your desktop, it is rarely worth the expense.
Fiber-optic connections are used for long distances, in areas with electrical inter-
ference, or when connecting buildings. In the mid-2000s, Verizon, the local tele-
phone company (not the cellular phone company) began installing thousands of
miles of fber cables directly to customer homes. The FiOS service is designed to
provide high-speed Internet connections (20 mbps or more), and ultimately video
on demand and other data-intensive services. Installing the fber into homes is
challenging because although fber cable does not have to be perfectly straight, if
it is bent too sharply or too many times, the light will bleed out at the corners and
the signal will disappear. Corning has an answer with a new fber that contains
nano-particles to allow fber cables to be wrapped around objects as small as a
pencil and still carry the light signal. However, it might take a couple of years to
create a factory that can produce the cable in large quantities (Mehta 2007).
Radio, Micro, and Infrared Waves
Radio, microwave, and infrared transmissions do not require cables. These com-
munication methods are called broadcasts. Any receiver or antenna that lies in
its path can pick up the signal. However, infrared transmissions and some mi-
crowaves require clear line-of-sight transmission. The major advantage of broad-
cast methods is portability. For example, computers can be installed in delivery
vehicles to receive information from corporate headquarters. Or individuals can
carry around laptops and cell phones and remain connected to the network. These
computers can communicate with each other and with a central database via a
broadcast network. For example, physicians in hospitals can carry small comput-
ers that automatically receive information for each patient when the physician en-
ters the room. Any instructions can be sent directly from the physicians computer
to the nursing station. In the business world, you can carry a cell phone or tablet
that maintains contact on the Internet to retrieve e-mail or scan Web sites while
you are in meetings, other offces, or a clients offce.
Broadcast media have two primary drawbacks. First, it is more important to
provide security for the transmissions. Second, broadcast transmissions are lim-
ited to a defned frequency range, which might be subject to weather, echoes, or
other interference and distance problems. Consequently, because the frequency
space is shared, it can become overloaded when too many people attempt to trans-
fer large amounts of data at the same time in the same location.
The problem of limited capacity arises because only a small number of radio
frequencies can be used to carry data. Most of the radio and television frequencies
are already being used for other purposes. Figure 3.10 shows some of the major
frequency allocations in the United States. The Federal Communications Com-
mission (FCC) allocated the personal communication service (PCS) bands in late
1993 for use by personal communication devices such as laptop computers and
personal digital assistants (PDAs). To provide these frequencies, the FCC had to
151 Chapter 3: Networks and Telecommunications
take them away from existing users. Imagine what would happen if computers
suddenly started sending information over the same radio frequency as that used
by your favorite radio station. You would not be able to hear the voices on the ra-
dio, and the computers would miss most of their data because of the interference.
All governments allocate the frequency spectrum for various uses, such as ra-
dio, television, cellular phones, and garage door openers. The PCS frequencies
were auctioned off to the highest bidders in 1994, raising more than $65 billion.
The frequency problem is even more complicated when the signals might cross
political boundaries. As a result, most broadcast telecommunications issues are
established with international cooperation. Some of the overcrowding problems
are being mitigated through the use of digital transmissions that cram more calls
and more data into the same amount of frequency space.
Despite these problems, an increasing amount of business communication is
being carried over radio networks. The International Telecommunication Union
reports that in 2002, both Taiwan and Luxembourg averaged about 105 cell phone
users per 100 people! In comparison with broadband Internet connections, in 2010,
The Netherlands led the way where 37.8 percent of the population had broadband
Internet access. The United States was ranked 14 at 27.1 percent; below Belgium,
Canada, the United Kingdom, several European nations, and Korea. (source: http://
www.oecd.org/document/54/0,3343,en_2649_34225_38690102_1_1_1_1,00.
Figure 3.10
Electromagnetic frequency spectrum. Communication techniques are essentially the
same for all media, because all waves physically have similar properties. However,
the different frequencies affect the communication performance. Shorter wave
lengths (higher frequencies) can carry more data. Some waves can travel longer
distances. Others are more susceptible to interference. In any case, there are a fnite
number of frequencies available for communication. Hence, the frequency spectrum
is allocated by governmental agencies. For complete details, see http://www.ntia.doc.
gov/osmhome/allochrt.pdf.
ELF VLF LF MF HF VHF UHF Microwave Optical
N
a
v
y
/
s
u
b
m
a
r
i
n
e
A
M
:
5
5
0
K
-
1
6
5
0
K
H
z
T
V
:
5
4
M
-
2
1
6
M
H
z
F
M
:
8
8
M
-
1
0
8
M
H
z
T
V
:
2
2
0
M
-
5
0
0
M
H
z
P
u
b
l
i
c
S
a
f
e
t
y
:
1
5
0
M
-
1
6
0
M
H
z
P
u
b
l
i
c
S
a
f
e
t
y
:
4
6
0
M
-
5
0
0
M
H
z
C
e
l
l
p
h
o
n
e
s
:
8
0
0
M
H
z
P
e
r
s
.
C
O
m
.
S
y
s
(
P
C
S
)
1
.
8
5
G
-
2
.
2
G
H
z
P
C
S
E
T
:
2
G
H
z
100 1K 100K 1M 10M 100M 1G 10G Hertz
152 Chapter 3: Networks and Telecommunications
html). On the other hand, advertised broadband download speeds in Japan and
Portugal greatly exceed those in the other nations; running at slightly over 100
megabits per second, versus about 14 megabits in the United States (OECD data).
The OECD data show monthly prices in Japan are about equal to U.S. prices. In
US dollars, from $20 55 per month.
Although wireless Internet connections are not yet as fast as broadband con-
nections, it is substantially less expensive to reach people with wireless connec-
tions. Already, in many nations, the number of cell phone subscribers exceeds the
number of fxed telephone subscribers. According to the OECD, Korea tops the
national list in terms of percentage of the population that has wireless broadband
access (95 percent). In the U.S. 44 percent of the population had broadband wire-
less data plans.
Wireless is an increasingly important method for connecting computers and
equipment. Historically, cables were the most common method of connecting ma-
chines, but people keep acquiring more devices and the tangle of cables is getting
out of control. In addition, people are placing more value on portability and the
need to access networks and data constantly. As a result, Figure 3.11 shows that
multiple levels of wireless connections are being developed. In terms of wider net-
work connections, you can use the cell phone system or WiMax which give you
a range of 2-10 miles from an antenna. These frequencies are shared and usually
regulated, so you have to purchase access through a commercial carrier (phone
company). Availability is generally limited to major cities or highways, but are
Reality Bytes: Please Stop Watching Video So I Can Send e-Mail
From late 2010 to 2011, cell phone companies began rolling out fourth-generation
(4G) services. Or they called them 4G service. Some, such as Verizons LTE, have
substantially faster data transmission rates. Early reports showed download speeds
of 12 Mbps or more on Verizons LTE networkalthough minimal competition ex-
isted so speeds might drop. Through more effcient use of the available bandwidth,
LTE can provide as much as 20-times the capacity of older 3G networks. The only
problem is that mobile data traffc is growing even faster. Cisco expects traffc to in-
crease by an average of 92 percent every year from 2011 through 2015. Most of that
growth will be due to video. Ciscos estimate might actually be low. Over the frst
four years that AT&T sold the iPhone, data traffc on its networks increased 8000
percent. Patrick Lopez, chief marketing offcer for Vantrix, noted that By the time
4G-LTE is mass market, all it will have done is allow wireless companies to keep up
with the problem. The FCC notes that the wireless spectrum surplus of 255 MHz
in 2011 will become a defcit of 275 MHz by 2014. The government is committed to
freeing up an additional 500 MHz of spectrum for wireless communication. Wireless
spectrum and effciency is a critical issue to handle traffc between towers and users
cell phones. Backhaul, or the connections from the towers to the main Internet con-
nections, is another problem. The big problem is that all of these changes take years
to implement. In the short run, wireless providers are likely to advertise high-end
video capabilities, and then charge a fortune to download the amount of data needed
for high-quality video.
Adapted from David Goldman, 4G Wont Solve 3Gs Problems, CNN Online,
March 29, 2011.
153 Chapter 3: Networks and Telecommunications
acceptable for most business uses. WiMax is a relatively new technology that is
designed to transfer wireless data over relatively long distances. Two primary fre-
quency ranges are usedthe most common one requires a license in the U.S. but
not in Europe, so it is best used by commercial providers.
Most people are familiar with WiFi technologies because access points are
relatively inexpensive and commonly installed in homes. WiFi enables multiple
computers to connect to an Internet connection and is particularly useful for en-
abling laptop users to wander around a house or small offce and remain con-
nected to the network. Early versions were relatively slow and could support only
a few users. The newest version (802.11n) can have data rates of 100-200 mbps or
perhaps higher. The key defning feature of WiFi is that it has a maximum range of
about 300 feet (outdoors). This range reduces interference from other devices, but
means businesses have to install multiple access points to cover large buildings.
After several years of marketing by IBM, the Bluetooth wireless standard is
becoming more popular. It has a range of 10-30 feet and version 2 has a maxi-
mum speed of about 2 mbps. The proposed version 3 increases the speed to 24
mbps. Today, Bluetooth is commonly used for connecting wireless headsets to
cell phones. It could also be used to connect cell phones to each other or to other
devices, but there are almost no other applications that use this technology at this
time. The distance limitation and the built-in security provisions make it useful for
short-distance, temporary connections.
From a technology perspective, ultra-wideband (UWB) is a more interesting
short-range wireless technology. Unlike traditional wireless systems, UWB sig-
nals use a huge amount of frequency bandwidth (more than 500 MHz). Normally,
this approach would interfere with other devices allocated to those frequencies,
Figure 3.11
Wireless technologies. Competition for bandwidth causes tradeoffs. Wide-area
technologies like cell phones and WiMax have limited bandwidth to reduce
interference. Wi-Fi is a medium-range local area network technology. Bluetooth and
Ultra-wideband are personal area technologies used for replacing cables for short-
range connections.
Cellphone or WiMax
2-10 miles
128 kbps - 3mbps
Wi-Fi
50-200 feet
11 mbps - 200 mbps
Bluetooth
10-30 feet
1 mbps
Ultra-wideband
10-30 feet
1 gbps
154 Chapter 3: Networks and Telecommunications
but UWB devices use low power levelsso that they appear as minor noise to
any other device and are ignored. With the low power levels, they have a range
limited to a few feet. On the other hand, UWB signals can carry huge amounts of
data, in the range of 500 mbps to 1 gbps. This speed provides the ability to elimi-
nate short cables for many devicesincluding video. For example, your digital
camera or game machine could use UWB to connect to a television set without us-
ing cables, or your laptop could connect to the conference room projector without
wires. At the moment, UWB is most commonly used for its side applicationas
short-range radar that can see through walls. Police and military organizations use
this technology to locate people in crisis situations.
Figure 3.12
Transmission capacity. Fiber-optic cables have the greatest capacity and they are
immune to most traditional interference. However, they are expensive to install and
repair. Most frms use twisted-pair or wireless connections within buildings and fber-
optic cables to connect buildings. You can purchase almost any Internet connection
speed that you are willing to pay for. Leased line rates are negotiable and depend on
distance and degree of local competition.
LAN Name Format Speed (mbps)
10Base-T Twisted pair 10
100Base-T Twisted pair 100
Gigabit Ethernet Twisted pair 1,000
Wireless LAN 11b, a,g Wireless 11-54
Wireless LAN 11n Wireless 250
fber FDDI Fiber optic 100
fber ATM Fiber optic 155
fber high-end Fiber optic 100,000,000 (100 terabits)
Internet Connection Format Speed (mbps) Estimated Cost
Dial-up Twisted pair 0.05 $20/month
DSL Twisted pair 1.5+down/0.5up $50/month
Cable modem Coaxial 6+ down/1 up $50/month
Satellite Microwave 1.5down/0.25up $50/month
Wireless/WiMax Microwave 1.5-6down/0.25+ $40/month
T1-lease Twisted pair 1.544 $400-$700/month
T3-lease Fiber optic 45 $2,500-$10,000/mo
ATM Fiber optic 155 $15,000-$30,000/mo
OC-3 Fiber optic 155 $16,000-$20,000/mo
OC-12 Fiber optic 622 $20,000-$70,000/mo
OC-48 Fiber optic 2,488 $50,000-?/mo
OC-192 Fiber optic 9,953
OC-768/future Fiber optic 39,813
155 Chapter 3: Networks and Telecommunications
Transmission Capacity
As shown in Figure 3.12, transmission capacity is often measured in millions of
bits per second. Each transmission medium has a different maximum capacity.
Twisted pair can be relatively fast for short distances, but fber optic is substan-
tially better for longer distances. Getting a faster Internet connection is primarily
an issue of cost. Fiber-optic cable might also carry a high installation cost if there
are no fber-optic connection points near your offce. Today, twisted pair lines are
commonly used for local area networks, but each connection run must be less than
95 meters (about 300 feet). Fiber optic lines are used between buildings and for
long-distance connections.
The effect of the transmission capacity is shown in Figure 3.13. For small text
and data fles, the speed is not critical. Even slow dial-up lines can transfer a full
page of text in a short time. The problem arises when you want to transfer more
complex data like photos or even video. This fgure shows why designing Web
pages carefully is still so important. When over 75 percent of your clients are
using dial-up lines, you need to limit pages to around 50,000 bytes, which takes
at least 8 seconds to download. Most people will not wait more than 15 seconds
for a page to load. Now you can see why Internet video is so diffcult even with
marginal quality. Even with video at broadband speeds of 1.5 mbps, site designers
have to restrict the video to small sizes (one-fourth of a TV screen or smaller), use
slower frame rates (as low as 15 frames per second), and employ lossy compres-
sion. These actions cut the video size by at least 1/8 (1/4 size * 1/2 frames). At
that size, the 10 seconds of video could be sent in 10 seconds (80/8). Compression
lets the developer specify a bit rate, and sites like YouTube tend to stay under 256
kbps, which reduces the quality.
Transmission delays are another important issue for some types of network
uses. Latency is the time it takes for your signal to reach its destination. It is af-
fected most by the speed at which the signal can travel across your connection
medium. Fiber optic signals are fastest because they travel at the speed of light
Figure 3.13
Importance of transmission capacity. Text is not a problem even for slow dial-up
lines, but images and video can be slow even over relatively high-speed Internet
connections.
Transmission speed Text Image Video (10 sec.)
Bytes 10,000 500,000 15,000,000
Bits (Bytes * 8) 80,000 4,000,000 120,000,000
Seconds
Dial-up 50 kbps 1.6 80 2400
DSL1.5mpbs 0.05 2.67 80
LAN 10 mbps 0.008 0.4 12
LAN 100 mpbs 0.0008 0.04 1.2
Gigabit 1 gbps 0.00008 0.004 0.12
156 Chapter 3: Networks and Telecommunications
Technology Toolbox: Creating Web Pages
Problem: You need to share information with others on the Internet.
Tools: Several tools exist to create Web pages, but at heart, Web pages are simply
text fles. The pages are written in the hypertext markup language (HTML). HTML
consists of a few dozen tags that tell the browser how to display a page. A simple
page can be written as:
<HTML>
<HEAD><TITLE>Sample HTML Page</TITLE>
<BODY>
<H1>Section One</H1>
<P>Tisisasampleparagraphonasamplepage.</P>
</BODY>
</HTML>
You can memorize the various tags, or you can use an editor to simply type the
text and let it generate the tags. However, if you are creating pages for the Internet,
avoid using document editors like Microsoft Word because the additional material it
inserts makes the pages considerably larger than necessary.
Web pages display images using the <IMG SRC=myfle.jpg> tag. You must be
careful when creating image fles to store them in a standard format: (1) graphics in-
terchange format (GIF), (2) joint photographic exports group (JPEG), or (3) portable
network graphics (PNG). You must be even more careful to watch the size of the fle.
A modern digital camera can create photographs that are 15 megabytes! Think about
how long it would take a browser to download a fle that large. In general, you must
keep the total size of a page below 100 kilobytes.
Links are created with the anchor tag: <a href=annual.html>Annual Results</
a>. The text or image between the starting and ending tags will be displayed to the
user. Clicking on the link opens the fle shown in quotes.
When you are creating an entire Web site, you need to use a style sheet. A style
sheet contains a list of styles (fonts, sizes, colors, margins, and so on) that will be ap-
plied to the various elements on a page. For instance, you could specify that the main
heading style (H1) would use an Arial typeface at 14 points in blue. The power of
the style sheet is that all styles are defned in one place. By changing the style only
once, every page on your site that is linked to that style sheet will automatically be
displayed with the new style.
HTML is easy to use, but if you need more precise control over the page lay-
out, you should use Adobes portable document format (pdf). You can buy software
that saves documents in this format. Browsers can download the Acrobat reader free
from Adobes Web site. This method is commonly used to distribute detailed docu-
ments such as t ax forms and posters.
Quick Quiz: Search the Web, or create a document and View the source to do the
following:
1. Display a word or phrase in boldface.
2. Link a style sheet to an HTML page.
3. Display a table with three rows and four columns.
4. Display a numbered list of fve items.
5. Display an icon in GIF format with a transparent background.
157 Chapter 3: Networks and Telecommunications
and require fewer repeaters. Electrical signals are also relatively fast, but the over-
all latency can be higher if the signal needs to travel through multiple repeaters
or switches. Microwave signals tend to be the slowest and subject to interference
from the weather. Satellite connections tend to have the most latency because the
signal has to travel from the ground, across 23,000 miles of space to a satellite and
another 23,000 miles back down to the base station. This delay can easily reach
a half-second or more and makes it diffcult to use satellite connections for some
purposessuch as multiplayer games. Note that latency is independent from the
bandwidthso an ISP can advertise that it provides a 1 mbps satellite connection,
but the delay due to latency might cause problems with how you want to use the
network.
Connection Devices
To reduce overall traffc, larger organizations often fnd it benefcial to build the
corporate network from a set of smaller networks. Both large and small compa-
nies use similar techniques to connect their networks to the Internet. Figure 3.14
shows a common confguration. Computers within a building or smaller area are
linked into a hub, switch, or router. This interconnection device is then linked to
the backbone, which is typically a fber-optic line. A specially-confgured router
then connects to the Internet.
If you look at the physical box, it can be diffcult to tell the difference between
a hub, router, and switch. However, internally, they function quite differently, and
you need to understand those differences to decide how a network should be con-
fgured. Hubs are the simplest connection devices. They essentially act like a gi-
Figure 3.14
Connecting networks. Several challenges arise if you build an enterprise network.
An enterprise network often connects many smaller networks established in different
departments, buildings, or even nations. The hardware and software components
must follow standards so they can communicate. An MIS team has to manage the
overall structure to maximize effciency, avoid duplication, and solve problems.
Backbone fiber optic
Hub
Switch
Hub
Radio-based network
Internet
Routers or Switches
158 Chapter 3: Networks and Telecommunications
ant junction box. Any device connected to a hub shares all of the lines with the
other devices. It is just a mechanism to plug several computers together. Switches
and routers actually examine every packet that passes through them and decide
where to send each packet. They are actually specialized computers that can be
programmed to identify network problems and intelligently route traffc to the
fastest route.
Routers and switches are crucial to improving effciency in large networks. In
many respects, a router works like a post offce. It examines the destination ad-
dress of each packet of information and selects the best way to send that packet.
Routers and switches improve performance by choosing the path of the message
and segmenting large networks into smaller pieces. For example, router segments
might be assigned to each department of a large company, where each department
has its own server. Most of the messages stay within the specifc department, so
they do not take up bandwidth across the entire company. Only messages that
truly need to be sent to other areas will be transmitted outside the departmental
segment.
The main differences between switches and routers consist of how each one
identifes other objects on the network. Switches use physical addresses that are
assigned to each network interface card. Routers use a logical address that is eas-
ier to change. Routers also contain more intelligent routing algorithms. They can
analyze traffc patterns and communicate more data with other routers to fnd the
best transmission path. Switches are commonly used to isolate traffc within a lo-
cal area network, and routers transfer data across longer distances and more com-
plex networks such as the Internet. It is possible to build a network entirely based
on routers, but it is usually cheaper to use switches where possible. Just keep in
mind that most switches cannot transfer data beyond seven hops, so if you need
lots of connections, you will have to add routers.
Figure 3.15
Network packets. All data is converted to digital form and broken into small packets.
Each packet contains a destination and source address, along with sequencing
instructions. The packets can be sent over different routes or mixed with other
packets. At their destination, the original message is restored by the network.
Voice
Computer
Sent as packets: 1 2 3 4 5
Sent as packets: A B C D E
Chicago
New York
Dallas
Atlanta
E
4
C
B
2
A
1
5
D
3
159 Chapter 3: Networks and Telecommunications
Network Structure
How can multiple users share a single network? Transferring data
between two devices is relatively easyyou just fnd a way to physically con-
nect the two computers and install some software to handle the communication.
You might be able to build a network that works the same wayby connecting
each computer to every other computer. But eventually the cabling costs would
be huge. Instead, at some point communications travel over a shared link. Think
about a network between two cities (say Los Angeles and Boston). Computers
within each city might be connected to each other, but they all share one long-dis-
tance line to transfer data between the two cities. Almost all networks are built us-
ing shared communication links. Several methods exist to share data connections,
and the method can affect the overall performance of the network. But, it is also
important to remember that the number of people and their usage of the network
will affect your performance. Shared networks require careful managementpar-
ticularly when a few bandwidth hogs exist.
Network Packets
A key feature in sharing networks is that data is transmitted in small batches. All
data, including voice and video, is converted to digital form. The data is split into
smaller packets that contain a source address, destination address, and a sequenc-
ing method. The packets tend to be a uniform size (a couple thousand bytes) and
Figure 3.16
Shared connections. Some networks rely on sharing the transmission medium with
many users. Sharing means computers must take turns using the network. Sometimes
one or two highly active users can slow down the network for everyone, so you will
not really get the listed transmission capacity.
With shared connections, machines have to take turns, and congestion
can slow down all connections.
With switched connections,
each computer has the full
bandwidth of the connection
at all times. Performance
depends on how fast the switch
can handle connections.
160 Chapter 3: Networks and Telecommunications
prevent one user from monopolizing the connection. They also make it easy for
a single network to handle data, voice, images, and video. The network simply
focuses on routing the packets to the appropriate destination. Figure 3.15 shows
an example of voice and computer data being sent over the same network. The
switches and routers choose the best path to send the data when each packet ar-
rives. The network delivers the packets to the appropriate receivers in the proper
sequence.
Today, most networks use the protocols defned in the Internet standards. The
Internet is capable of carrying any type of data packet; however, one catch with
the standard Internet is that there is no service guarantee. Your packets could be
delayed or lost along the way. Most applications have a method for recognizing
lost packets but it takes time to retransmit the packet. This issue is minor for Web
sites and e-mail, but can become annoying if you want to use the connection for
phone calls. Newer versions of the Internet protocols provide support for guaran-
teed levels of service. But, so far network companies have not devised methods to
implement and charge for quality of service (QOS). Part of the problem lies with
the need to communicate across networks owned by multiple companies. There
is also a question of whether people are willing to pay extra for a defned level of
quality. However, it is possible that someday you will be able to conduct video
meetings by reserving a certain level of speed at a set time.
Shared Connections
Figure 3.16 shows that individual machines can be connected to a shared medium
or they can be connected individually to a switch. However, the switch uses a
shared medium to connect to other switches and routers; so ultimately, connec-
tions are shared at some point on almost any network. Wired local area networks
commonly use switches to separate traffc within departments or physical areas.
Wireless (and cell phone) networks require all computers to share the same radio
frequencies. Some of the most advanced sharing technologies have been created
to handle the huge increases in traffc experienced with cell phone networks.
Figure 3.17
Time division. Only one machine or person can send data at a time. Data is limited to
short packets to prevent one communicator from monopolizing the time.
A B
D C
time
A C A C A
161 Chapter 3: Networks and Telecommunications
In theory, all communication systems that share a communication medium
share the same problems. The solutions to the problems are similar regardless
of the communication technology. In practice, engineers point out that the tech-
niques require considerable modifcation depending on the physical connection
method, but you will have to study the engineering books to understand those
details. For now, think about the protocols that people have created to handle a
common shared-communication environment: the classroom.
What happens if everyone tries to talk at the same time in a classroom? Is it
possible for more than one person to talk at one time? The common answer is
that only one person is allowed to talk at a time. A signaling mechanism (rais-
ing your hand or being recognized by the leader or instructor) is used to identify
which person gets to speak. Typically, the leader also limits the time any person
is allowed to speak. Figure 3.17 illustrates the basic process of time division
multiplexing (TDM). Only one machine or person can communicate at a given
time. Rules or protocols determine who gets to send a packet, what to do if two
machines try to communicate at the same time, how to address the packets, and
the length of the packets.
If you think about the problem for a whileand engineers have been thinking
about the problems for many yearsyou might fnd a second solution. If every-
ones hearing is good enough, it would be possible for two people to carry on a
conversation at the same time in the same room. Simply ask one pair to com-
municate at one frequency (sing soprano), and the other pair to communicate at a
different frequency (sing bass). In electronics terms, it is relatively easy to share a
communication line by using this frequency division multiplexing (FDM). Fig-
ure 3.18 shows the basic processit has been in common use for decades. Radio
and television stations are assigned separate channels (frequency ranges) so they
can broadcast at the same time without interfering with each other. The telephone
network was an early adopter of this approachlimiting the frequency range of
conversations to about 3000 Hertz and shifting connections to different frequen-
Figure 3.18
Frequency division. Each pair communicates at a different frequency (pitch). Radio
and television stations work this way by using assigned frequency ranges (channels).
f
r
e
q
u
e
n
c
y
3500 Hz
A
C
A B
D C
162 Chapter 3: Networks and Telecommunications
cies so they could be simultaneously transmitted across expensive long-distance
lines.
With a little more thoughtand a focus on packetsyou will see that it is pos-
sible to combine both frequency and time division into direct spread spectrum
(DSS). As an interesting historical footnote, the original patent for the technique
was granted to actress Hedy Lamar and composer George Antheil in 1942, during
World War II. Hedy recognized that a piano-roll mechanism could be used to shift
radio frequencies at random to prevent opponents from intercepting or jamming
radio transmissions.
Figure 3.19 illustrates the process. When a computer or cell phone wants to
transmit a packet, it checks for an open frequency slot. At each time interval, that
frequency might shift, so the receiving computers listen to all available frequency
slots and check the destination addresses of each packet. Today, the key beneft
lies in its ability to fully utilize the available bandwidth. Allocating fxed frequen-
cies to everyone is ineffcient because many of the frequencies will be unused at
any point in time. Splitting the communication by time and frequency enables
each transmitter to choose any available open frequency. Remember that commu-
nication frequencies are tight in every nation. Yet, researchers have shown there
is plenty of bandwidth availableif all transmissions were converted to spread
spectrum. Because of the technical and political issues, this change is unlikely to
happen soon. However, almost all new applications use spread spectrum technolo-
gies within a defned frequency range.
One cellular phone manufacturer (Qualcomm) invented a radically new method
of sharing a communication medium. Today, the Verizon network uses this tech-
nique to provide high-speed voice and data communications to its cell phone cus-
tomers. Newer proposals for cell phone networks have discussed using similar
technologies. The method begins with DSS, but every transmission also incorpo-
Figure 3.19
Spread spectrum. Radio networks share the scarce airwaves by breaking
communications into small packets that are sent at different frequencies and time
slots. In a given time slot, if one frequency is not available, the transmitter shifts to
the next frequency. If all frequencies are being used, the transmitter must wait for the
next time slot.
f
r
e
q
u
e
n
c
y
time
A B
D C
163 Chapter 3: Networks and Telecommunications
rates a unique ID code. By adding some mathematical calculations to every device
(including the cell phone), multiple devices can transmit at the same time on the
same frequencyusing the math to recover separate data packets. This code-divi-
sion multiple access (CDMA) method is effcient, but patent and licensing battles
have made other providers reluctant to adopt it.
Managing Shared Networks
As the number of users increase on a network, it is likely that the network will
encounter congestion problems. For example, the AT&T cell phone network was
widely criticized when it was the sole provider of the Apple iPhone. In some ma-
jor cities including New York and San Francisco, many users reported problems
with dropped phone calls. Similar problems can happen with any shared connec-
tion when traffc reaches the bandwidth capacity. For example, most cell phone
networks face problems if a major crisis hits a particular location and thousands or
millions of people all try to use their phones at the same time. Related problems
happen with data networks. Most Internet providers provide data capacity based
on the typical usage rates. For example, as shown in Figure 3.20, an Internet
connection might have a data capacity of 1.5 mbps, and that line might be con-
nected to 10 households. As long as each household uses typical Web browsing
at random times, the data will transmit quickly enough that interference will be
low and users will mostly see the full transfer rate. But, what happens if three
Figure 3.20
Managing shared networks. Some network applications use signifcantly more
bandwidth or capacity. If a small number of advanced users eat up the shared
capacity, does that make them bandwidth hogs?
Phone or Cable
Company/ISP
Shared: 1.5 mbps
1. Each person views simple data/Web pages.
Capacity is not pressed. Usage is even.
2. One person views 1mbps streaming video.
Capacity is pressed. All traffic slows down.
Is this person a bandwidth hog?
164 Chapter 3: Networks and Telecommunications
users start watching hours of streaming video that requires 500 kbps per person?
These three people will effectively use up the entire capacity of the shared line.
Streaming video can be a problem on many networks. The BitTorrent data transfer
program can also be a problem because it tries to utilize as much bandwidth as
possible and is often used to transfer huge fles.
Internet and cell phone providers (along with your university network manag-
ers) have faced congestion issues for years. As new network applications have
emergedparticularly videothe capacity demand has continued to increase. In
any shared network, some early adopters are likely to use the new applications
more than other people. Consequently, their bandwidth or capacity usage will be
higher than other users. Is that bad? Some commercial networks have approached
the problem by labeling them bandwidth hogs and imposing penalties for anyone
who uses the network more than others.
Managing a commercial network is more complicated than it appearsand it
already seems hard enough. In addition to installing lines and keeping the network
switches and routers running, the commercial providers have to determine pricing
and fnd ways to encourage people to choose their network, yet keep costs low
enough to earn a proft. And that does not begin to deal with any of the security is-
sues covered in Chapter 5. To obtain customers, many companies offered all-you-
can-eat data plans for a fxed monthly fee. But, new applications were developed
including video, large-fle sharing (BitTorrent), and Web video conferencing; and
these new applications require considerably more bandwidth than simple e-mail
and Web browsing. Some people adopted the new applications quickly, with the po-
tential to cause congestion for everyone. Ideally, network companies would expand
their capacity and provide higher speeds for everyonebut that increases costs,
and some people are likely to consume bandwidth no matter how much is available.
RealityBytes:VideoTraffcfromNetFlix Dominates the Internet
For many years, peer-to-peer fle sharing dominated the traffc fow on the In-
ternetparticularly in the United States. Many people used BitTorrent to exchange
large data flesparticularly video, and often illegally. By May 2011, NetFlix, with
its online subscriptions, had taken over the number one position in terms of total data
transferred on the Internet. The traffc account for 22.2 percent of all U.S. broadband
traffc. BitTorrent was still a close second at 21.6 percent. The percentages are based
on the actual usage or volume of traffc, not on the bandwidth capacity. The main
reason for the increase is the relatively low price of $9 per month for a subscription.
Experts estimate that it costs NetFlix between 2-10 cents to deliver a movie online,
based on server and bandwidth costs. The licensing costs are higher but the exact
cost is not available.In some ways, todays Internet business world is like the early
days of businessyou simply did not trust anyone you did not know. As economies
grew, states learned to control fraudulent businesses by requiring them to register.
Today, legitimate businesses are registered with at least one state government and
must fle annual forms and provide legal contact information. Most of this data is
accessible online. Is it really any different to require people to fle legitimate contact
information for online registrations?
Adapted from Ryan Singel, Most Content Online is Now Paid For, Thanks to Netf-
lix, CNN Online (Wired), May 18, 2011.
165 Chapter 3: Networks and Telecommunications
Figure 3.21 outlines some of the options available to manage traffc on net-
works to reduce congestion. Most commercial and university networks use a
combination of the choices. In some ways, prioritizing traffc can be the most
neutral. Network devices can monitor the type of data carried by each packet and
determine how quickly to send the packet. High-bandwidth, low-value packets
are delayed when network usage is high. For example, e-mail is often given high
priority, while online games and fle sharing are given low priorities. The packets
eventually get delivered, but users of those applications see substantially slower
data rates. A few providers have implemented plans to reduce the data speeds for
specifc users. Once a person exceeds a certain amount of data transfer for the
month, their future usage will be slowed down for a month.
Cell phone providers have become the most creative in terms of pricing. An
economist would observe that congestion pricing mechanisms are more effcient
than arbitrary limits. The catch is that marketers want to sell phones and services
by offering more open-ended plans, and customers get nervous about data caps.
Most vendors have implemented simple tiered data plans, where customers pick a
plan by estimating monthly usage levels.
However, data caps are often set relatively low and they can be easy to exceed.
For example, consider a monthly cap of 5 gigabytes (GB). Then consider a 4G
Figure 3.21
Options for managing network traffc. Commercial networks are trying several
methods to reduce the congestion caused by advanced users. Prioritizing certain types
of traffc can be a good solution, but it could also be abused. Pricing based on usage
makes the most sense economically, but it can be harder to implement and harder to
sell to customers.
Prioritize Traffc
- Slow down some usersperceived hogs.
- Slow down based on type of traffc.
. Packeteerexamine packets to identify.
. Connection port (rare).
- Sell quality of service (rare yet).
Pricing Mechanisms with Data Caps
- Overage fees.
- Differential pricing.
- Time-of-day pricing (rare yet).
- Potential problems as speed increases (4G cell).
. Medium quality is at least 1 GB/movie.
. Common data cap of 5 GB/month.
. At 5 mbps, 5 GB cap reached in 133 minutes.
Net Neutrality Proposal
- What if a commercial network tries to slow down traffc from a
competitor?
- Example: Comcast owns NBC (2011/01)
- But can neutrality be defned to still allow networks to man-
age traffc?
166 Chapter 3: Networks and Telecommunications
cell phone that can download data at 5 megabits per second. That phone would hit
the data cap after only 133 minutesor about one high-quality movie. (Calcula-
tion: 5 billion Bytes * 8 bits/Byte / 5 million bits/second / 60 seconds/minute).
Before you make any hasty decisions about the managers of networks, think
about the problem from a business perspective for a minute. What happens to
the network if ten people want to stream a movie at 5 mbps at the same time? Ef-
fectively, that generates 50 mbps demand. How much capacity can be built into
the network? What if 100 people do the same thing? That amounts to 500 mbps
simultaneous demand. How are you going to build a network that can handle that
level of traffc? And you are still looking at only 100 people on the network. Digi-
tized voice is only 64 kbps, so the high-defnition movie takes about 80 times the
bandwidth as a phone call. Either you need a massive increase in network capac-
ity or some way to discourage people from using high-bandwidth applications.
Although, you might want to talk to the marketing people about toning down the
advertising telling people they can watch movies on their cell phones.
Standards
How is it possible that you can connect your computer to a net-
work at the offce, at home, or while on the road, even over-
seas? Standards are agreements among vendors, customers, and nations. If ev-
eryone follows the standards, equipment can be connected, data can be shared,
and you can connect your computer to the network anywhere in the world. But
evolving technologies and competition signifcantly complicate these tasks. Set-
ting standards and moving to new ones is always a challenging task. However, the
Internet exists because of standards.
Te Need for Standards
Standards are important with networks. Many different types of computers and
connection devices exist. Each computer and network company has its own idea
of which methods are best. Without standards, there is no way to connect comput-
ers or networks produced by different vendors. Standards are also supposed to
protect the buyers from obsolescence. If you install network equipment that meets
existing standards, you should be able to buy products in the future that will work
with it.
Unfortunately, the process is complicated because several standard-setting or-
ganizations exist. Each major country has its own standards organization such
as ANSI, the American National Standards Institute, plus several international
organizations exist, such as ISO and the ITU (International Telecommunications
Union, renamed from CCITT), charged with defning computer and communica-
tion standards. In addition, manufacturers of computers and telecommunications
equipment try to defne their own standards. If one companys products are chosen
as a standard, it gains a slight advantage in design and production.
It is not likely that typical managers will be involved in the issues of setting
and choosing communication standards. Yet, as a consumer, you need to be aware
that there are many standards and sometimes variations on the standards. (In this
industry, a standard does not mean there is only one way to do something.) When
you are buying telecommunications equipment, the goal is to purchase equipment
that meets popular standards. It is not always easy to decide which standards will
become popular and which ones will be abandoned.
167 Chapter 3: Networks and Telecommunications
A Changing Environment
Why are there so many standards? It would be far simpler if everyone could agree
to use one standard and build products that are compatible. The problem with this
concept is that technology is continually changing. Thirty years ago, phone com-
panies never considered using digital transmission over fber-optic cables, which
is the dominant form of long-distance transmission used today. When the Internet
was frst created, the technology of the time would not handle the billions of ad-
dresses we need today.
As each technology is introduced, new standards are created. Yet we cannot
discard existing standards because it takes time for frms to convert to the new
technology. Besides, as manufacturers gain experience with a technology, they
add features and fnd better ways to use the products. These alterations usually
result in changes to the standards. An additional complication is that many com-
panies are modifying their products at the same time. It is hard to determine in
advance which changes are worthwhile and should be made standards.
The net result is that standards can be useful, but managers have to be care-
ful not to rely too much on a standard. First, remember that even if two products
support a standard, they still might not work well together. Second, if you choose
a standard for your department or company, remember that technology changes.
Corporate standards should be reevaluated every year or so to make sure they are
still the best solution. Global standards are required to ensure compatibility of net-
works and effcient routing of data.
Internet TCP/IP Reference Model
The Internet transmission protocol standard is an important standard. It also helps
you understand how networks operate and how the Internet works. As shown in
Figure 3.22, the TCP/IP (transmission control protocol/Internet Protocol) refer-
ence model breaks the process into four layers: application, transport, Internet,
and physical. Breaking the process into separate layers is critical to building large
networks. Each layer can be handled independently of the others. For example,
at the physical layer, replacing a wired connection with a wireless one should not
affect any of the higher layers. The physical layer devices simply have to provide
the same functionality to the Internet layer.
Figure 3.22
TCP/IP reference model. The model illustrates how data from an application like
e-mail is turned into packets at the transport layer, routed to the destination at the IP
layer, and physically transferred as bits at the physical layer.
Message
Header 3 Trailer 3 Message
Header 3 Trailer 3 Message Header 2 Trailer 2
Header 3 Trailer 3 Message Header 2 Trailer 2 Header 1 Trailer 1
4. Application
3. Transport (TCP)
2. Internet (IP)
1. Physical
168 Chapter 3: Networks and Telecommunications
Technology Toolbox: Transferring Files on the Internet
Problem: You need to transfer data fles to a Web site.
Tools: It is relatively easy to transfer fles from your computer to another computer
connected on a local area network. Assuming that you have the proper security per-
missions, you can see the other computer as if it were another disk drive and drag-
and-drop the fle. But no company is going to open its network to allow you to do the
same thing across the Internet. So, how do you transfer fles to a Web server if it is
not located on your LAN?
Connection Strengths Weaknesses
FTP Inexpensiveandeasytouse. Nosecurity.
FrontPage Very easy to use with secure
login.
Limited availability and users have to
purchaseclientsoftware.
WebDAV Internet standard and can
besecure.
Web server security is weaker by allowing
directorybrowsing.
VPN Verysecure. Need to purchase server and client
softwareandrequiresextrasetupsteps.
Surprisingly, given how frequently people need to transfer fles, this question does
not yet have a good answer. An older method still in use is the fle transfer protocol
(FTP). Your Web browser probably supports drag-and-drop with ftp. You can enter
an address like ftp://myserver.com/www, and the browser will connect and display
a list of fles in the folder. Then you can drag-and-drop your fles or an entire folder
onto the folder window and it will be transferred to the server. The drawback to FTP
is that passwords are sent in the clear and might be intercepted by hackers. Most
companies today require that you transfer fles using secure FTP tools that automati-
cally encrypt login and fle data. These systems require your client computer to have
special software that matches the servers encryption.
The Internet community has developed the Web distributed authoring and ver-
sioning (WebDAV) service to help solve the problems of sharing fles. As an open
standard, it is available on many servers. If you have an account on a server that has
WebDAV enabled, you can use the Internet Explorer to connect and transfer fles.
Just be sure to use the File/Open command, enter the name of the site, and check the
box to Open as a Web Folder. WebDAV is an extension of the HTTP protocols, so
it supports secure login and can take advantage of common encryption tools.
The other approach to transferring fles to a corporate server is to establish a virtu-
al private network (VPN) connection frst so that all communications are encrypted.
Then you are free to use FTP or any other common protocol inside the VPN tunnel
because no one can intercept and decrypt the messages. But you need control over
the server or a special server to confgure VPN.
Most hosting companies use Web fle uploads, which can be secure if Web se-
curity is installed on the server. But, transferring fles has been cumbersome and
generally only one fle can be uploaded at a time. The new HTML5 defnition might
improve this process because it supports fle upload with a drag-and-drop feature
built into the browsers.
Quick Quiz:
1. Which methods can you use to transfer fles to a university server?
2. Why is FTP considered a security threat?
3. What other objections exist to FrontPage?
169 Chapter 3: Networks and Telecommunications
Notice that moving down, each layer takes the data from the prior layer and
adds header and trailer information. This additional data is necessary for each
layer to perform its function, but it means that more data must be transferred.
For example, even if your physical connection can transmit data at 10 mbps, a
10-megabit fle cannot be transferred in one second. Depending on the application
and the network details, the overhead from the layers can be 20 percent or higher.
Note that there is a competing seven layer network model that defnes the ISO-
OSI view of networks. The model is similar in concept to the TCP/IP model, but
it breaks level 1 into two layers, and level 4 into three layers. Since this is not a
networking book and the Internet protocol dominates, there is no reason to cover
it here. You can fnd details on the Internet if you ever need them.
Subnet/Physical Layer
The purpose of the subnet or physical layer is to make the connection between
two machines and physically transfer bits of data. It is directly related to hard-
ware. Standards exist to specify constraints on voltage, type of wire, frequency
of signals, and sizes of physical connectors. Raw data bits are transferred at this
stage. Many different technologies exist, including wireless, wired, and fber-optic
lines.
The network interface card is a critical component of the physical layer. In ad-
dition to handling the data transfer, each card has a unique media access control
(MAC) address. This address is a globally unique number that is assigned to the
card by the manufacturer. Switches use this number to identify every device on
the network and send packets to the correct device. In fact, the technical differ-
ence between switches and routers is that switches work at Level 1 and routers at
Level 2.
Internet/Network Layer
The Internet layer is concerned with routing messages to the appropriate location.
In particular, it selects the appropriate path for a message in networks where there
is a choice. Its main advantage is that it separates the higher layers from the physi-
cal transmission of data. The network layer handles connections across different
machines and multiple networks. The Internet Protocol (IP) is the standard used in
routing packets on the Internet network. With IP, each packet is treated indepen-
dently of the others and each can follow a different route to the destination. Each
machine must have a globally unique address, so a mechanism is established to
assign numbers to machines. It would be diffcult to use the physical MAC ad-
dresses because they are randomly assigned. A logically assigned IP address is
better because the number can be used to help route each packet by using portions
of the number to segment the network. Plus, if you need to change a physical
network card, you can keep the same IP address and the Internet will continue to
function correctly. The current version of IP (IPv4) uses a 32-bit address, which is
beginning to cause some problems because IPv4 supports a maximum of about 2
billion addresses, and the world is beginning to run out of numbers.
The newer IPv6 standard supports 128-bit addresses, but it will take time to
phase in the new system. Newer servers and operating systems support the IPv6
protocol, but it will take time to update all of the routers on the Internet. In the
meantime, most companies are using intermediate steps to allocate the IPv4 num-
bers. Windows 7 automatically activates IPv6 alongside IPv4 so it can support
both types of connections.
170 Chapter 3: Networks and Telecommunications
Transport Layer
The transport layer is responsible for dividing the application data into packets
and providing logical connections to the network. The transport control protocol
(TCP) is commonly used on the Internet to handle these connections. TCP sup-
ports multiple applications at the same time by creating numbered ports. For ex-
ample, e-mail is usually transferred through port 25, and Web data through port
80. TCP sends the data packet to the specifed port on the desired machine. TCP
on the host machine listens to these ports and sends the incoming data to the ap-
propriate application server. TCP also monitors the packets to see if any are lost
in transmission. If so, the recipient machine can request that the missing packet be
re-sent, providing a highly reliable connection between two machines.
The Internet also supports the user datagram protocol (UDP), which is a highly
simplifed transport method. Most important, it does not guarantee that a pack-
et will be transferred. Generally, users do not get to choose between TCP and
UDP. This choice is made by the software developer at the network level. But why
would anyone choose UDP when there is no assurance that the packets will be de-
livered? The main reason is speed. Because UDP is so simple, it adds only a tiny
overhead to each packet, which makes it useful for large transfers of data, such as
large fles and streaming multimedia. If necessary, the application can check at the
end to ensure that all data was transferred.
Reality Bytes: NEC Lab Sets Fibre Speed Record
In March 2011, NEC Laboratories in Princeton, New Jersey announced they had
pushed more than 100 terabits of information per second through a single optical f-
ber. That amounts to transferring roughly 250 dual-layer Blu-ray discs in one second.
Tim Wang from the Lab noted the feat marks a critical milestone in fbre capacity.
By comparison, Tim Strong of Telegeography noted that total capacity between New
York and Washington D.C., one of the worlds busiest Internet routes, is only a few
terabits per second. But, he also noted that traffc has been growing by about 50 per-
cent per year. Typically, optical fber capacity is increased by splitting transmissions
into multiple frequenciesor colors. Additional capacity can be gained by using dif-
ferent polarities, amplitudes, and phases of light. Dayou Qian of NEC reported send-
ing 101.7 terabits per second through 165 kilometers of fber. His team used 370
separate lasers and several kilowatts of power to accomplish this feat. At the same
conference, Jun Sakaguchi of Japans National Institute of Information and Commu-
nications Technology in Tokyo also reported reaching 100 terabits per second. His
team used a special fber with seven internal light-carrying cores. Using a completely
different method, Wolfgang Freude and his team at the Karlsruhe Institute of Tech-
nology in Germany achieved transfer rates of 26 terabits per secondusing a single
laser. Although somewhat slower than the 100 terabits record, the cost of implement-
ing Freudes method is substantially lower. His team used orthogonal frequency divi-
sion multiplexing (multiple colors) and a fast Fourier transform to separate the col-
ors on the receiving end. Each color arrives at slightly different times and the process
could be embedded onto a silicon chip.
Adapted from Jeff Hecht, Ultrafast Fibre Optics Set New Speed Record, New Sci-
entist, April 29, 2011; and Jason Palmer, Laser Puts Record Data Rate Through
Fibre, BBC Online, May 22, 2011.
171 Chapter 3: Networks and Telecommunications
Application Layer
The application layer consists of tools and services for the user. Typical Internet
applications include e-mail, fle transfer (FTP), and Web browsing with the hy-
pertext transfer protocol (HTTP). These systems work because developers have
agreed to follow basic standards.
With the TCP/IP reference model, applications are responsible for incorporat-
ing authentication and compression. Not having a standard underlying method for
handling security has caused some problems with TCP/IP. Few applications actu-
ally have any security, several incompatible variations of security systems have
been created, and hackers have been able to write programs that attack the under-
lying, unprotected layers. Security is one of the main problems being addressed in
IPv6 and Internet2.
Te Internet
What is the Internet, how is it controlled, and how does it work?
The Internet is a loose collection of computer networks throughout the world. It
began as a means to exchange data among major U.S. universities (NSFnet of
the National Science Foundation) and connections to various military organiza-
tions and U.S. defense suppliers (Arpanet of the Advanced Research Projects
Agency). No one knows how many computers or networks are currently con-
nected by the Internet. The numbers have been increasing exponentially since the
early 1990s, so any number is likely to be wrong within a few days. To give you
some idea of the Internets astounding growth, in January 1993, there were 1.313
million host computers. In January 1994, there were 2.217 million hosts located
in more than 70 countries. In 2000, Telecordia estimated that the Internet had ex-
ceeded 100 million hosts. By 2007, Internet Systems Consortium counted over
400 million host computers. Billions more people connect to these hosts using
computers, tablets, cell phones, and so on. In 1994, over 20 million people had
access to at least e-mail services. As of mid-1994, commercial use (as opposed to
university and government use) accounted for 50 percent of the Internet usage. By
2004, over 500 million people worldwide had access to the Internet. Measuring
the Internet is diffcult, since machines are not always connected. Most studies
use some type of survey to estimate the size. However it is measured, usage of the
Internet continues to grow.
What exactly is the Internet? At heart, the Internet is just a communication sys-
tem for computers. It is defned by a set of standards that allow computers to
exchange messages. The most amazing aspect of the Internet is that there really is
no single person or group in charge. Anyone who wishes to connect a computer to
the Internet simply agrees to pay for a communication linkvia an Internet ser-
vice provider (ISP)and to install communications hardware and software that
supports the current Internet standard protocols. The person or company is given
a base address that allows other computers to identify users on the new computer.
Standards are defned by a loose committee, and addresses are controlled by an-
other small committee. The committees are convened purely for the purpose of
speeding the process; all decisions are up to the organizations connected to the
network. Participation in the Internet is voluntary, and there are few rules, just
standard practices and agreements. From a business or consumer viewpoint, there
are two primary aspects to the Internet: establishing a connection and using the
Internet.
172 Chapter 3: Networks and Telecommunications
How the Internet Works
The Internet is a communication system; it is a method of connecting computers
together. So the frst step in determining how the Internet works is to understand
how your computer connects to others. As shown in Figure 3.23, the Internet has
a hierarchy of service providers. Individuals pay a local Internet service pro-
vider (ISP) for access to the Internet. In turn, local ISPs pay an upstream network
service provider (NSP) for access to their systems and features. Each connection
must be made over a communication link. Local links are typically made over
telephone wires, but cable companies also provide service over their coaxial lines.
A few companies provide satellite connections. Some wireless providers exist, but
availability, features, and pricing vary by location. Most ISPs also utilize phone
company lines to connect to their NSP, but they lease dedicated, full-time lines
that provide faster service. The largest NSPs (Tier 1) also provide backbone ser-
vice. That is, they route communications over their own fber-optic lines that are
installed across the United States. Increasingly, NSPs are also phone companies.
Some started as phone companies and expanded into the Internet; others started
with the Internet and gradually offered voice services.
If you search for an ISP or look at the market for Internet connections, you
will fnd several providers using different technologies. The Internet backbone has
been relatively stable for several years, but the industry battles have been taking
place in the last mile of the Internetbuilding connections directly to customers.
The primary providers have been the local phone company and cable TV pro-
viders. They are important because they have existing lines into customer houses
Figure 3.23
Internet connections. Each computer must be connected to others. The Internet has a
connection hierarchy. Companies and individuals typically use phone company lines
to connect to an ISP. The ISP connects to an NSP, which routes data over the high-
speed backbone network to the destination NSP, down to the other ISP, and to the
fnal computer. Each step may involve several computers.
Individual
Internet
service
provider ISP)
Phone
Company
Network
service
provider (NSP)
Backbone
network
Phone
Company
Company
Web site
Dial-up 33.3-56 Kbps
ISDN: 128 Kbps
DSL: 256 Kbps - 2 Mbps
Cable: 1.5 Mbps - 6 Mbps
Cable
Company
T1: 1.544 Mbps
T3: 44.736 Mbps
OC3: 155.52 Mbps
OC12: 622 Mbps
173 Chapter 3: Networks and Telecommunications
and businesses. Some technical differences exist between a digital subscriber line
(DSL) and cable modem broadband connection, but ultimately customers make
a choice based on availability and secondary considerations. For example, both
tend to require that you purchase additional services, such as local phone service
or cable-TV. The electricity industry has also been trying for several years to en-
ter the ISP marketbecause they provide the third set of wires into households.
However, transmitting data over noisy (and old) power lines has presented many
technical obstacles. In 2006, the industry claimed to have found reasonably low-
cost solutions, but it is not clear that the industry knows how to compete with the
other providers. A few cities (and companies such as Google) have attempted to
cover entire cities with WiFi Internet accesseffectively offering free Internet
connections. However, WiFi access points have a limited range of a few hundred
feet. Although each access point is relatively inexpensive, it costs money to run
cables to all of the points needed to cover a wide area.
A greater challenge to the dominance of the phone and cable companies is
wireless access via fourth generation (4G) technologies. Sprint was the frst to
market with WiMax service provided by Clear. In late 2010, Verizon began of-
fering their 4G cell phone service long-term-evolution (LTE). With few users and
minimal congestion, early adopters reported speeds of 6-10 mbps for downloaded
data. Upload data rates are substantially slowereven less than 100 kbps in many
cases. But with these numbers, cell phone service might be usable as a full-time
Internet connection. In fact, most companies sell WiFi add-on services that enable
cell phones to operate as WiFi access pointsproviding Internet access to nearby
computers and tablets.
You should understand the foundations of the Internet, because someone has
to pay for each connection. Current pricing policies are to charge for the initial
communication link and for the point-of-contact Internet service. For example,
Backbone Providers Network Service Provides
AT&T Sprint AT&T Qwest
Level 3 MCI (UUNet) Cable & Wireless Sprint
Qwest IBM MCI
Phone Companies Cable Companies
Regional Bell operating companies (3 RBOCs) Comcast
Competitive local exchange carriers (CLECs) Cox Communications
Regional
Leading ISPs Satellite
AT&T Direct Satellite
Comcast Wild Blue
Verizon Starband
America Online
Figure 3.24
Leading Internet providers. There are thousands of ISPs and cable companies. This
list provides only some of the large companies in each category.
174 Chapter 3: Networks and Telecommunications
an individual pays the phone company for the local phone line and pays the ISP
for basic services. The ISP pays the phone company for the next link and pays the
NSP for access services. Figure 3.24 lists some of the largest providers in each
category. You can check with them for current prices and services.
The charging mechanism is similar for companies that wish to establish Web
sites. The catch is that the costs are higher because the company needs faster com-
munication services. The phone company charges more money for a faster link
(e.g., $500 to $1,000) per month for a T1 line). The ISP also charges more money
for the increased traffc because it needs faster equipment and faster connections
to the NSP.
The Internet service connection business is completely based on economies of
scale. The high-speed fber networks (OC3 and OC12) can handle a vast number
of transmissions, but they carry a high fxed cost. The backbone providers make
money by selling smaller increments of bandwidth to the ISPs, which incorporate
a suffcient proft. Many of the NSPs are backbone providers and increasingly
they also offer ISP services.
Video and Heavy Use Complications
The problem of video is relatively complex. Perhaps you have a high-speed Inter-
net connection and could receive high-quality video, say 1 mbps. But, think about
what will happen if as few as 100 people try to view that same high-resolution
video at the same time. The providers server has to stream 100 copies of that
video simultaneouslyeating up 100 mbps. Hence the server (such as YouTube)
needs to have at least an OC-3 Internet connection at $20,000 per month just to
handle 100 simultaneous viewers. The same problem can arise if millions of visi-
tors suddenly fnd a new Web siteas happens when a national radio or television
program highlights a site. How is it possible to handle that much traffc?
One answer is that several specialty hosting companies have evolved with mas-
sive Internet connections. They have built data centers with multiple OC-48 (or
better) Internet connections. You can contract with them to co-locate (colo) your
servers in their buildings. For a monthly fee, they provide the space, power
with UPS, and air conditioning, along with the high-speed Internet connection.
Figure 3.25 lists some of the biggest providers with multiple data centers. Larger
companies might contract directly with these frms; smaller companies will work
through intermediaries who already have co-location arrangements with these
companies. The specialty providers, such as IBM, tend to be more expensive and
negotiate individual contracts to perform specifc jobs.
Figure 3.25
Leading data center providers. The general data centers simply provide space,
electricity, cooling, and high-speed Internet connections. The specialty providers
usually sign contracts to provide individual services.
General Data Centers Specialty Hosting Companies
Equinix
Cybercon
Savis
Telecity (Europe)
IBM
AT&T
EDS
Tousands of small, regional providers
175 Chapter 3: Networks and Telecommunications
Even if you have a high-speed connection to the Internet, it is still diffcult and
expensive to handle thousands or millions of Web site visitors. A second answer
is provided by Akamai, a company that was created specifcally to reduce the load
on Internet servers. The company has installed thousands of servers in over 70
countries that hold duplicate copies of your content. As shown in Figure 3.26, in-
dividual users automatically retrieve data from the nearest server. Users see only
your site but get a faster response. More importantly, the load on your companys
server and Internet connection are signifcantly reduced because the individual
requests are handled at multiple points. Distributed network servers are the only
way to handle the distribution of video content, because even a few hundred us-
ers could overwhelm the network capacity of a single server. Amazon provides a
similar service that smaller companies can use for smaller tasks. This service (S3)
is described in more detail in Chapter 7.
Broadcast streams are slightly different from simple video fles. You might
have an event that you want to broadcast to multiple users at the same timesuch
as a ball game. Your server could generate a single feed, and this feed could be
duplicated and split to thousands of users. If handled correctly, your server and In-
ternet connection generate only a single data stream. This stream is then split and
duplicated at routers along the way to multiple clients. Some companies, notably
MLB, are working on these technologies, but problems still arise when too many
people access the streams.
Telephones and Te Internet
All phone calls today are converted to digital signals and sent over a network. So,
why should you pay for long distance phone calls? Of course, most people have
cell phones which rarely charge extra for long-distance calls within a country. But,
they still use plan minutes and generally require higher payments for international
calls. You already pay a fxed monthly fee for Internet access, and the Internet is
Figure 3.26
Distributing content through Akamai. By distributing your content to servers at the
edge of the Internet, customers retrieve data from multiple points, reducing the
load on your server and Internet connection.
Internet
Content
Video
Company Server
Akamai Servers
176 Chapter 3: Networks and Telecommunications
worldwide, so you could just use the Internet connection to handle voice calls.
Voice over IP (VoIP) is a technology that converts your phone call directly to
Internet packets and ships them to the destination. The technology is straightfor-
ward and relatively inexpensive. However, Figure 3.27 shows an important com-
plication. To use your VoIP phone to connect to people with regular or cellular
phone service, you have to contract with a company that can convert the Internet
packets back into the plain old telephone system (POTS). The process is particu-
larly effective for international calls because the Internet packets can be converted
as close as possible to the destinationavoiding international and long distance
charges. In the U.S., Vonage played that role until 2007 when Verizon, one of
the phone companies, won a major patent-infringement case against Vonage. The
phone companies were already pressured by the consumer switch to cell phones;
losing long-distance revenue to third-parties like Vonage presents a major compet-
itive threat. On the other hand, if the person you wish to call has Internet access,
you can simply use a direct PC-to-PC connection and skip the phone company
and third-party completely. If you can directly connect to the other computer, you
can use voice or even video connections for no additional chargeanywhere in
the world. Skype is a newer company that now dominates VoIP callspartly be-
cause they offer free calls for computer-to-computer access, including video chat
if you have Web cameras. Skype also offers relatively inexpensive monthly fees
even for international calls to land lines and cell phones. You can even get your
own phone number for your Skype/computer account.
Internet
Voice to IP
Cable modem
VoIP Provider
Telephone Co.
Figure 3.27
Voice over IP. The phone, or a separate device, digitizes the voice and sends it as IP
packets on the Internet. A third-party company converts the Internet packets back to
telephone packets and sends them across the phone network.
177 Chapter 3: Networks and Telecommunications
Internet Addresses
In any network, each computer must have a unique address. At the local level,
network cards contain a media access control (MAC) address. This number is
used by switches to route local traffc. On the Internet, every computer is assigned
a logical IP number.
Currently, these addresses are 32-bit numbers, typically written as 4 bytes sepa-
rated by dots. For example, your machine might be assigned 138.9.15.2 as an ad-
dress. However, 32-bit numbers will identify a maximum of 4 billion machines.
In practice, perhaps 80 percent of those numbers are usable because some values
cannot be assigned and others are assigned in bulk to companies but not in use.
Hence, an Internet committee designed a new numbering system consisting of 128
bits, which allows for several millions of numbers to be assigned to every person
likely to live on the planet. The new system is known as IPv6 and is being phased
in gradually.
Servers need to be assigned IP addresses that do not change, or seldom change.
Client computers can be assigned numbers from a local router or computer using
the dynamic host control protocol (DHCP). The DHCP server has a pool of ad-
dress numbers and gives one to each computer as it connects to the network.
In most organizations, the process of assigning addresses is more complex.
Large companies and universities were the frst to encounter problems with the
Reality Bytes: More Data More Speed
Check any wireless indicator and it is obvious that many households have installed
wireless routers. Wireless access is popular for almost all computers, both for homes
and businesses. The initial wireless transfer rates were only 11 mbps on the 802.11b
standard. Then the 802.11g standard was created to support 54 mbps transfer rates.
After a few years and some arguments over technology, the 802.11n standard sup-
ported a top rate of 450 mbps. Although 802.11n routers are widely available in 2011,
most operate at about a third of that peak speed or about 150 mbps. All transmission
methods have overhead and do not actually transfer data at the peak rates. Typically,
10 percent or so is used for overhead such as packet identifers and addresses. But,
wireless is relatively ineffcient, more often operating at 70 percent of the peak trans-
fer rates. Rates are even lower when multiple devices are heavily using the same
router. But, technology development continues. The 802.11ac standard defnes trans-
fer rates of 1 gigabit per second (gbps) and the 802.11ad standard will support a
peak rate of 7 gbps. Both are expected to reach the market in 2012 or 2013. The new
technologies will probably operate in the 60 GHz frequency band, compared to the
2.4 GHz band used by older devices. This range provides more data capacity, but
the radio waves do not travel very far and are absorbed by walls, trees, and water.
Why would anyone need such high transfer rates? The simple answer is: video. The
7 gbps speed is fast enough to transfer uncompressed high-defnition video. Which
means almost all devices could operate without wires. Wireless does have a problem
with latencythe delay between sending a signal and receiving a response. Latency
is not an issue with movies or basic displays, but it does cause problems for games or
similar interactions, where responses need to be almost instantaneous.
Adapted from Stephen Shankland, Coming to a Network Near You: Faster Wi-Fi,
CNet News, May 31, 2011.
178 Chapter 3: Networks and Telecommunications
limited number of IPv4 addresses. Consequently, they purchased Internet routers
that implemented network address translation (NAT), which is commonly used
by businesses and even home users today. As shown in Figure 3.28, with NAT,
your house (or offce) might be assigned one Internet address that connects to a
router. The router then assigns completely different numbers to all of the machines
in the home or offce. When a local computer requests a page or service from the
Internet, the router tags the address so it can identify which machine made the
request. All replies are returned to the same port, and the router directs the con-
nection to the original machine. Essentially, the router translates or changes the
internal addresses into the single external number. Client computers are assigned
internal IP numbers that cannot be used outside the NAT. Typically they start with
10 or 192.168. Essentially, one real IP address is multiplied to work with several
local devices.
NAT also creates an additional security level because no one outside this local
network can directly access any of the computers. However, sometimes you actu-
ally want to connect to other computers. In particular, it causes complications if
you want to use groupware or peer-to-peer systems across the NAT router. If you
and the person you wish to contact are both running computers behind different
NAT connections, you will not be able to make a direct connection. In this situ-
ation, you will need the use of a third-party server. Cisco WebEx and Microsoft
LiveMeeting perform this role for online conferences. Skype performs this func-
tion for voice phone calls that use the Internet, and SlingPlayer does the same for
watching television remotely. Both parties frst establish a connection to the serv-
Figure 3.28
Network address translation. Internally, machines are assigned numbers that cannot
be used outside the local network. Requests sent to external servers are temporarily
assigned a real IP address by the router. Any external attempt to reach an internal
computer is automatically blocked.
Web Server
10.1.30.15
Translate:
10.1.3.15=138.9.1.15
Disallow
incoming
peer-to-peer
179 Chapter 3: Networks and Telecommunications
er. The server has a fxed IP address, grabs the currently-assigned IP addresses of
the two parties and connects them to each other. Companies can also run in-house
servers with fxed IP addresses to handle the initial connection. Using in-house
computers is more secure because the communications do not have to go through
a third party.
NAT also makes it considerably more diffcult to track down individual users
on the Internet. If you receive a message (spam) from someone, or want to fnd the
true owner of a Web site, you begin with only the shared IP address. This address
will point you to the company that hosts the original user. You can fnd the hosting
company by entering the IP address at one of the registry sites, such as www.arin.
net. But to fnd the specifc person, the hosting company (or university) will have
to provide you with detailed records of who was using the computer at the specifc
time. Most of these organizations will reveal the information only when presented
with a court order (if they kept historical records). This process makes it more dif-
fcult and expensive to track down fraud and illegal activities on the Internet.
Domain Names
Numbers are diffcult for most people to remember. So the Internet utilizes a sys-
tem where a domain name system (DNS) server converts names to numbers.
Anyone can apply for a name and pay a nominal fee (perhaps $20 per year) to use
that name. Of course, names must be unique, so sometimes disagreements arise
over popular names. Names are followed by a suffx such as .com, .edu, or .gov.
Several newer suffxes were added in 2002 and 2003, but the .com and .net suf-
fxes are still the most coveted. One interesting feature of the names is that each
country is given a specifc suffx. Some of the countries sell names using their
unique suffx. For example, the small nation of Tuvalu allows companies to use its
suffx (.tv) for a fee.
Internet World
Real World
DNS
Registration
207.46.250.222
www.microsoft.com
Microsoft Corporation
One Microsoft Way
Redmond, WA 98052
US
Internic.org
ISP
Net Range
207.46.0.0 -
207.46.25.255
Microsoft-
Global-Net
Arin.net
Figure 3.29
Domain Name Registration. Internet entities are anchored to the real world through
the DNS registration and their ISP. But, some frms lie in their registration, and some
ISPs are controlled by unethical people.
180 Chapter 3: Networks and Telecommunications
As a business, you will need to register your domain name to make it accessible
to other users. Several companies act as registrars and you pay them to offcially
link your name to your IP address. In terms of data, the connection is ultimately
performed with the DNS system, and you can either run your own DNS com-
puter or pay another company to handle the updates. Figure 3.29 shows that DNS
registration is a critical element to electronic commerce. Registration provides a
tie between the Internet world and the real world. A second tie is provided by
the connection of the frm to its ISP. In a legal situation, the ISP can be forced to
reveal the true identity and address of its client. A third anchor is created when a
company installs a digital security certifcate. The certifcate authority verifes the
real-world identity of the client and binds it to the certifcate.
You can use the Whois facilities of the domain registrars (e.g., NetworkSolu-
tions, or Internic.org) to look up the registration data. You can use the Internet
registries to identify ISPs based on the IP address. These registries are organized
by geographical location and include ARIN (North America), RIPE_NCC (Eu-
rope, the Middle East and Central Asia), APNIC (Asia/Pacifc), LACNIC (Latin
America), and AfriNIC (Africa). However, some ethically-challenged people lie
on their DNS registrations. A few even more ethically-challenged people operate
ISP services specifcally to support spammers and hackers. As a consumer, the an-
swer is relatively easy: never, ever send money to a company that lies on its DNS
registration!
If you want to run your own Web site, you will want to create and register your
own domain name. The exact IP address will be given to you by your hosting ISP,
but you have to register for the domain name that will be linked to the address.
This registration information is kept in global whois databases. For example, you
can use the networksolutions.com database to enter a Web site name and retrieve
the registered owner of the site. When you register a site name, you are supposed
to provide accurate information on your name, address, and phone number. How-
ever, at this point in time, the registrars have been weak at verifying the data. The
resulting misleading information makes it diffcult to track down spammers and
other owners of fraudulent sites. In a sense, the Internet today is like the business
world in the 1800sany fy-by-night scammer can set up a business Web site.
In the business world, this situation was partly solved by requiring businesses to
obtain licenses and register with the government. If you have any doubts about the
validity of a company, you should check to ensure that the business is legally reg-
istered with the state government. Most states have searchable online databases
and provide free access through the offce of the secretary of state.
Domain names can consist of several parts separated by dots. The names are
read from right to left. The text on the far right is the top-level domain (TLD).
The most familiar TLDs are the six that were created frst: com, net, org, edu,
gov, and mil. Several others have been added, such as info and biz, and new ones
are proposed and debated each year. There are also hundreds of country codes
(such as us, ca, uk, and tv). Around 2010, the Internet committees introduced the
concept of generic TLDs (gTLD). In this case, companies or individuals will be
able to purchase their own unique TLD (such as .ibm or .houses). The purchaser
of a gTLD will act as its own registrar and be able to assign or sell domain names
within that TLD. However, the initial cost (evaluation fee) for a gTLD is $185,000
and costs increase from that point; including the ability to run your own registry.
The second name is the name you must pay for and register with a DNS regis-
trar. It usually is the name of a company or service, but could be almost anything.
181 Chapter 3: Networks and Telecommunications
Common examples include microsoft.com, google.com, pacifc.edu, and sec.gov.
Anything to the left of the registered domain can be created within your organiza-
tions network. Many times it is used to represent a department or specifc server
within the organization. However, there are no fxed rules so the names could
represent almost anything. For example, you might create marketing.mycompany.
com for the marketing department server. Why do you care? If you need to setup
networks, you have to learn more of these details, and you have to design a nam-
ing convention that is easy to use. But, even as a typical user you should be famil-
iar with the basic structure so you can recognize bad or dangerous domains. For
example, accounts.citibank.com.xi92lai.293aafa.com is most defnitely not an ad-
dressed owned by Citicorp. When you see that address in an e-mail message, you
immediately know it is a fakemost likely created to steal your bank password.
For years, the Internet committees have realized that the domain name system
is based on the English language and that many companies would like to create
domain names in local languages. However, a name system based on multiple
languages presents several technical challengesnotably, ensuring that names in
different languages or alphabets are never reduced to an existing name in a dif-
ferent language. Another problem is that the DNS database was designed to hold
only Latin-based characters. Most of these issues have been resolved and by 2011,
several TLDs became available in non-English languages including Arabic and
Chinese.
Internet Committees
The Internet works because of the adoption of standards. Everyone connecting a
device to the Internet agrees to follow the standards. But, these standards need to
evolve to handle new technologies. The standards are maintained and discussed
by several Internet committees. The Internet Corporation for Assigned Names
and Numbers (ICANN), the Internet Engineering Task Force (IETF), and the
Internet Assigned Numbers Authority (IANA) are publicly run organizations in
charge of establishing many of these standards. These organizations are heavily
dependent on volunteers and rely on public comments to design new standards.
The IETF is the most technical group and it deals with most of the routing and
HTML standards. IANA controls the allocation of IP address segments, TLDs,
and other assigned numbers. It is largely concerned with technical issues.
In some ways, ICANN is a more interesting group. It was not founded until
1998. It coordinates the Internet naming system. In actuality, it is the political
committee where everyone gets to argue over various directions for the Internet.
For example, it is the focus of discussions for whether new TLDs should be in-
troduced, or when internationalized domain names should be allowed. Originally,
these tasks were handled by U.S. organizations. ICANN is a not-for-proft cor-
poration that is not directly controlled by the government, but it is founded in
California. At various times, several nations have suggested that ICANN should
be run as an international bodyperhaps even within the United Nations. U.S.
politicians have resisted these attempts to change control of ICANN.
Internet 2
Originally, the U.S. government funded much of the Internet design and develop-
ment. By 1995, the U.S. government had discontinued almost all funding, and the
Internet was largely fnanced and controlled by private organizations. From 1994,
the commercial use of the Internet increased exponentially. In 1996, 34 university
182 Chapter 3: Networks and Telecommunications
participants decided that they needed faster connections (the number of partici-
pants expanded to 100 in 1999, 205 in 2003, and 381 in 2007 with 58 international
participants). In early 2011, the list of paying participants included 260 organiza-
tions and 147 sponsored participants according to the lists on www.internet2.edu.
With the support of the government and industry, they began creating Internet 2
(http://www.internet2.edu).
The two most important proposed features of Internet 2 are high-speed con-
nections and quality-of-service provisions. The overall objective is to provide a
transmission network that can support full-speed video and other high-bandwidth
applications. To understand the change, consider that most existing high-speed
Internet connections are in the range of 1 mbps to 50 mbps. The Internet 2 calls
for gigabit connection points and a minimum connection of 155 mbps. The cost
of connection depends on the connection speed, where a 1 gbps connection costs
$250,000 a year.
A related, but more fundamental, change is the ability to specify a desired lev-
el-of-service quality. Currently, if traffc increases on the Internet, all communica-
tions slow down. This situation is annoying but not troublesome for simple tasks
like sending e-mail or browsing a Web site. On the other hand, full video transfer
requires a constant minimum level of transmission capacity. So participants need
a mechanism to tell all components that a specifc set of messages should take
priority to receive a certain level of service. Some people have suggested that
the system should enable participants to pay a fee to gain their desired levels of
service, for each type of message. For example, basic e-mail messages would be
free if there is no rush in delivering them. But to reserve a time slot for video-
conferencing, participants would pay an additional fee. Then all of the Internet 2
components would give the video packets a higher priority. So far, there has been
Reality Bytes: Faster Speeds but Data Caps
In April 2011, AT&T announced that it would limit broadband customers to no more
than 250 gigabytes of Internet data transfer per month. DSL users would be limited
to 150 GB. The 250 GB value matches that imposed by Comcast. AT&T claimed
that only 2 percent of its users would be affected by the caps, but that people in that
group use up 20 percent of the network bandwidth. Data transfers above the caps will
be priced at $10 for each 50 GB. Mark Siegel, spokesman for AT&T noted that the
companys customers averaged 18 GB per month. He also claimed that the reason for
the change was because customers said that the people who use the most should pay
more. The 250 GB cap could be reached by watching 109 hours of high-defnition
video from Netfixor about 3.6 hours every day for a month. The comparison to
video is important because customers are moving to online video and dropping TV
services from AT&T and Comcast. Vince Vittore, a broadband analyst with the Yan-
kee Group, noted that the data cap isnt absolutely necessary. Its mostly a move to
prevent customers from cutting off video services. Note that Cisco forecasted that
video on-demand usage will double every 2.5 years. Verizon Wireless followed with
data caps and substantially higher prices for heavy users in July 2011 (Web site).
Adapted from David Goldman, AT&T Starts Capping Broadband, CNN Online,
May 3, 2011.
183 Chapter 3: Networks and Telecommunications
no agreement on whether additional fees should be charged, or on how the qual-
ity-of-service issues can be resolved. Although the system is being designed for
academic and government users, the industry participants (e.g., Cisco) ultimately
intend to transfer any useful technologies to the commercial Internet. Businesses
could fnd many uses for high-speed connections and service-quality guarantees.
For starters, better video transfer may fnally open the way for desktop videocon-
ferencing to replace travel to meetings.
Wireless Networks and Mobile Commerce
Beginning with cell phones in the 1990s people and businesses have become fas-
cinated with wireless communication. Wireless Internet and mobile commerce
have the potential to revolutionize the Internet, business, and society. Technologi-
cally, wireless is different from the traditional Internet in only two ways: (1) the
transmission medium is microwave radio, and (2) the client devices are smaller
with smaller screens and less computing power. Yet wireless connections open
thousands of new possibilities. The client devices can consist of anything from en-
hanced cell phones, such as the device shown in Figure 3.30, to laptops and digi-
tal tablets. Many of these devices are more powerful than some older computers.
Most cell phones and tablets have built-in cameras, Web browsers, and their own
programming or application capabilities. Touch screens have made it possible to
enter basic text and notes on these portable devices.
To date, the wireless communication presents the greatest challenges. As the
portable devices become more sophisticated, people want to use them for every-
thing from simple text to voice to video. And video includes video calls as well as
downloaded high-defnition movies. The catch is that 3G cellular networks were
designed to handle perhaps 2 mbps of data transmission. Even the early 4G sys-
Figure 3.30
Mobile commerce. Wireless connections offer new capabilities, such as e-mail and
Internet browsers on cell phones.
184 Chapter 3: Networks and Telecommunications
tems provide download speeds of only 3 10 mbps. Upload speeds are substan-
tially lower, often less than 1 mbps. Transmitting video on these wireless con-
nections can be slow for individual users. Worse, the cell-phone space is shared
by everyone in the area. Throw a few thousand people into the same location all
trying to send and receive large images or video and the network slows to a crawl
for everyoneas AT&T learned when it was the frst to sell the Apple iPhone. De-
spite the increased money pumped into expanding the network, the growth of cell
phones and data applications has expanded even faster. At some point, the cell-
phone companies might be able to install enough capacity to handle the increasing
traffc, but it is likely that data caps and usage charges will remain for heavy users.
Some of the more interesting possibilities of m-commerce come from the abil-
ity to use the phone to fnd and pay for virtually anything you might need. Rather
than rely on credit cards or cash, your cell phone could record all of your transac-
tions and give you complete instantaneous access to your data. But an incredibly
reliable and secure system must exist before consumers will trust it. In 2011, sev-
eral phone vendors began rolling out near-feldcommunication(NFC) payment
systems. NFC is a very-short range wireless communication method where either
the cell phone itself or a tag placed within the cell phone can carry basic payment
data. When waved next to a payment terminal, the ID is used to transfer money
from your account to a vendor. Some credit cardsparticularly those used in Eu-
rope use similar technology. The actual source of the funds (your bank account,
credit card, cell phone bill, or PayPal) depends on the system being used. Several
companies have created competing versions and it is not clear which one might
win the largest market share.
Another interesting possibility for m-commerce comes from the ability to use
location to identify potential customers. Figure 3.31 shows that it is relatively
easy to identify a persons location based on the way the cellular system works
Figure 3.31
Location knowledge in m-commerce. Businesses could contact potential customers
on learning their location through the wireless system.
185 Chapter 3: Networks and Telecommunications
using signal strength and triangulation. Most cell phones also have built-in GPS
receivers and can locate your position down to a few feet. Currently, people can
turn off most of the location broadcast data on their cell phones, but it is available
for 911 emergency calls.
Think about the business opportunities that this system could provide, even
from the perspective of a consumer. As you walk into a mall, you could enter your
shopping list into a browser on your phone, which would contact all of the local
stores for prices and availability, and then provide a local map and directions to
each item. You could enter notes and make your selection through the browser,
then press a couple of keys and purchase the items. Most cell phones and search
engines provide a method to fnd companies based on your current locationsuch
as the closest gas stations or restaurants that carry specifc types of food. Similar-
ly, some companies use a system that automatically tracks your location and noti-
fes your friends (www.loopt.com). A few companies such as www.foursquare.
com have built a system to encourage people to check-in to report their specifc
location in commercial stores.
Businesses have even more opportunities to collect data on customers, such as
sending advertising to your phone and tracking the number of browsers versus
buyers. But marketing systems have greater knowledge of exactly what products
and features each customer wants. For instance, the systems could offer a mini-
survey to each customer who chooses to buy a competitors product to fnd ways
to improve products. Of course, the privacy aspects are interesting. They are ex-
amined in Chapter 14.
Cloud Computing
Are personal computers necessary anymore? As network speeds in-
crease, new computing methods are being created and rolled out to businesses and
individuals. The generic term cloud computing is often used to describe applica-
tions where the server, and most of the software, are run on computers stored on
Internet serversusually leased from a third party. Figure 3.32 shows the basic
concept. The main data and applications are running on servers located on the
Internet. The results, whether data, images, or even video, are transmitted and dis-
played on client computers, laptops, or even smart phones and tablets. The key is
that the main applications and data are centralized. Ideally, the user can access the
data and applications using any device from almost any location. For these ap-
plications, the user needs only a simple client display device, often only running a
Web browser. The data and applications remain on the servers.
Scalability and reliability are important aspects to cloud computing. The ap-
plications and data are run on distributed servers connected by high-speed net-
works. If one server fails, the load is automatically picked up by the other servers.
Similarly, new servers can be added at any time to extend the performance of the
collection. Data is stored on storage area networksalso connected with high-
speed networks. Most service providers also have multiple server clusters run-
ning in different physical locations around the world. Data is replicated across the
systems so it is closer to any user on the Internet. Each local cluster has its own
high-capacity Internet connections. Most sites have dual connections from dif-
ferent providers. If one network provider goes down or has a line cut, the system
automatically routes data through the backup connection.
Cloud service providers also use virtual machines to lease space on their hard-
ware to multiple customers. Multiple VMs can run on one physical server. Be-
186 Chapter 3: Networks and Telecommunications
tween the hardware, networks, and personnel, the cloud providers make money
through economies of scale. Consider the network costs alone. A T1 line provid-
ing 1.544 mbps might cost $400 a month to a single company. But, a giant pro-
vider can get an OC3 line for perhaps $20,000 a month that provides 155 mbps;
or about half the cost per megabit per second. Plus, the higher-capacity line can
be allocated across even more customers because most of them will have minimal
traffc. In a large data center, the monthly network and power costs constitute a
large portion of the expenses. A handful of employees with the appropriate soft-
ware can monitor hundreds or thousands of servers, so personnel costs are rela-
tively low. Selling capacity to multiple businesses helps cover the monthly costs.
The more services they can offer, the more money they can attract.
But, it is diffcult to answer the question of whether everything can be shifted to
the cloud. Even if you completely trust the servers and the network, is there some
data that you might wish to keep on your own computers? Or, is it always going to
be easier to pay someone else to handle the software applications and data? These
are the main questions that need to be answered.
Global Telecommunications
What problems are you likely to encounter if you need to con-
nect to a supplier in a different country? Business frms are becom-
ing more dependent on international markets. This internationalization increases
the demands on the telecommunications system. The international transmission
of data is becoming part of the daily business routine. A manufacturing company
may have factories in several different countries, with the headquarters located in
yet another country. Supplies have to be sent to factories. Finished and intermedi-
ate products have to be tracked. Customer demands have to be followed in each
country. Quality control and warranty repair information have to be followed from
the supplier through the factory and out to the customers. Financial investments
have to be tracked on stock markets in many countries. Different accounting and
payroll rules have to be provided for each country. Basic accounting and fnancial
data have to be available to management at any time of day, in any part of the
organization.
Creating networks across international boundaries creates many problems.
Some of the complications are technical, some are political or legal, and others
are cultural.
Technical Problems
The biggest technical complication is that each country may have its own tele-
communications standards. Today, most people rely on cell phonesparticularly
in smaller, developing countries. Just as in the U.S., several different standards
exist for cell phones. Consequently, a cell phone from one country might or might
not work in a different area. Many of the European nations use a version of the
GSM standard, so phones on those systems will generally work in multiple areas.
However, some American travelers have learned the hard way that between roam-
ing and international charges, using a phone in a different nation can be extremely
expensive. Many European travelers purchase new SIM cards (subscriber identity
module) to work in each country. A new SIM card essentially enables you to make
local phone calls without roaming charges, but international calls can still be ex-
pensive. To handle those, frequent travelers can use VoIP systems such as Skype
and fnd a WiFi connection to make low-cost international calls over the Internet.
187 Chapter 3: Networks and Telecommunications
One possible way to avoid the public telecommunications hassles is to use sat-
ellite phones. Some of these phones (notably Iridium) will work almost anywhere
on the planet. Unfortunately, they do not work well inside large buildings because
the signal gets blocked. Still, they can provide international reach even in remote
areas and support small data transfers as well as voice. The traveler needs to pur-
chase a special phone and sign up for a package of minutes. The per-minute cost
(in 2010) averages about $0.90 1.30, which might seem high to people used to
unlimited calls. However, even in the U.S., some cell phone plans charge $0.45 a
minute; and international roaming charges in Europe can often exceed $1 a minute
and some people have been charged over $3 a minute.
Fortunately, the Internet has made it easier to share data, images, and video
regardless of location. So, although the U.S., Europe, and Asia use different tele-
vision standards, the computers all handle the standard types of images and video
used on the Internet. You might have to ensure that the recipient has an up-to-date
computer to handle some newer types of video, but as time goes by, most comput-
ers should be acceptable. However, keep in mind that it might not be possible to
plug your cell phone or laptop into a monitor in a different nation if you want a
larger display. Still, you can usually transfer the data and use a local system.
Legal and Political Complications
Some important problems can be created when a frm wants to transmit informa-
tion across national boundaries. These transfers are called transborderdatafows
(TBDFs). The problem arises because the information has value to the sender.
Some of the biggest complications today are political. Some nations exert strong
control over the Internet. For example, in China the government physically owns
and runs all of the Internet routers. That gives them complete control over traffc.
The government commonly flters traffc for certain keywords and blocks sites
that it deems to be against public policy. As another example, during the Egyp-
tian turnover in January 2011, the existing president (Mubarak) appears to have
ordered the shutdown all Internet routers in an attempt to prevent protestors from
communicating. He also shut down all cell phone service for a couple of days.
[Vijayan 2011] Ultimately, all he managed to do was demonstrate to all citizens
that he had no respect for them and he was forced to step down.
Several other nations have expressed concerns over cell phonesparticularly
the Research-in-Motion Blackberry which promises strong encryption. In 2010,
some Middle Eastern countries along with India threatened to ban Blackberry un-
less the company provided a way for government authorities to intercept civilian
communications. They are not alone. The Obama administration also worked on
a plan to obtain access to decrypted messages using wiretap authority [Rashid
2010]. The issues of tradeoffs between privacy and government monitoring are
explored in more detail in Chapter 14. For now, it is important realize that tech-
nologies commonly used in one country might be banned in another country. It is
important for travelers and businesspeople to keep up with the laws of the nations
in which they operate.
Another important issue revolves around typical marketing data about custom-
ers. It is common for marketing departments to maintain huge databases. These
databases contain customer names, addresses, phone numbers, estimated income
levels, purchases, and other marketing information. Problems have arisen because
the western European nations have much stricter laws concerning privacy than the
United States. In most European nations, it is illegal to sell or trade customer data
188 Chapter 3: Networks and Telecommunications
to other companies. It must also be stored in protected fles that cannot be seen by
unauthorized employees or outsiders. In most cases, it is the responsibility of the
company to prove it is meeting the requirements of the law. In many cases, this re-
quirement means that customer data must be maintained on computers within the
original nation. Also, this data cannot then be transmitted to computers in other
countries. As a result, the multinational company may be forced to maintain com-
puter facilities in each of the nations in which it does business. It also needs to
impose security conditions that prevent the raw data from being transmitted from
these computers.
There is one more important political issue involving international computer
centers. Many nations, especially the developing nations, change governments
quite often, as well as abruptly. There are many nations where terrorist activities
are prevalent. Oftentimes, large multinational companies present tempting targets.
Because computer centers tend to be expensive, special security precautions need
to be established in these countries. Probably the most important step is to keep
the computer center away from public access. Several U.S. security specialists
publish risk factors and suggested precautions for each country. They also provide
security analysis and protectionfor a fee.
A host of other political complications affect any multinational operation. For
example, each nation has different employment laws, accounting rules, investment
constraints, and local partnership requirements. Most of these can be surmounted,
but they usually require the services of a local attorney.
Cultural Issues
All of the typical cultural issues can play a role in running multinational computer
networks. The work habits of employees can vary in different nations. It may be
diffcult to obtain qualifed service personnel at some times of day or night. These
issues can be critical for computer networks that need to remain in operation 24
hours a day. In many nations, it is still considered inappropriate to have female
managers when there are male subordinates. Collecting information may be ex-
ceedingly diffcult or even culturally forbidden. In some countries, you will lose a
customer if you try to obtain marketing data such as age and income.
In some nations, the connections between suppliers and customers are estab-
lished by culture. For instance, in Japan, distribution of products is handled by
only a few large frms. These companies have established relationships with the
suppliers and retail outlets. In any country, it can be diffcult for an outside frm to
create a relationship between suppliers and customers. Trying to build computer
networks with the various companies could cause severe repercussions. The es-
tablished frms may think you are trying to steal their knowledge or information.
Summary
One of the most important concepts in MIS is the necessity of sharing data. But
networks have gone beyond simple data to becoming a major part of the use of
computers and accessing information. Many applications and business tools rely
on almost-constant connection to the Internet and other devices. As a manager,
you need to work in this world where you can search and connect to data and
people from many different parts of a company. It also means that you need to be
accessible and make your knowledge and skills available to other workers on the
team.
189 Chapter 3: Networks and Telecommunications
Communication and networks require standards, and they need to evolve over
time. One of the greatest shifts taking place now is the move to high-speed wire-
less communication. Physically, computer components have shrunk far enough so
that even relatively small cell phones carry huge amounts of computer power. As
people carry these devices everywhere, they want access to everything from any-
where in the world. The current challenge lies in building and paying for a wire-
less infrastructure that can handle the increased load created by everyone demand-
ing high-speed access at the same time. The second challenge for business lies in
determining how to use these connections and applications to improve manage-
ment and increase profts.
Building networks requires specialized workers and skills, but managers need
to keep up with some of the changing technology to make benefcial choices. As
technologies and prices change, managers often need to determine when to imple-
ment new technologies and when to wait. Making these decisions often requires
understanding the underlying technologies and trends. Managers also need to be
aware of the fundamental economics, particularly the economies of scale involved
in networks. Decisions need to be made about leasing space and network capacity
versus building and managing your own connections. And these decisions need to
be reviewed as prices change and new frms enter the industry.
Globally, telecommunications reach around the world. But capabilities and
technologies vary by nation. And the U.S. is not always at the top of the world.
Still, if a company wants to connect to customers and suppliers in other nations,
managers need to be aware of potential conficts. Technology differences remain,
pricing issues can be huge barriers, and political restrictions can cause complica-
tions with many types of communications and applications. Most of the problems
can be avoided or bypassed but it helps if you search for them and make plans
ahead of time.
A Managers View
The goal of telecommunications is to remove location as a factor in manage-
ment and decisions. Technologies exist to enable you to connect to almost
anyone, anywhere in the world to share data, voice, and video. However,
bandwidth or the speed of transferring data varies considerably, and transfer-
ring large amounts of data can be expensive. Still, as speed and availability
increase, new businesses and new ways of operating businesses are being
developed. Opportunities exist to create expand and proft as the world be-
comes more interconnected.
190 Chapter 3: Networks and Telecommunications
Key Words
Web Site References
Financial News and Quotes
Big Charts bigcharts.marketwatch.com
Bloomberg www.bloomberg.com
Dun & Bradstreet www.dnb.com
Global Financial Data www.fndata.com
Reuters www.reuters.com
SEC Edgar www.sec.gov
Motley Fool www.fool.com
Wall Street Journal wsj.com
Yahoo Finance fnance.yahoo.com
Discount Online Trading
TDAmeritrade www.tdameritrade.com
E*Trade www.etrade.com
Fidelity www.fdelity.com
Charles Schwab www.schwab.com
ScotTrade www.scottrade.com
bandwidth hogs
blog
Bluetooth
Broadcasts
coaxial cable
co-locate (colo)
direct sequence spread
spectrum (DSSS)
domain name system (DNS)
dynamic host control pro-
tocol (DHCP)
e-discovery
e-mail
extranets
fle transfer protocol (FTP)
frequency division mul-
tiplexing (FDM)
grid computing
Groupware
hypertext markup language (HTML)
instant messaging (IM)
Internet service provider (ISP)
Internet Assigned Num-
bers Authority (IANA)
Internet Corporation for Assigned
Names and Numbers (ICANN)
Internet Engineering
Task Force (IETF)
Intranet
IPv6
last mile
latency
local area network (LAN)
media access control (MAC)
near-feld communication (NFC)
network address translation (NAT)
network interface card (NIC)
packets
peer-to-peer networks.
podcasts
point of sale (POS)
portable document format (pdf)
really simple syndication (RSS)
scalability
server farm
social networking
standards
storage area network (SAN)
time division multiplexing (TDM)
transborder data fows (TBDFs)
transmission medium
twisted-pair
ultra-wideband (UWB)
voice over IP (VoIP)
whois
WiFi
Wikis
WiMax
191 Chapter 3: Networks and Telecommunications
Review Questions
1. Does it matter where data is stored anymore? Are networks reliable and
available enough to assume data and processing can be handled anywhere?
2. Why do businesses use networks to share hardware?
3. How is cloud computing like renting software?
4. List the main components of a network.
5. List the types of transmission media that are available. How do they compare
in transmission rates and cost?
6. What are the main advantages and drawbacks to wireless networks?
7. How do networks handle multiple users at the same time?
8. Why are standards so important in networks?
9. What organization is responsible for creating (or not) new top-level domains
on the Internet? Should this group be adopted and controlled by the United
Nations?
10. What type of network service do you need to run a Web server? Newer (LTE)
phone speeds are reported to be over 10 mbps; would it be possible to use
those to run a Web server?
11. Why are some cell phone networks so slow?
12. Why is the domain name system so important and what is the role of domain
registrars?
13. What is the Internet2 and how will it affect businesses?
14. What problems arise with global telecommunications?
15. Describe the process by which a computer is assigned an IP address.
16. Some people and a few members of the Internet committees have suggested a
substantial increase in the number of top-level Internet domains. Why is this
a bad idea for businesses?
Exercises
1. Some cell phones have the ability to function as a Wi-Fi to connect other
devices to the Internet using the cell phone network. Most tablets have an
optional cell phone connection. Choose a tablet and a cell phone from the
same service. Compare the costs of paying to connect the tablet directly
to the cell network versus paying for the Wi-Fi connector and connecting
through a cell phone.
2. Find at least one method to connect a printer to your home (or school)
network so that it can be shared by all users on the network. How would you
limit access to specifc people, or track the number of pages printed by each
person?
192 Chapter 3: Networks and Telecommunications
3. Using the Internet, fnd at least two software packages that will back up
data across a LAN. Briefy explain how the software functions and what
components need to be installed. Estimate the price of the software for a
network of four servers and 100 clients.
4. Research to fnd the service that generates the most amount of traffc on the
Internet today.
5. Design your perfect wireless communication device. Possibly draw it, but
identify the features that you would want. Rank the features by importance
(descending order) and write a brief reason for your top three selections.
6. Assume you want to start an e-business. What steps do you have to take to
obtain and establish a domain name for the business? How much will it cost?
7. Choose two existing Web site names. To make it more interesting, one of
them should be from a spam site. Use the Internet resources to obtain as
much information about the company and owner as you can. Note, you
should also check the offce of the appropriate secretary of state. [Answer
depends on companies, but at least provide the output from www.arin.net (or
www.apnic.net) and www.networksolutions.com (or www.internic.org)]
8. Check vendor advertising and identify the costs and speed of the following
services:
a. DSL from the phone company.
b. Cable modem.
c. Cell phone Internet access.
d. Dial-up Internet access.
e. ClearWire.
f. Wireless access at a local hot spot.
9. Identify the cost of running a server on Amazons cloud system using an
entry-level Web server running Microsoft Windows Server. Assume the site
you create will contain about 5 GB of data and handle about 500 gigabytes of
data transfer (outbound) in a month.
10. Estimate how long it would take to transmit the following information.
a. A 5 megabyte image fle over a 3G cell phone (70 kbps).
b. An e-mail message with a 120 megabyte video clip attachment over a 5
mbps cable-modem connection.
c. A 1 gigabyte data folder over a 100 mbps local area network connection.
d. A 1 gigabyte data folder onto an SSD drive that can write 270 MB/second.
e. If possible, test the above examples with real data.
f. Why would the actual transfer times be slower than the estimated
numbers?
11. Identify at least three major features provided by HTML 5.
193 Chapter 3: Networks and Telecommunications
Technology Toolbox
12. Create three Web pages that are linked. Include at least one image.
13. Create a style sheet for at least two Web pages and demonstrate how the look
of the site can be changed by altering the style sheet.
14. Create a simple Web page using Microsoft Word and save it. Create a similar
page using either straight HTML or an HTML editor such as FrontPage.
Compare the two fles and comment on the differences.
15. Find three Web hosting companies and identify the fle transfer methods
supported by each company. Does the company charge extra for some
methods?
16. Briefy describe the purpose of server programming for Web pages and how
it differs from client-side scripting.
Technology Toolbox
17. How are fles uploaded to YouTube?
18. How are fles uploaded to the Amazon S3 service?
19. Find a commercial Web hosting company and list the methods that it supports
to upload fles.
Teamwork
20. For each member in the team identify (a) how many e-mail messages they
send a day, (b) the number of text messages sent per day, (c) the number of
phone calls made per day. Combine the results from all team members and
comment on any patterns. Why would people send more cell phone text
messages than e-mails?
21. As a group answer the following two questions. Is it possible to live with
only one wireless device? Can it be standardized within the group?
22. You have an American cell phone and will be traveling to Europe for
two months. You want to have cell phone service so that your friends and
coworkers can reach you in an emergency. You also want to be able to call
people and places in Europe while you are there. Each team member should
fnd a different way to provide this service. Share your results, compare the
costs and benefts and choose a plan.
23. Each person should fnd a software package that is used to create Web
pages. Summarize the basic features, ease of use, target market, and its
price. Combine the data and recommend a package that could be used by a
marketing department to design basic Web pages.
24. If a network is available with Microsoft Outlook (or similar package) on each
client, add each team member to the Contacts list. Each person should enter a
few items in a personal calendar to block out some times for one week. Then
share the calendars and use the system to schedule a meeting.
194 Chapter 3: Networks and Telecommunications
25. Interview managers, friends, or family members who have jobs and identify
where their primary fles are stored. Are they stored on local computers, on a
department fle server, or at a more distant location? Who is responsible for
backup? What is the process for recovering lost fles? Combine each result
into a document. Create a table and a chart to summarize the results. Write a
short paragraph suggesting improvements.
26. If you have access to computers running Windows 7 or above, have each
team member determine the IPv6 address of a machine and compare the
results. Hint: You can always use the command line program ipconfg.
Rolling Thunder Database
27. Design a network for the Rolling Thunder Bicycle Company. Identify who
will need access to the network; how many workstations you will need (and
where to place them); the data, input forms, and reports users will need.
Using the existing data, estimate the storage requirements and transmission
needs. Specify how changes and growth will affect the type of network
needed.
28. Describe how the Internet could be used to increase sales at Rolling Thunder
Bicycles.
29. Rolling Thunder Bicycles wants to expand international sales. What changes
would need to be made to the application? What problems would you expect
to encounter, and how would you overcome these potential problems?
30. The manager of Rolling Thunder Bicycles wants to access the database from
home. Describe some options of how this could be done. What potential
problems might arise?
31. If you have access to laptops and a wireless network, test the database
running over a wireless connection. If fve or six people want to use the
system with wireless devices, what problems might arise? Do some research:
Is there a system that can help?
195 Chapter 3: Networks and Telecommunications
Additional Reading
The capacity of optical fbre, The Economist, June 28, 2001. [Theoretical
capacity of fber-optic cables.]
Federal Communications Commission, Broadband Performance, OBI Technical
Paper No. 4, 2010. http://www.fcc.gov/Daily_Releases/Daily_Business/2010/
db0813/DOC-300902A1.pdf. [FCC evaluation of U.S. broadband usage and
speeds, suggesting that actual consumer speeds are about half the advertised
rates.]
Jeff Hecht, Ultrafast Fibre Optics Set New Speed Record, New Scientist, April
29, 2011. [Two researchers show demonstration speeds of 100 terabits per
second in fber.]
The Internet, untethered, The Economist, October 13, 2001. [Special section on
wireless issues with examples from Japan.]
Kahn, J. M. and K.P. Ho. Communications technology: A bottleneck for optical
fbres. Nature, June 28, 2001, pp. 1007-1009. [Theoretical capacity of fber-
optic cables.]
Kahn, Robert E. The Role of Government in the Evolution of the Internet,
Communications of the ACM, August 1994, p. 15-19. [Early days of the
Internet.]
Kurose, James F and Keith W. Ross, Computer Networking: A top-down
approach featuring the Internet, 2001, Addison Wesley Longman: Boston.
[Technical details on networking and TCP/IP.]
Mehta, Stephanie, Bend it Like Corning, Fortune, August 6, 2007. [New fber
optic cable from Corning that can handle tight bends.]
Fahmida Y. Rashid, Obama Wants to Wiretap the Internet, eWeek, September
27, 2010. [Several countries and the U.S. lean on Blackberry to provide
decryption keys so police can listen in on calls and messages.]
Jaikumar Vijayan, Egypts Net Blockage an Armageddon Approach,
Computerworld, January 28, 2011. [Initial report on Egypts shutdown of the
Internet and cell phones.]
Wiggins, R. How the Internet Works, Internet World, 8(10), 1996. [Basic
explanation of terms and connection points.]
Waltner, C. Meet your connection, Fortune Technology Review, Summer 2001,
59-66. [Discussion of business Internet connection costs and options.]
196 Chapter 3: Networks and Telecommunications
Cases: Wholesale Suppliers
Te Industry
0
1
2
3
4
5
6
7
8
9
10
1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010
B
i
l
l
i
o
n
$
Annual Revenue
W.W. Grainger
Univar
Owens & Minor
Wholesale suppliers are the original business-to-business providers. In many
ways, they are like any other manufacturer or retailer. The difference is that their
primary customers are other businesses. Selling to other businesses often means
that the company supplies bulk items, but some wholesalers specialize in small,
hard-to-fnd items. Some wholesalers provide commodities, such as raw chemi-
cals. That raises one of the big challenges: differentiating your company from the
competitors. What makes one companys products different from the others? In
most cases, it is not the product that matters, but the customer service. Some-
times location is a key aspect to providing service, so small frms can survive by
-0.01
0
0.01
0.02
0.03
0.04
0.05
0.06
0.07
0.08
1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010
R
a
t
i
o
Net Income / Revenue
W.W. Grainger
Univar
Owens & Minor
197 Chapter 3: Networks and Telecommunications
carving a local niche. But the big frms often have an advantage in economies of
scale, driving costs down by serving large geographical regions through distribu-
tion centers. Some of the large commodity providers are global in scope. But size
raises a new set of problems: managing a global company that has grown through
multiple mergers. Communicating within the company is diffcult enough. Com-
municating a consistent message to customers can be exceedingly hard.
Payments are another challenging issue for wholesalers. Manufacturers often
squeeze vendors by stretching payments to the future. Small frms often pay the
price in these cases, because it puts pressure on their cash fow when they do not
receive payment for 90 days. Technology cannot always solve this problem be-
cause it is a power balance between vendor and customer. However, it can at least
track the payment history and make the entire process transparent to both sides.
B2B Ecommerce
Communication is the entire purpose of electronic networks. Internal networks
are useful for collaboration and coordinating employees. For customers, the big
leap in the last decades has been e-commerceparticularly business-to-business
(B2B) sites. B2B sites can be set up by one company, focused on providing a
single interface for its customers. Alternatively, it might be a site shared across
the industry by multiple suppliers and many customers. Several auction-based
Web sites were created around 2000 to increase competition and make it easier
for customers to fnd and purchase various items. Many of these sites later failed;
however, a few remain in some key industries. Both sellers and purchasers have to
decide what type of B2B site works best for each type of product.
A shared site can be run by a neutral party, with costs shared by everyone.
Hence, it can be easier for smaller frms to participate. But auction-based sites
tend to drive down the prices of commodities, so sellers might not want to use
them. From the perspective of the buyers, they might prefer a tighter relationship
with one or two suppliers. If you compete only on the basis of price, suppliers
might not be responsive when crises arise. Ultimately, one of the big questions for
buyers is how much of the logistics they want to handle themselves, versus how
much they want to outsource to the vendors.
Logistics
Distribution is a key factor in the wholesale industry. Suppliers need to get prod-
ucts to the customers. Sometimes the products are bulky. In the case of chemicals,
they might be volatile and diffcult to transport. But that is the point of customer
service by the supplier. On the other hand, logistics involves more than just trans-
portation. It includes tracking orders and payments, timing the deliveries, fnding
rare products, tracking shipments, and recording everything in a format that can
be shared. Elemica is a multi-vendor Web site for the chemical industry. Its Web
site notes that an average international shipment requires 6 participants, 20 docu-
ments, and between 4 and 12 weeks of time. One of Elemicas selling points is a
software tool to track the entire process and integrate the data between the sup-
plier and purchaser enterprise resource planning (ERP) systems.
Wholesalers also have to make diffcult decisions about inventory levels. In-
creasingly, through just-in-time ordering systems, manufacturers have pushed in-
ventories back to the suppliers. Consequently, suppliers have to continually evalu-
ate and forecast customer demands, compare them to world supply levels, and
determine how much to stock of each item in every location. Linking to customer
198 Chapter 3: Networks and Telecommunications
databases can be a useful step, because it enables suppliers to quickly spot trends
and make more accurate forecasts (Babcock 2003).
Additional Reading
Babcock, Charles, Distribution: Distributors Look To Crystal Balls,
Information Week, September 22, 2003.
Elemica Web site: http://www.elemica.com
Case: Owens & Minor
Founded in 1882, Owens & Minor (ticker: OMI) is a leading distributor of medi-
cal and surgical supplies to hospitals in the United States. It is also a health care
supply chain management company that can run the entire logistics side for hos-
pitals. In 2006, the company distributed almost 120,000 products from over 1,000
suppliers. It had 41 distribution centers and a total of 3,200 employees distributing
products to about 4,000 customers (annual report 2006). By 2010, the number of
customers had increased to 4,400 supported by 52 distribution centers and 4,800
employees (annual report 2010).
The company purchases medical items in bulk from suppliers and stores them
in its warehouses, which are close to customers. Most warehouses deliver within
a 200-mile radius. Customers can order through a variety of systems, including a
stockless, automated system where Owens & Minor employees deliver individ-
ual items as needed. Although the company purchases items from almost all of
the medical manufacturers, about 16 percent of the net sales in 2003 consisted of
products from Johnson & Johnson and 14 percent from subsidiaries of Tyco Inter-
national, which includes the Kendall Company (annual report). Its major nation-
wide competitors are Cardinal Health (whose roots lie with American Hospital
Supply Corporation), and McKesson. In 2006, sales revenue reached $5.5 billion
with a net income of $49 million, which represent a 16 percent increase in revenue
but a 25 percent decline in proft from 2005. But the move into new offces ac-
counts for some of the increased costs (2006 Annual Report).
Delivering Supplies
Until 1998, O&M was simply delivering supplies to hospitals. In that year, the
company was hit with the loss of substantial revenue when HCA Inc., the biggest
health care provider in the United States, decided to take its business to another
companyimmediately reducing O&Ms revenue by 11 percent. The company
decided that the answer was to go beyond simply selling and delivering products.
It needed to provide entire supply chain management tools to hospitals. The com-
pany estimates that hospitals spend an additional 40 percent of their supply costs
just managing the logistics, tracking orders, and restocking. David Guzman, hired
as CIO in 2000, notes that theres only so much blood you can squeeze from a
turnip in terms of the product price. But theres a lot you can do with the logistics
costs (Kontzer 2003). Consequently, O&M decided to extend itself deeper into
the supply chain on both the hospital and manufacturer ends. CEO Bilmer Minor
III notes that our business has been built on supply-chain services and customer
service. We realized our difference would be based on providing information
(Kolbasuk 2001).
199 Chapter 3: Networks and Telecommunications
Logistics Services
As a distributor, O&M understands the importance of networks for connecting
to customers and suppliers. The company survives on price differentialsbuying
products at discounts from manufacturers and distributing them to hospitals. With
ferce competition, it has to use technology to hold down costs to make a proft
about 1 percent on sales (Stahl 2004).
One challenge that O&M faces is that its customers (hospitals, nurses, and phy-
sicians) are several years behind in technology. Craig Smith, president of O&M,
estimates they are as much as 20 years behind. Smith believes that radio frequen-
cy identifcation (RFID) chips can make a substantial difference by helping hospi-
tals track everything they own from beds to drugs. Were headstrong into RFID.
It will have a signifcant impact on our business (Stahl 2004).
Beyond the simple warehouse and transportation services, O&M has created
several tools to help hospitals reduce their costs. The OMSolutions division is a
professional services unit that handles consulting and outsourcing to help hospi-
tals reduce costs. The team handles everything from stockroom and process re-
design within a hospital to outsourced management of supplies (annual report).
The CostTrack system is another tool to help customers analyze their costs. Using
activity-based costing, the system shows customers exactly how much each step
of the purchasing process is costing. It enables hospitals to then choose exactly
which parts of the process they want to outsource to O&M. In 2003, 32 percent of
O&M sales were generated through the CostTrack system (annual report).
One big problem that hospitals face is that they buy supplies from many sourc-
es. As much as 50 percent of the purchases are direct from manufacturers. Other
items might be purchased from multiple suppliers and distributors. So O&M de-
veloped the Wisdom2 analytical tool. It collects all purchasing data from a hospi-
tal and makes it available as a single dataset. It tracks purchases from competitor
suppliers as well as directly from the manufacturers. Judy Springfeld, director of
corporate standardization and contracting at Baylor Health Care System (a nine-
hospital network), says that weve just been dying for data (Kontzer 2003). The
Wisdom2 system provides the detailed data she wants, across all of the purchases,
and even puts it into a spreadsheet. Wisdom and Wisdom2 are also useful to O&M
directly.
Ultimately, Owens & Minor would like to simplify the ordering process even
moreto the point of automated replenishment. If the system can forecast usage
rates, O&M employees could deliver new items to the hospital and track the entire
process, without needing a separate order from the hospital. Guzman thinks the
process is feasible, Youd be surprised how remarkably predictable demand is
in the healthcare system. And I dont mean in general. I mean system by system.
Massachusetts General is different from Stanford Hospital, but Stanford in its own
right is predictable, as is Massachusetts General (Kontzer 2003).
O&M also uses technology and networks to improve its operations. Remember
that margins are extremely tight, and saving costs is critical. A new warehouse-
management system in 2001 that uses wireless technology to guide workers in-
creased productivity by 20 percent (Kolbasuk 2001). Notice that O&M manages
to record over $4 billion of sales a year with only about 3,200 total employees.
New Systems
To provide new services, Owens & Minor needed new systems. But before build-
ing new systems, the company frst needed to consolidate its information technol-
200 Chapter 3: Networks and Telecommunications
ogy team. In 2002, the company canceled an outsourcing contract with IBM and
expanded an arrangement it had with Perot Systems. The goal was to consolidate
data centers to save costs, but also to begin creating new technology systems (Vi-
jayan 2002). The companys main goal is to redesign the legacy systems so they
use Web services to integrate all of the components. Ultimately, every informa-
tion system the company has will need to connect to the OMDirect Web portal.
Integrating the systems is still diffcult and requires a new system architecture that
uses XML to transfer the data. Guzman notes that you cant go out and buy Web
services. Its clear you have to be the one to build [them] (Murphy and Bacheldor
2003), so the process is scheduled to take three years.
In 2006, Owens & Minor extended its outsourcing agreement with Perot Sys-
tems, committing to migrating their mainframe systems through 2014. Perot Sys-
tems also helped transfer and integrate data from the purchase of McKesson. The
most important step was linking the O&M systems with those of the new cus-
tomers (2006 Annual Report). The purchase of McKesson reduces the number of
national providers to two: O&M and Cardinal Health. With the purchase of Ac-
cess Diabetic Supply, LLC in 2005, O&M has become the third-largest mail-order
supplier of diabetes supplies; but faced problems with not getting paid by many
end-customers. The company prides itself on being an early adopter of computer
technologylargely used to reduce costs and improve productivity. The company
distributes 180,000 products from 1,200 suppliers, so tracking inventory and pur-
chases are important. They also provide software management tools for operating
rooms across the nation, including QSight, SurgiTrack, Wisdom, and PANDAC,
an operating room inventory management program. O&M uses these tools to con-
trol and reduce inventory costs. Wisdom is a business intelligence tool that helps
customers analyze their supply usage. Sales to the top 10 customers constituted 20
percent of revenue, so providing support and linkages are critical to the success of
O&M.
In 2010, O&M needed to move its custom ERP system onto new Windows
servers. The original system was a custom COBOL application running on main-
frame hardware, consisting of about 10 million lines of code. The company de-
cided that the complex business logic built into the code was too valuable to lose
and too expensive to recreate. So it used Micro Focus COBOL and tweaked the
code to run on Windows-based hardware (Thibodeau 2010). In addition to saving
money by not buying and customizing a new ERP system, the company cut its
hardware costs in half.
The company had been looking at the project for several years and struggled to
fnd a way to transfer the system without bringing the business to a grinding halt
for six to nine months, as CEO Craig Smith put it (Nash 2010). Transferring to
a new ERP system ultimately saved $100 million. The new system simplifes us-
ability. When a customer calls in, sales representatives can see all of the relevant
data on one screen instead of searching 11 or 12 screens to get an answer.
Security
With any network system, and particularly with Internet-based systems, security
is a critical factorparticularly in the health care industry. At one level, security
today is relatively straightforward: identify each resource and user, and then as-
sign the appropriate permissions to users. Except that with thousands of users and
hundreds of applications, it is expensive to manage the tasks. Owens & Minor has
more than 12 administrators who are dedicated to managing, adding, and deleting
201 Chapter 3: Networks and Telecommunications
employee and customer access rights (Hulme 2003). And, the company has to
be extremely careful to monitor access rights to ensure they are correct and that
they are updated as employees change jobs or leave the company. To simplify the
process, O&M is consolidating the identity databases onto a single centralized
Microsoft Active Directory repository. Active Directory (AD) runs on Microsoft
servers and holds user credentials. It can be accessed by a variety of applications
and services. Users essentially login to AD, and the system authenticates the user
to other applications. O&M is also using IdentityMinder from Netegrity Inc. to
transfer the user rights into the 20 or 30 applications accessed by each user. Paul
Higday, chief architect for O&M, notes that what this will allow us to do is set up
a user based on what theyre allowed to access with a single click instead of hav-
ing to manually add each account (Hulme 2003).
Questions
1. How does Owens & Minor use networks and information systems to reduce
costs?
2. Given the innovations by American Hospital Supply in the 1980s, why are
hospitals not even more integrated into the supply chain?
3. How are logistics services different from simply delivering supplies?
4. How will RFID affect the use and purchasing of hospital supplies? Will the
technology be widely accepted?
Additional Reading
Ante, Spencer E., Owens & Minor, BusinessWeek, November 24, 2003, p. 92.
Hulme, George V., Identity Checkpoint, Information Week, January 20, 2003.
Kolbasuk McGee, Marianne, Supply Chains Missing Link, Information Week,
September 17, 2001.
Kontzer, Tony, Owens & Minor Takes Supply Chain Deeper, Information
Week, September 22, 2003.
Murphy, Chris and Beth Bacheldor, Tying It All Together, Information Week,
March 17, 2003.
Nash, Kim S., What Getting IT Right Means to a CEO, CIO, May 18, 2010.
Stahl, Stephanie, Prescription For Change, Information Week, February 2,
2004.
Thibodeau, Patrick, One Firms Story: The Mainframe Goes, but Cobol Stays
Behind, CIO, April 20, 2010.
Vijayan, Jaikumar, Owens & Minor Axes IBM For Perot, Computerworld, July
29, 2002.
Case: W.W. Grainger
Founded in 1927 in Chicago, W.W. Grainger (ticker: GWW) is in an interesting
industry. The company supplies products to other businesses for maintenance, re-
pair, and operations (MRO). The products include janitorial supplies, light bulbs,
202 Chapter 3: Networks and Telecommunications
and bolts. But the repair side can include any number of unique parts or tools
used to repair equipment, from gaskets to pumps. The company estimates the U.S.
market for MRO to be $100 billion a year, giving Grainger about a 5 percent share
of the marketthe largest of any competitor. About 90 percent of the market is
flled by local and regional suppliers, and Graingers strategy is to capture market
share from these fragmented rivals. In 2003, the company had 575 sales outlets
backed by 17 distribution centers and carried more than 500,000 different prod-
ucts (2003 Annual Report). In 2006, Grainger had sales of $5.9 billion with net
earnings of $383 million. In 2004, Grainger began installing more outlet stores in
major metropolitan areasin a goal to make it more convenient for people to pur-
chase products. The company expected to spend $50 to $80 million on the project,
as well as $10 to $15 million on information technology. (2006 Annual Report). In
2010, Grainger had sales of $7.2 billion with 607 branches, including new outlets
in Asia in Latin America. By 2011, Grainger carried 354,000 different products
and James Ryan, the CEO, has a goal of reaching the sweet spot of 450,000
500,000 different products (2010 Annual Report).
As a distributor and supplier, Grainger makes money on the price differential
by purchasing items in bulk and selling them at a markup to customers. But the
markup is small. However, Grainger is expanding into the logistics market. The
company estimates that about 40 percent of the total procurement cost comes
from trying to locate and purchase MRO products. One of Graingers competitive
strengths is the number of products it carries and makes available almost imme-
diately at any of its stores. Customers need to know that Grainger will carry the
parts and supplies they need, regardless of the manufacturer. Parts that are not
stocked in the local branches can usually be shipped for next-day delivery out of
the distribution centers. To strengthen its local presence, Grainger is adding more
showrooms and warehouse capacity across the United States. The goal is to have
an outlet within 20 minutes of most businesses and institutions (annual report).
Of course, it does not make sense to carry products that rarely sell, so Grainger
has to carefully choose the products that it holds in inventory. The company also
works closely with manufacturers to reduce cycle times so that they can quick-
ly refll warehouses or custom-order products if needed. Grainger manages the
inventory problem by using multiple channels. Its 3,700-page CD-ROM cata-
log describes 82,000 products. Its Web site offers more than 200,000 products.
When customers need more specialized repair parts, Graingers Parts division can
obtain more than 2.5 million parts from its suppliers. The FindMRO division is
even more specialized and can track down over 5 million facilities maintenance
products (annual report). George Rimnac, vice president and chief technologist at
Grainger, observes that many of the products we sell are products our customers
didnt know they needed until today (Pratt 2001).
The FindMRO division demonstrates a key element of Graingers success: its
knowledge base. Between its systems and workers, the company is extremely suc-
cessful at fnding parts, including chemicals to fuel Universal Studios fog ma-
chines. This knowledge has a huge value to Grainger. A typical online order is
worth $250 with small proft margins. Orders on FindMRO average $1,200 and 80
percent of the items are shipped directly from the manufacturergiving Grainger
an immediate proft (Sviokla 2001).
Grainger has been adversely affected by the transfer of manufacturing from the
United States to other nations. The company has countered this shift somewhat by
focusing on health care and government agencieswhich cannot easily move off-
203 Chapter 3: Networks and Telecommunications
shore. At the same time, the company is expanding its purchases from lower-cost
offshore suppliersparticularly for house brands (Top Distributor June 2003).
Logistics Services
Selling to businesses and government agencies is a key component to growth for
Grainger. But Grainger knows that simply offering them products is not good
enough. Grainger has developed sophisticated information tools to help customers
analyze and replace their purchasing systems. The companys Integrated Supply
division is a professional services group that will reengineer a customers stock-
room and provide a just-in-time inventory system.
Like other distributors, Grainger was hurt by the economic downturn of 2001
and 2002. Although sales revenue declined, the company used its supply chain
software to boost its proft margins, resulting in an increase in net income (Konicki
2002). The company also expanded its investments in warehouses and information
technology. Rimnac observes that if you have fnancial resources, a recession is
a good time to invest so when the rebound comes you can excel (Konicki 2002).
After another decline in sales in 2002, yet a continued improvement in profts,
CEO Richard L. Keyser commented that we remain committed to improving ser-
vice to our customers as they continue to look for ways to reduce costs. Enhance-
ments to our logistics network and local availability of the right products will
provide higher levels of service. Our initiatives should accelerate sales growth as
more customers experience this improved service (Lower Sales August 2003).
To combat these changes, Grainger is expanding into additional services. In
2001, the company opened an on-site branch at Florida State University. It fol-
lowed by opening a second on-site branch at Langley Air Force Base in 2002.
In 1996, Grainger took on a more in-depth role at the American Airlines facility
at the Dallas/Fort Worth airport. The company essentially took over all janitorial
and MRO services for the facility. With its success, two years later, the contract
was extended to cover the nearby American Airlines headquarters building. In
2003, the company ran integrated supply programs for more than 40 customers.
Large customers with over $2 million a year in MRO purchases from Grainger are
eligible for the program. Grainger customizes the service for each company, but
essentially, Grainger identifes the inventory needs and handles everything from
ordering to stocking and might even include an on-site center distributing products
to employees. At American Airlines, Grainger was able to substantially reduce the
amount of MRO inventory sitting around. At the same time, facility worker com-
plaints about not having the necessary tools available disappeared (Fraza 2003).
Grainger experimented with several Web sites and e-business approaches be-
fore reaching its current confguration. In 1999, the company had multiple Web
divisions, including OrderZone (a marketplace), FindMRO (a search site for hard-
to-fnd parts), and MROverstocks (an auction site). It also had relationships with
logistics sites such as Ariba and Commerceone as well as several other e-market-
places. Carol Rozewell, vice president research director at research frm Gartner
Inc., noted that Grainger customers were confused. They offered such a wide va-
riety of products, customers needed guidance to navigate [the Web sites] (Mad-
dox 2002). Ultimately, Grainger killed off all of the sites except the companys
main site (grainger.com) and the FindMRO site that is accessed only through the
main site. But Grainger spent more than $180 million on Internet technologies
and took a $23.2 million charge, followed by a $13.4 million write-off of digital
properties (Maddox 2002). The main Web site was redesigned to make it easier
and faster to use.
204 Chapter 3: Networks and Telecommunications
Internal Systems
Despite the growing importance of Web-based sales and in-house ties to custom-
ers, Grainger is also emphasizing increased sales through its local branches. Push-
ing products more effciently through the local stores is the main reason for the
$200 million redesign of Graingers distribution system (Buss 2002).
One step Grainger took to improve effciency was to install an SAP R/3 ERP
system in 1999. Unfortunately, Grainger had several problems installing and
confguring the system. For example, the ERP software miscounted the items on
handpartly because of problems in the transaction-processing subsystem. In
the frst year alone, the system cost Grainger $19 million in lost sales (Stedman
2000). Ultimately, Grainger got the system fxed and consolidated its fnancial
data onto a single system. One of the problems Grainger had was trying to connect
too many outside products to the SAP system. In 2003, the company began phas-
ing out the old systems and using standard SAP components instead. Jarnail Lail,
vice president of business systems, observed that the move enabled the company
to reduce the number of outside consulting frms from 100 down to 10 (Colkin
Cuneo 2003).
Despite the integrated enterprise resource planning system, Vice President of
Finance Laura Brown wants more. In particular, she wants to be able to match
sales fgures with expense data in real time (Colkin and Whiting 2002). The prin-
ciples of the Sarbanes-Oxley Act are scaring fnancial managers and executives
who want to ensure that the numbers the systems are spitting out are true repre-
sentations of the business fnances.
In January 2006, Grainger implemented an Enterprise Resource Planning Sys-
tem from SAP. The goal was to integrate the information across the channels,
products, and logistics network. CEO Richard L. Keyser in a September 2004
press release stated that for us, technology is not a mere indulgence or a nice to
have. It is at the very heart of our business and helps us drive our multi-channel
strategy. Providing customers access to our broad product line through several
channels has been a competitive weapon for us because it spells speed and conve-
nience for our customers. He also observed that 60 percent of the companys or-
ders came in via telephone, so the company also upgraded its telephone system to
make it simpler to reach people and place orders. The early-phase implementation
of SAP resulted in a $115 million reduction in inventory and a 25 percent increase
in productivity, so Grainger was fnally happy with the system. According to SAP,
the system supports 2 million customer contacts, 800,000 products and 115,000
orders per day (SAP Web site).
Grainger has repeatedly been high in the rankings of Best Places to Work in
IT, compiled by Computerworld. In 2010, the company had 586 IT employees
(and 13,000 total employees), with a turnover rate of only two percent. It probably
helps that James Ryan the CEO was once the CIO at Grainger.
Questions
1. How is Graingers business different from that faced by Owens & Minor?
2. Why did Graingers initial Web approach using multiple sites fail?
3. Graingers problems implementing its ERP system are often cited for being
unusually severe. Why did Grainger experience so many problems?
4. How does Grainger support local stores as well as online sales? Why is that
approach successful for Grainger but not for Dell?
205 Chapter 3: Networks and Telecommunications
Additional Reading
Buss, Dale, The New Deal, Sales and Marketing Management, June 2002, Vol
154(6), pp. 24-29.
Colkin, Eileen and Rick Whiting, Inadequate IT? Information Week, September
9, 2002.
Colkin Cuneo, Eileen, Less Is More In Software, Information Week, January
13, 2003.
Fraza, Victoria, Making Integrated Supply Work, Industrial Distribution, April
2003, Vol 92(4) p. 69.
Industrial Distribution, Top Distributor Talks Business, June 2003, Vol 92(6),
p. 46.
Industrial Distribution, Lower Sales, Higher Earnings, August 2003, Vol 92(8),
p. 34.
Konicki, Steve, and Eileen Colkin, Optimisms Back! Information Week,
March 25, 2002.
Maddox, Kate, Growing Wiser, B to B, September 9, 2002, Vol 87(9), pp. 1,2.
Pratt, Mary K., Maintenance, Repair And Operations, Computerworld,
February 26, 2001.
Stedman, Craig, ERP Woes Cut Grainger Profts, Computerworld, January 7,
2000.
Sviokla, John, Knowledge Pays, Information Week, February 15, 2001.
Case: Univar: Van Waters & Rogers
Van Waters & Rogers is a respected name in the chemical supply industry. Estab-
lished in Seattle in 1924 by George Van Waters and Nat S. Rogers, the company
grew through acquisitions to become the largest wholesale provider of chemicals
in the United States and Canada. Through international mergers, the company
is also a major (but not the largest) supplier in Europe. In 1973, the company
changed its offcial name to Univar, but kept the esteemed Van Waters & Rog-
ers name on its local units. In 1986, the company acquired McKesson Chemi-
cal to extend its reach across the United States. Starting in 1991, the company
began a series of mergers and acquisitions in Europe, forming Univar Europe.
The rest of the chemical supply industry was consolidating at the same time. In
1996, Royal Pakhoed, a major worldwide player in liquid chemicals, purchased
the shares of Univar it did not already own. In 1999, Royal Pakhoed merged with
its major competitor (Royal Van Ommeren) and created Royal Vopak. The growth
continued with the purchase of Ellis & Everard in 2001, giving Vopak a substan-
tial market share in the United Kingdom and Ireland. However, with the global
economic downturn after 2001, all chemical suppliers were suffering. In 2002,
Vopak spun off the chemical and distribution assets and reestablished Univar as an
independent company. Univar is a Dutch company, listed on the Euronext Amster-
dam stock exchange as UNIVR. Its headquarters is in Rotterdam, but major ad-
ministrative offces remain in Bellevue, Washington (company history Web site).
206 Chapter 3: Networks and Telecommunications
Largely because of the economic recession of 2003 and the high prices for oil (a
major ingredient for many chemicals as well as a factor in transportation costs),
all of the major chemical suppliers have suffered. Analysts estimate that Vopak
has invested about $1 billion in Univar. Shortly after stock was issued in the new
Univar company, its shares fell to 5.6, which gave the company a valuation of
only about 150 million, less than one-ffth of that billion dollars (Tilton 2002).
Univar has progressed through considerable turmoil with the various mergers
and the fat economies. In the early 1990s, the company tried to centralize manage-
ment and run its distribution centers using a hub-and-spoke system. Analysts have
pointed out that the system worked poorly and sales suffered. With the purchase
by Vopak, the Van Waters & Rogers division was moved back to a decentralized
approach, with more responsibility pushed to regional directors and a focus on
specifc product segments. In the late 1990s, the company moved more operations
out to multiple local warehouses (Morris 1996). The multiple acquisitions during
the late 1990s and early 2000s did not really help sales in the short run. Managers
and investors faced huge uncertainties about what was going to happen next.
Initially, splitting the company back from Vopak appears to have helped. Sales
for 2003 increased 9 percent to 1.62 billion eruos. However, much of that gain
was due to currency effects from the 40 percent Euro appreciation. (In the chart at
the top of this section, Univars sales have been converted to dollars using a sin-
gle exchange rate to eliminate the exchange-rate effects.) Sales in North America
were fat and hampered by the manufacturing slowdown and the rise in oil prices
(Van Arnum 2003). A key step in the mergers was to consolidate the European
operations under a single brand. Managing the company globally instead of re-
gionally is a second imperative. As part of Vopak, the strategy had been to balance
regional storage with distribution. John Phillpotts, president of Univar Europe,
notes that we never operated commercially as a global business before. For the
last 18 months, weve had no distractions about where the company is going or
whos going to own it. Chemical distribution is all we talk about now (Young
2004).
In 2007, Univar began the process of selling to CVC Capital Partners, a Lon-
don-based private equity frm (Berman 2007). In 2007, Univar acquired CHEM-
CENTRAL Corporation and expanded into new industries including coatings,
personal care, and cleaning. Univar servers more than 250,000 client customers
worldwide and leads the industry in chemical distribution (2006 Annual Report).
Much of Univars proft margins come from processing, packaging, and distribu-
tion. Most of the inventory turns over every 40 days. Most of the costs are fxed,
particularly tied up in processing and storage facilities such as the 160 distribution
centers in the U.S., Canada, and Europe. Net sales in 2006 were $6.6 billion with
a net income of $134 million. For four years, sales grew at an 11 percent com-
pound growth rate and earnings grew at 21 percent due to declining costs (2006
Annual Report). Net sales in 2009 were $7.2 billion and Univar had 179 distribu-
tion facilities and 6,900 employees around the world (Web site/annual report).
The company continued its acquisition of smaller distributors in Europe.
E-Business
Univar has followed two approaches to e-business. The company is part of the
consortium that drives Elemica, the chemical industry Web site. Univar also runs
its own B2B Web portal, ChemPoint. The ChemPoint site is also designed to sup-
port smaller chemical manufacturers and highlight new products. In particular,
207 Chapter 3: Networks and Telecommunications
the site is aimed at providing distribution services to chemical producers. Cus-
tomers place orders through the site, and Univar handles the distributionlinking
electronically to Yellow Transportation, its main less-than-truckload (LTL) car-
rier. Chad Steigers, managing director of ChemPoint.com, notes that there are still
some diffculties getting companies to adopt electronic transactions. The goal of
many frms is to increase productivity. His frm is looking to more technology to
encourage the use of e-business. We think, for example, RFID will be a major
factor especially in the chemical arena (Cottrill 2003). Ultimately, buyers should
be able to place an order, and then track it all the way through shipping, storing,
and delivery.
ChemPoint focused on ensuring a broad market by signing up at least one sup-
plier for each type of chemical, with the goal of providing buyers with a depend-
able source. Reliability and reduction of search costs are important factors for
many of the hard-to-fnd chemicals (Cuny 2001).
When the ChemPoint site was started, it faced intense competition. As Chad
Steigers, managing director, pointed out in 2000, There are 25 trading companies
that offer auctions of chemicals. We think that will drop down to two or three. At
the time, the Web site had 127 customers and sold 1.3 million products provided
by 2,200 suppliers, amounting to $24 million in transactions a year (Seideman,
2000). The emphasis on specialty chemicals and distribution are key elements that
have kept the site active today. Steigers observes that e-distribution is a new seg-
ment for the industry. Were the only ones focused on the less-than-truckload seg-
ment of the specialty and fne chemicals market, which is about a $70-billion/year
niche (Fuller 2000).
Univar also participates in Elemica, an electronic marketplace for the huge
chemical producers and distributors. The site was set up at the end of 2000, pri-
marily to facilitate long-term contracts. It was also designed to assist frms with
fnancing and transportation issues. The decision to avoid spot market auctions
was probably due to the competing systems already in development (most of them
have since failed) (Rosencrance 2000). Because of the emphasis on large sales,
Elemica is emphasizing the ability to connect ERP systems between buyers and
sellers. Larger purchasers can transmit orders, receive confrmations, and transfer
the data directly into their accounting ERP systems (www.elemica.com).
Univar also runs specialty Web sites for certain uses. For instance, the pestweb.
com site is used to provide information and sell products to pest and weed con-
trol companies. To provide wider access to data and ordering, the site created an
iPhone app to provide information on products and the industry. It enables large
and small frms to obtain data and order chemicals directly from their nearest Uni-
var provider (pestweb.com).
The company also wants to build in more relationship-based features to its
Web sites. The goal is to help customers fnd related information and products
that might be useful to them. As CIO Cummings points out, it is challenging for
customers to understand the full breadth of products provided by Univar, so If
we knew a bit more about what the customer does, we could direct them towards
more of our capabilities (Beacham 2010).
Internal Network Technologies
The global nature of Univar makes it more diffcult to manage the company. Even
across the United States, the battles between centralization and decentralization
led to sales problems. Dealing with multiple offces around the world, in a com-
208 Chapter 3: Networks and Telecommunications
pany that now sees itself as a single global entity, can be diffcult and expensive.
To improve communications without increasing travel costs, Van Waters & Rog-
ers turned to PlaceWares hosted collaboration system (now owned by Microsoft
and renamed LiveMeeting). The system provides voice and video to any desktop
that is connected to the Internet. It also has shared drawing boards, chat facilities,
and the ability to show slides. It can also store a presentation for later playback
if some people cannot make the initial meeting. In one example, Van Waters &
Rogers used it for a strategy meeting between a team in North America and one in
Switzerland to discuss a product rollout (Agnew 2000). The system is also used
for training and general meetings. Ron Miazga, the human resources training di-
rector, notes that the system has been well-received and cost effective. However,
building training sessions takes some practice, since you have to make the pre-
sentations very media intensive. You should ask a polling question every three to
fve minutes. You have to change the screen every minute or so to hold their atten-
tion (Agnew 2000).
In 2006, Univar signed with Odyssey Logistics to handle in-bound deliveries
including transportation and management. Odyssey claims that one reason for the
strategic alliance was the power and capabilities of its Global Logistics Platform
software (OdysseyLogistics.com). The software integrates with commercial and
private carriers of rail and trucks to provide scheduling and tracking. It also deter-
mines rates, availability, and scheduling over the Web. Outsourcing these opera-
tions simplifes management and provides capabilities that Univar would not be
able to create by itself.
Around 2007, Univar replaced its IBM computers with an IBM System z9 en-
terprise system because of the high growth rates and increased server loads. The
companys custom ERP system was designed and built to run on IBM large com-
puters and the company needed a new system that could expand and grow with
future needs. The system can also run virtual Linux servers which could be used
to reduce the number of physical servers Univar runs.
In 2010, Univar hired Dave Cummings as a new CIO. His main experience was
with ConocoPhillips as a program manager with SAP applications (press release).
Univar has an online ordering system that supports standard ordering, and track-
ing, as well as material safety data sheets (MSDS).
Questions
1. Why does decentralization at Univar require more use of networks?
2. Why does Univar pursue a multiple-site e-commerce strategy, and why does
it work for Univar and not for Grainger?
3. Why are some customers reluctant to adopt electronic ordering for
chemicals?
Additional Reading
Agnew, Marion, Collaboration On The Desktop, Information Week, July 10,
2000.
Beacham, Will, Interview with CIO Dave Cummings, March 10, 2010, http://
www.icis.com/Articles/2010/03/10/9341649/e-commerce-technologies-
could-revolutionise-chemicals.html.
209 Chapter 3: Networks and Telecommunications
Berman, Dennis K., CVC Capital Is Set to Purchase Univar, The Wall Street
Journal, July 9, 2007.
Corporate History Web site: http://www.univarcorp.com/ourhistory.htm
Cottrill, Ken, Overcoming Inertia, Traffc World, January 27, 2003, p. 1.
Cuny, Tim and Marvin Richardson, Redefning Business: Proving Grounds,
Information Week, February 12, 2001.
Fuller, John, Vopak Launches ChemPoint.com, Chemical Week, March 15,
2000, Vol 162(11), p. 56.
IBM Case Study, Univar Extends Computing Capabilities with IBM System
z9, http://www.mysiriuszone.com/component/option,com_docman/
task,doc_download/gid,2828/.
Morris, Gregory DL, Pakhoeds VW&R Buy Accelerates Expansion, Chemical
Week, October 16, 1996, Vol 158 (39), p. 60.
Rosencrance, Linda, Twelve Chemical Companies Are Setting Up Online
Exchange, Computerworld, May 17, 2000.
Seideman, Tony, E-Marketplace Vision Collides With Reality,
InformationWeek, June 6, 2000.
Tilton, Helga, Analysts Positive on More Focused Univar, Chemical Market
Reporter, November 18, 2002, Vol 262(18), p. 19.
Van Arnum, Patricia, North American Distributors, Wait and See, Chemical
Market Reporter, November 24, 2003, Vol 264(18) p. FR3.
Young, Ian, European Unifcation Takes Shape at Univar, Chemical Week, May
19, 2004, Vol 166(17), p. 22.
Summary Industry Questions
1. What information technologies have helped this industry?
2. Did the technologies provide a competitive advantage or were they quickly
adopted by rivals?
3. Which technologies could this industry use that were developed in other
sectors?
4. Is the level of competition increasing or decreasing in this industry? Is it
dominated by a few frms, or are they fairly balanced?
5. What problems have been created from the use of information technology
and how did the frms solve the problems?
210
What You Will Learn in This Chapter
How do you store and retrieve the vast amount of data collected in a modern company?
How do you ensure that the transaction data is accurate?
Why is the database management approach so important to business?
How do you write questions for the DBMS to obtain data?
How do you create a new database?
How do you create business applications using a DBMS?
What tasks need to be performed to keep a database running?
Why are databases so important in e-business?
How are databases used in cloud computing?
Chapter Outline
Database Management
4
Chapter
Introduction , 211
Relational Databases, 213
Tables, Rows, Columns, Data Types,
214
Data Quality, 215
Data Integrity, 216
Multitasking, Concurrency, and Integrity,
217
Data Volume, 218
The Database Management Approach, 218
Focus on Data, 219
Data Independence, 219
Data Integrity, 219
Speed of Development, 220
Control over Output, 221
Queries, 221
Single-Table Queries, 222
Different Types of Conditions, 230
Computations, 233
Computing Subtotals, 238
Joining Multiple Tables, 241
Examples, 241
Multiple Tables, GROUP BY, and
WHERE, 243
Views, 247
Converting Business Questions to
Queries, 248
Designing a Database (optional), 250
Notation, 252
First Normal Form, 252
Second Normal Form, 254
Third Normal Form, 254
Database Applications, 257
Data Input Forms , 257
Reports, 259
Putting It Together with Menus, 261
Database Administration, 262
Standards and Documentation, 263
Testing, Backup, and Recovery, 264
Access Controls, 264
Databases and e-Business , 264
Cloud Computing, 266
Summary, 268
Key Words, 269
Web Site References, 269
Review Questions, 269
Exercises, 270
Additional Reading, 275
Cases: Pharmaceuticals, 276
211 Chapter 4: Database Management
Eli Lilly and Company
Introduction
How do you store and retrieve the vast amount of data collect-
ed in a modern company? Airlines have a diffcult problem: they need to
track every seat and passenger on every fight. Thousands of people might be try-
ing to book the same fight at the same time, but the system can never sell the
How do you store and retrieve huge amounts of data? Eli Lilly is a giant pharma-
ceutical company. Creating new drugs requires enormous efforts in research. Get-
ting drugs approved takes years and dozens of lawyers. Except for the occasion-
ally unique blockbuster, selling a drug requires delicate, but expensive, marketing.
All three areas beneft from the use of information technology, particularly database
systems. Evaluating chemicals, searching the huge database of existing results, and
tracking progress generate huge amounts of data and require sophisticated analytical
systems. Tracking clinical trials, the paperwork, and the progress of drugs through
various agencies requires nontraditional databases and support. Marketing is a rela-
tively new area for pharmaceutical companies, and they are still looking for ways to
sell such complex products. Sometimes problems arise, such as when Lilly acciden-
tally included the e-mail addresses of 669 subscribers to its prozac.com service in a
message to 700 users.
Reports and
ad hoc queries
Database
DBMS
Applications
Sales and transaction data
Figure 4.1
Without a DBMS, data can be scattered throughout the company, making it more
diffcult to share information. Inconsistent data, duplication and errors are common.
A DBMS collects data from many sources and maintains data through a common
interface. Data defnition, access, consistency and security are maintained by the
DBMS.
212 Chapter 4: Database Management
same seat to different people. Many other business problems have similar char-
acteristics. All of the accounting and payroll data, sales, and purchases have to
be saved for any company. Database management systems were specifcally de-
signed to solve these problems. As shown in Figure 4.1, the primary elements of a
database system are to collect and store data, produce reports, and provide data to
answer business queries. Today, database systems form the foundation of almost
every business application. What database features do you need as a manager?
How can you retrieve the data stored by the system? How can you create reports?
A database management system (DBMS) is one of the most important tools
in business and MIS. The systems have changed the way that computer applica-
tions are developed, and they are changing the way that companies are managed.
The database approach begins with the premise that the most important aspect of
the computer system is the data that it stores. The purposes of a database manage-
ment system are to provide shared access to the data, answer questions, and create
reports from the data.
A crucial factor with databases is that they can become massive. Several com-
panies such as American Express and UPS have indicated that their databases
contain several terabytes (trillions of bytes) of data. Even small companies deal
with databases with megabytes (millions of bytes) of data. The size of the data-
base greatly affects its performance and the ability of users to fnd the data they
need. Large databases need to be designed and maintained carefully to ensure that
they run properly.
Trends
In the 1960s and 1970s, companies typically built their own transaction-pro-
cessing systems by writing programs in COBOL. These programs consisted
of millions of lines of code. Each program created and used its own set of
fles. As companies expanded, more programs were createdeach with its
own format for fles. Whenever a manager wanted a new report or additional
information, a programmer had to modify the old code or create a complete-
ly new program.
A database management system (DBMS) presents a different approach
to data, reports, and programming. The most important task is to defne and
store the data so authorized users can fnd everything they need. Report writ-
ers and input screens make it easy to enter data and create reports without
relying on programmers. Data is stored in a special format so that it can be
shared with multiple users.
In the early 1970s, E. F. Codd created a fexible approach to storing data,
known as the relational model, that avoided these problems. Today, relation-
al databases are the dominant method used to store and access data. Rela-
tional databases have a query system that enables managers to get answers
to questions without relying on programmers.
Early databases were designed to handle business types of data, such as
customer names and account data. Some modern database systems can store
entire books, pictures, graphs, or even sound clips as types of data. A few
companies are working on object-oriented DBMSs that enable users to cre-
ate their own data types and continue to manipulate and search the data.
213 Chapter 4: Database Management
Another important characteristic of databases is that they are designed to help
users examine the data from a variety of perspectives. Instead of simply printing
one type of report, they enable users to ask questions and create their own reports.
Figure 4.2 illustrates how a DBMS is used in an organization. It collects data for
transaction processing, creates reports, and processes ad hoc queries for manag-
ers. Figure 4.2 also indicates that databases usually require programmers to defne
the initial database and maintain programs to perform basic operations. The over-
all design is controlled by the database administrator.
A DBMS is complex software that can be purchased separately or it can be em-
bedded into an application. The primary vendors are Oracle (Oracle DBMS), IBM
(DB2), and Microsoft (SQL Server). A few open-source systems also exist, led
by MySQL and PostgreSQL. Today, MySQL is largely controlled by Oracle. The
open source tools generally can be acquired at low or no cost; however, technical
support or maintenance contracts can be purchased. Without the support contract,
you would need skilled developers and administrators to handle all of the sup-
port tasks. Microsoft Access is commonly available with the Offce suite, but it is
limited to relatively small projects. Also, Microsoft is encouraging developers to
switch to SQL Server.
Relational Databases
The goal of a relational DBMS is to make it easy to store and retrieve the data
you need. All data is stored in tables, which consist of columns with rows of
data. Each table has a name and represents objects or relationships in the data. For
instance, most businesses will have tables for customers, employees, orders, and
inventory.
Figure 4.2
MIS employees and databases. The database administrator is responsible for defning
and maintaining the overall structure and data. Programmers and analysts create
applications and programs that collect data and produce reports. Business operations
generate data that flls the database. Managers use the application programs and ask
ad hoc questions of the data.
Program Program
Database Administrator
Programmer
Analyst
Managers
Data
Programs
& Revisions
Database
Management
System
Business Operations
Business Needs
Ad Hoc Queries
and Reports
Data Collection
and Transaction
Processing
Standards, Design, and Control
214 Chapter 4: Database Management
Besides storing data, a modern DBMS has several useful tools. Input screens
are built to help users enter data. Reports can be created by laying out data, text,
and graphics on the screenoften with no programming. You can get answers
to questions with a query language or even by pointing to tables and data on the
screen. You can establish security conditions by granting or denying access to por-
tions of the data. Most systems include an application generator that can tie input
screens, queries, and reports together with a menu system. A complex application
can be created by typing a few titles on the screen, without writing a single line of
traditional program code.
Tables, Rows, Columns, Data Types
If you understand how spreadsheets work, it is easy to comprehend relational da-
tabases. A single spreadsheet consists of rows and columns of data. Each column
has a unique name, and a row contains data about one individual object. A data-
base consists of many of these tables that are linked by the data they contain.
In a database, each table contains data for a specifc entity or object. For ex-
ample, most companies will have a table to hold customer data. There are certain
attributes or characteristics of the customers that you want to store. In Figure 4.3,
each customer is assigned a unique CustomerID and has a name, address, and city.
In practice, there will be more columns.
Figure 4.3 also illustrates one of the most important features of a database sys-
tem: Relational databases are specifcally designed to allow many tables to be cre-
ated and then combined in interesting ways. If you had only one table, you could
use a spreadsheet or virtually any fling system, assuming it could handle the num-
Figure 4.3
Creating table defnitions. Tables are defned so that they can be linked by common
columns. For a given row in the Orders table, you can fnd the corresponding
customer data by locating the row with the matching phone number. In practice, this
matching is handled by the DBMS query system.
Customer Table
CustomerID Name Address City
12345 Jones 125 Elm Chicago
28764 Adamz 938 Main Phoenix
29587 Smitz 523 Oak Seattle
33352 Sanchez 999 Pine Denver
44453 Kolke 909 West Denver
87535 James 374 Main Miami
Sales Table
SaleID CustomerID Date Salesperson
117 12345 3/3/09 887
125 87535 4/4/09 663
157 12345 4/9/09 554
169 29587 5/6/09 255
215 Chapter 4: Database Management
ber of rows you needed. However, most business problems involve data stored in
different tables. In the example, customers can place many different orders. Each
order is stored in a separate line in the Orders table.
Notice that the tables are joined or linked by the CustomerID column. The Cus-
tomerID is the primary key column in the customer table. Each row in a table
must be different from the rest; otherwise, it is a waste of space. Consequently,
each table must have a primary key. A primary key is a set of one or more columns
that uniquely identifes each row. If someone gives you a key value (e.g., 12345),
you can immediately locate the appropriate row and fnd the rest of the data for
that entity (name, address, city).
Each primary key value must be unique, but that is hard to guarantee with most
common identifers. In some cases, you might use phone numbers, but what hap-
pens if a customer moves and gets a new phone number? In most cases, it is safest
to have the computer generate identifer values that are guaranteed to be unique.
However, do not expect customers (or salespeople) to memorize these numbers.
The identifers are simply used in the database to ensure there is a way to separate
customers. You can always use names or phone numbers to look up other data for
customers.
More complex tables require multiple columns to identify a row. These keys
are called composite keys. They represent many-to-many relationships. For ex-
ample, a typical order system requires an OrderItem table that contains two col-
umns as keys: OrderID + ItemID. Both columns are keyed because many items
can be ordered at one time (so ItemID is keyed), and an item can be ordered at
many different times (so OrderID is keyed).
Unlike a spreadsheet, each database column can contain only one type of data
at a time. For example, in the Date column you can store only dates. You would
not be allowed to put names or totals in this column. Most relational databases
were designed to hold business types of data. The basic choices are text, dates
(and times), numeric, and objects (graphics, video, and sound). Some systems
enable you to be more specifc about how to store numeric data. For instance,
you might want to store data with only two decimal places for monetary values.
Whenever possible, dates should be stored in a date format instead of text. That
way you can perform arithmetic on the values. For example, a formula like (today
+ 30) could be used to fnd a due date that is 30 days from today.
Data Quality
How do you ensure that the transaction data is accurate? Trans-
action-processing systems can become quite complex. Problems are going to oc-
Reality Bytes: Database Terminology
When E. F. Codd created the relational database model, he deliberately introduced
new terms to describe the way that databases should store information. His terms
are attribute, tuple, and relation. Although Codds terms are precisely defned math-
ematically, they can be confusing. As a result, many people use the slightly easier
words: column, row, and table. Before relational databases, several different terms
were used to refer to the various parts of a database. The problem is that many of
the terms had several defnitions. Common terms include feld, record, and fle. You
should avoid these terms.
216 Chapter 4: Database Management
cur in any systemespecially because all business organizations change over
time. That means the computer system has to change to match the business. It is
virtually impossible to change the system at exactly the same time as the business,
so problems will occur. Other problems arise simply because the systems are so
complex. Many processes involve humans who make mistakes. If you understand
what types of problems might arise, they will be easier to solve.
Data Integrity
One of the most important concepts in information processing is the issue of data
integrity. Data integrity means keeping data accurate and correct as it is gathered
and stored in the computer system. There is little value in an information system
that contains out-of-date or inaccurate data. A common complaint among shop-
pers today is that stores using bar-code scanners might have a different price in the
computer than the amount displayed on the shelf. It is easy to change prices in the
computer; it is more diffcult to change the signs in the store. Shoppers will feel
cheated if the computer tries to charge them a higher price than the amount listed
on the shelf. Some states, such as Michigan, have passed laws requiring that the
scanned price cannot be higher than the amount listed on the package or display.
Similar errors cause problems when the computer shows more items in stock than
actually exist.
The frst step to ensure data integrity lies in its capture. Each item must be cor-
rectly entered and the complete information recorded. It is sometimes possible to
check the data as it is entered. Item code numbers usually include a check number
that is based on the other digits. In the item code 548737, the frst fve digits add
up to 27, so the number 7 is included as the last digit. If the person or machine
makes a mistake entering one of the digits, they will probably not add up to 7,
so the computer can immediately determine that there is an error. Sophisticated
methods exist to catch mistakes involving more than one digit.
Even with machine entry of data, validity problems can arise. What happens
when a shipment arrives but the receiving department forgets to record it? The
same problem occurs when a clerk holds an item for a customer and does not re-
Reality Bytes: The Government Pays Dead People
It can be hard to track the almost 2.5 million people who die each year in the United
States. Over three years, the federal government sent $180 million worth of beneft
checks to 20,000 people who had died. Although the Social Security Administration
maintains a database of people who have died, it was not routinely shared with other
agencies. The White House Offce of Management and Budget also noted that over
three years, checks valued at $230 million were sent to 14,000 convicted felons
some in jail, some still running. Although the General Services Administration main-
tains an Excluded Parties List System, few agencies actually check it for ineligible
contractors. Of course, these numbers are dwarfed by the $65 billion in erroneous
payments made in a single year through the Medicare and Medicaid programs. Still,
the government is working on building a comprehensive database that will make it
easier for agencies to verify status before checks are sent out.
Adapted from The Wall Street Journal, Database Aims to Prevent Uncle Sam From
Paying Dead, June 18, 2010.
217 Chapter 4: Database Management
cord it in the computer. Data integrity can be destroyed by indiscriminately allow-
ing people to change the numbers in the computer. It is one of the main reasons
for creating secure computers and controlling access to each piece of information.
Multitasking, Concurrency, and Integrity
A useful feature offered by more sophisticated operating systems is the ability
to perform more than one task at a time. In many situations it is useful to have
several jobs running at the same time. What happens if you are searching a huge
database and your boss calls and asks you for a sales fgure? With a multitasking
computer operating system, you could switch to a new program, look up the num-
ber, and allow the database to continue searching in the background.
If you use a multitasking operating system, it is important that your application
software understand that other applications might be running at the same time.
Each application needs to protect its data fles from concurrency problems. Con-
currency arises when applications attempt to modify the same piece of data at the
same time. If two people are allowed to make changes to the same piece of data,
the computer system must control the order in which it processes the two requests.
Mixing the two tasks will result in the wrong data being stored in the computer.
These problems can be avoided by only using software that was specifcally writ-
ten for multiuser (or multitasking) computers.
Consider the case of a mail-order frm shown in Figure 4.4. On the left side,
customer Sanchez sent a payment on his account. At the same time the clerk be-
gins to process the payment, Sanchez calls a second clerk and places a new order.
The fgure shows what happens if both transactions continue and interfere with
each other. What should the fnal balance be? Does the computer have the correct
number?
To solve this problem, the application program must know that several people
might try to access the same piece of data at the same time. The software locks out
all users except one. When the frst process is fnished, the other users can try to
gain access again. To keep data accurate, applications used by many people at the
same time must be written to handle these concurrency problems. Early personal
Figure 4.4
Concurrency and data integrity. Multiuser and multitasking systems can cause
problems with concurrent changes to data. Two processes cannot be allowed to
change the same data at the same time. A key strength of a DBMS is that it is built to
handle these problems with minimal effort.
Transaction A
Customer Accounts
Sanchez: Balance Transaction B
1.Receive300payment
2.Readbalance(500)
Sanchez: 500
3.Newpurchase(350)
4.Readbalance(500)
5.Subtractpayment
6.Storenewresults(200)
Sanchez: 200
Sanchez: 850 7.Addpurchase
8.Storenewresult(850
218 Chapter 4: Database Management
computers were designed for only one user, so much of the software did not pre-
vent concurrency problems. Software designed for computer networks generally
handles this issue. When you use this software, you will occasionally receive a
message that says a piece of data you desire is currently being used by anoth-
er person. If you get this message, simply wait for a few minutes and try again.
When the frst person is fnished, you should be able to proceed.
Data Volume
A common problem experienced by a growing business is the increase in the
amount of data or data volume. Consider the huge databases handled by Infor-
mation Resources, which processes data from supermarket checkouts, or United
Parcel Service, which tracks every package every day.
As the business grows, there will be an increase in the number of transactions.
As the price of a computer drops, more applications are placed on the computer.
Additional transactions become computerized. Several problems can be created
from this increase: (1) processing overload or system slowdowns, (2) greater dif-
fculty in making sure the data is accurate, (3) insuffcient storage within the com-
puter system, and (4) data not captured fast enough.
Visa International processes more than 6 billion electronic transactions a
year. By the year 2000, the company was handling 15 billion annual transactions.
There are 18,000 banks offering Visa cards, used by 10 million customers. So
much data is generated on a daily basis that Visa cannot keep transaction data
online beyond six months. All older records are moved to backup storage, making
them inaccessible for additional research or decisions.
Sloppy practices and huge datasets can lead to inaccurate data. As the system
slows down or the computer runs out of storage space, people avoid using it, so
data is no longer up to date. With the increase in volume and the computerization
of new types of data, it is more diffcult for programmers and managers to check
the data. If parts of the computer system are too slow, data may not be captured
fast enough. As a result, some data might be lost. A tremendous amount of infor-
mation is stored in raw data. The raw data could be analyzed to offer new services
or improve the quality of existing services. However, the huge volumes require
too much storage space and too much processing time.
Careful planning is required to avoid these problems. At best, new computers
and storage usually take a month or two to purchase. It could take a year or more
to evaluate and purchase a large, expensive central computer. The MIS depart-
ment would like to forecast the demands that will be placed on the computers at
least a year in advance.
Te Database Management Approach
Why is the database management approach so important to
business? In many ways, the database approach has revolutionized the way in-
formation systems function and altered the way businesses operate. Originally,
all programs handled their own data in separate fles. It took enormous coordina-
tion and documentation to try and make the multiple programs work together. The
DBMS changes everything by focusing on the data instead of the programs. Its
primary purpose is to store and share the data.
219 Chapter 4: Database Management
Focus on Data
The database management approach is fundamentally different from the older
programming methods. Whenever someone needs a computer application, the frst
step is to identify the data that will be needed. Then a database management sys-
tem is used to store the data. It takes care of storing the raw data, as well as infor-
mation about that data. Everything you want to know is stored within the DBMS,
not in an application program. This situation is illustrated in Figure 4.5. The goal
of the DBMS approach is to collect accurate data and make it available to users.
The system should also minimize unnecessary duplication of data.
Data Independence
Defning the data separately from the programs is called data independence. The
main advantage is that it is possible to change the data without having to change
the programs. For instance, you might want to add a second phone number to the
customer data. With a DBMS, you can make this change, and it will not affect any
of the existing programs. Similarly, the reports can be modifed without having to
change the data. That means when the programmer is called in at 3 A.M., she has
to change only one program. All the other programs will be unaffected. Besides
making the programmers life easier, the database is more likely to be accurate
and there will be less duplication of data.
Data independence means that the data and programs are separate, which
makes it possible to alter the database tables as needed, without destroying the
programs. As the business grows, you might decide to collect additional data, such
as keeping track of sales by salesperson or by sales route. As the company ex-
pands and changes, the underlying tables can be expanded and new tables can
be addedwithout interfering with the existing tables or current programs. Just
be careful to avoid deleting tables or removing entire columns. Of course, as the
business changes, managers will undoubtedly want to modify the reports to add
the new information.
Data Integrity
Data integrity is an important consideration in designing and maintaining databas-
es. Data integrity means that the database holds accurate, up-to-date data. In the
airline case, it means not selling the same seat to two different people. If there are
All data les
Database Management
System
Billing
Program
Invoice
Program
Figure 4.5
DBMS approach. The database management system controls all access to the data.
Programs and queries are controlled by the DBMS. Security, consistency, and
integrity rules are always maintained by the DBMS.
220 Chapter 4: Database Management
business limits on certain values, the database should force the data entry to abide
by those rules. For example, prices will always be positive numbers. Another in-
tegrity concept is the importance of identifying missing (null) data. Computations
should be able to skip missing data. From a managers viewpoint, an important
integrity design element is naming columns carefully. The columns should have
names and descriptions so that the users understand what is stored in the database.
If a column is simply labeled Revenue, users might wonder if that means revenue
from all products, all divisions, the current year, or perhaps just monthly totals.
All of this information is stored with the database in the data dictionary.
An important component of database integrity is that the data needs to be con-
sistent. For example, consider a table that describes products for sale. Perhaps the
products are grouped into categories (cleaning supplies, paper goods, clothing,
etc.). Each item belongs to only one category. What happens if the categories are
not entered consistently? The Cleaning Supplies category might be entered as
just Cleaning, or maybe as Clean Supplies, or even Cl Sup. These variations
in the data make it diffcult to search the table based on that category because the
user would have to know all of the variations. A good DBMS supports rules that
can be used to minimize these problems. However, when dealing with databases,
it is good practice to be careful when you enter data to ensure that your entries are
consistent.
Speed of Development
It is possible to create an entire database application without having to write a
single line of traditional programming code. As a result, an application can be
built in a fraction of the time it would take to create it by writing COBOL pro-
grams. Studies indicate that most systems can be created 10 times faster using a
DBMSif the data already exists in the database. As the commercial database
productssuch as Oracle, SQL Server, and DB2continue to add features, they
can be used to solve even more complex problems.
Keep in mind that it is possible to use traditional programming tools such as
COBOL in conjunction with the DBMS. If complex reports or complicated cal-
culations are involved, it is sometimes easier to use a traditional programming
Reality Bytes: Government Databases can be Really Big
Take 130 million people, multiply by every healthcare visit, and every diagnoses
and treatment; and you end up with a giant database. As the Federal government in-
creases its involvement in healthcare, it needs to build a giant database to track doz-
ens of aspects of healthcare for individuals and groups. Of course, a giant database
raises giant privacy questions. The government says that it can anonymize the data.
The goal is to track price and quality patterns to focus on groups and not individu-
als. Initially, the database will focus on Federal employees, and include the ability
to evaluate longitudinal effectsessentially tracking treatments over time. Analysts
will have access only to de-identifed data. The inspector generals offce also plans
to use the database to monitor for fraud and waste, which means it needs access to
provider information.
Adapted from Jaikumar Vijayan, Feds Move Toward Health Claims Database De-
spite Privacy Fears, Computerworld, June 16, 2011.
221 Chapter 4: Database Management
language. These programs retrieve the base data from the DBMS and print their
own reports or store computed values in the database for later use.
One of the most important steps of developing a solution is to break the prob-
lem into smaller pieces. One major piece of any problem is the data. A DBMS
makes this portion of the problem easier to solve. By putting the DBMS in charge
of maintaining the data, keeping track of security, automatically supporting mul-
tiple users, and printing reports, the developer can concentrate on solving the spe-
cifc business problems. By starting from scratch with COBOL, each of these fea-
tures would have to be rewritten for every application that was designed, which
would be expensive.
Control over Output
Another strong advantage of database management systems is their ability to pro-
vide many different views of the output. In fact, a primary objective of the rela-
tional database approach is to store the data so that users can retrieve it any way
they need. The other feature of databases is that they are designed to make it easy
to combine related data. An older programming/fle approach generally limits the
user to using data in only one way.
With a DBMS, output can be created from report writers, which make it easy
to format the data; some systems even draw graphs. The other common method of
retrieving data is to use a query language such as query by example (QBE) or SQL
discussed in the next section. Queries enable managers to search for answers to
questions without using a programmer to write special programs.
Queries
How do you write questions for the DBMS to obtain data? Most
of the time, managers work with databases that have been created by someone
else. You will need to learn how to retrieve data to answer questions. It might be
nice to be able to ask questions in a natural language (such as English), but it turns
out to be hard to make computers understand these questions and you might not
always be certain that the answer is what you asked for. A DBMS provides at least
one method of asking questions and retrieving data. Two common methods are
QBE and SQL. SQL is an international standard method for retrieving data from
database management systems. It is supported by most of the major commercial
relational database management systems. By the way, according to the standard,
the name SQL is just three letters and not an acronym. QBE stands for query by
example and is a visual method of examining data stored in a relational database.
Figure 4.6
Four questions to create a query. You will always have to answer these four
questions. In many cases, there will be only one table (or view), so the second and
last questions are easy.
Four Questions to Create a Query
What output do you want to see?
What do you already know (or what constraints are you give)?
What tables are involved?
How are the tables joined?
222 Chapter 4: Database Management
You ask questions and examine the data by pointing to tables on the screen and
flling in templates. Queries can only answer questions for which you have col-
lected the appropriate data.
Regardless of the method used to look up information in a database, there are
four basic questions you will answer, as listed in Figure 4.6. It does not matter in
which order you think of the questions. With some methods (such as QBE), it is
easier to choose the tables frst. With other methods (such as SQL), it is some-
times easier to choose the output frst. In many cases, you will switch back and
forth among the four questions until you have all of the components you need. As
you learn more about databases, keep these four questions handy and write down
your answers before you attempt to create the query on the DBMS.
Single-Table Queries
Consider a simple customer table that contains columns for CustomerID, Name,
Phone, Address, City, State, and AccountBalance. Each customer is assigned a
unique number that will be used as a primary key. The AccountBalance is the
amount of money the customer currently owes to our company. The table with
some sample data is shown in Figure 4.7. The tables in these examples are inten-
tionally small to make it easier to understand the concepts. A real table of custom-
ers would contain more columns and thousands of rows of data. But the basic
concepts will remain the same. Each column represents some attribute or charac-
teristic. Each row holds data for a single customer. The CustomerID is the primary
key for this table and it must always be a unique number. In this example, the ID
was randomly assigned by the marketing department when a customer was added
to the database. It is more common to have the DBMS generate unique ID num-
bers, but you have to remember that the values are often random.
Query by Example
Query-by-example systems that were designed for graphical user interfaces
(GUIs) are especially easy to use. Microsofts Access illustrates a common ap-
proach. The basic mechanism is to make selections on the screentypically by
pointing to them with a mouse. You then fll out a template like the one shown in
Figure 4.8. Note that Access has several ways to create queries. The Design (or
Customers
CustomerID Name Phone City AccountBalance
12345 Jones 312-555-1234 Chicago 197.54
28764 Adamz 602-999-2539 Phoenix 526.76
29587 Smitz 206-676-7763 Seattle 353.76
33352 Sanchez 303-444-1352 Denver 153.00
44453 Kolke 303-888-8876 Denver 863.39
87535 James 305-777-2235 Miami 255.93
Figure 4.7
A sample table for customer data. CustomerID is the primary key and is used to
uniquely identify each customer.
223 Chapter 4: Database Management
QBE) approach is probably the easiest to learn. The Wizard is not very useful. You
should also be able to read the text SQL statements, which are shown later in this
chapter. In the end, the query systems are basically the same. You must always an-
swer the four basic questions: (1) What output do you want to see? (2) What con-
straints are you given? (3) What tables are involved? (4) How are the tables joined
together? This section focuses on a single table and saves the complications of the
last two questions for later.
Figure 4.8
Design: List all of the customers. First select a table, then drag columns you want to
see onto the grid. Checking the Show box ensures that the column will be displayed
when the query is run.
Figure 4.9
Results for the query that selects all rows of the Customers table.
224 Chapter 4: Database Management
The Design view or QBE approach begins by asking you a hard question frst:
Which tables are involved. Fortunately, you can add tables later, so it is usually
best to focus on one table at a time. For now, you can start a new query and choose
the Customers table. Your next step is to decide what columns you want to see in
the results. In this case, drag the CustomerID, Name, Phone, City, and Account-
Balance columns onto the grid. You can drag multiple columns at a time, double-
click a column name, or select it from the drop-down list on the top of the grid. It
does not matter how you get the column name in place, as long as it is in the list
and the Show checkbox is set, data will be displayed for that column.
Figure 4.10
Design query. List the customers with an AccountBalance of more than $200. Results
of the query can be sorted in Ascending or Descending order. Multiple levels of sorts
are created by selecting additional columns. You will use multiple column sorts when
the frst column contains several identical values. For example, sort by City, Name.
Figure 4.11
Rows that match the conditions. It is easy to check that the AccountBalance is larger
than 200 in each row. Even if your query has more rows, you should check random
rows to ensure you entered the conditions correctly.
225 Chapter 4: Database Management
You can run the query by selecting the DataSheet view or by clicking the Run
button. For most queries, the DataSheet view is more convenient because you of-
ten want to select the Design view to return and edit the query. Figure 4.9 shows
the results of running the simple query that selects all of the rows in the Custom-
ers table. If you ever want to copy the rows into a spreadsheet or some other docu-
ment, you can click the small gray square at the top-left of the results to select all
of the rows and columns. Selecting the Copy option will put the results onto the
clipboard.
Most of the time, you will want to see only some of the rows of data. For in-
stance, you want a list of customers who owe you the most money. You decide
to restrict the listing to customers who have account balances greater than $200.
With QBE, you enter the appropriate restriction in the criteria row under the de-
sired column as shown in Figure 4.10. Look at the fgure carefully and check the
greater-than sign. You read the condition as: AccountBalance > 200. You can think
of this condition as a flter on the rows that will be displayed. Only rows that meet
the specifed conditions will be displayed.
Figure 4.11 shows the results of running the query. Double-check the data to
ensure that all of the rows meet the condition you specifed. Checking your results
is a good habit to learn. One of the trickiest aspects of queries is that the DBMS
will almost always return somethingbut you need to verify that the rows it re-
turns are actually the rows that you want to see.
You can specify other conditions for the other columns. Placing them on the
same row means they will be interpreted as AND conditions. If conditions are
placed on separate rows, results will be computed for rows that match at least one
of the criteria (OR condition). Figure 4.12 shows the QBE screen, which tells the
DBMS to display the ID, City, and AccountBalance for customers who live in
Denver and have account balances of more than $200.
Figure 4.12
List the customers from Denver with an AccountBalance of more than $200.
Conditions entered on the same row are joined with an And. Conditions on different
rows are connected with a logical Or.
226 Chapter 4: Database Management
As shown in Figure 4.13, the AND condition creates a flter so that rows are
displayed only if they match all of the conditions on that row. In this example,
the customer must be from Denver and owe more than 200. Because of the small
number of customers, only one person meets both conditions. But, you begin to
see the value of using conditions to limit the rows you want to see. Many busi-
nesses have huge databases, and it is impossible to search through the data by
hand. You can use a simple query to quickly fnd the rows that match almost any
set of conditions.
AND conditions are used to narrow a search. Each time you add an AND con-
dition, you are creating one more hurdle that a row must meet to be displayed.
Sometimes you need to widen your search. In these cases, you use OR condi-
tions to impose an alternate set of criteria. Figure 4.14 shows the query for search-
ing for customers who live in either Denver or Chicago. Notice that there is no
AccountBalance condition. If you wanted to add the AccountBalance condition,
Figure 4.13
Rows that match the conditions. To be displayed, all of the conditions on the row
must be true. In this case, only one customer is from Denver and owes more than
$200.
Figure 4.14
List the customers from Denver or Chicago. Conditions entered on different row are
joined with an Or, which widens the search because rows need to match only one of
the conditions.
227 Chapter 4: Database Management
you would have to enter it onto both of the criteria rows. With multiple condition
rows, the query processor tests to see if a row meets all of the conditions on one
row to decide whether to display it. If you were to put the AccountBalance>200
condition only on the Denver rowit will apply only to customers who live in
Denver. All of the Chicago customers would be displayedregardless of their
AccountBalance.
Figure 4.15 shows the list of customers who live in Denver or Chicago. Again,
it is important to check the results to ensure that you entered the conditions cor-
rectly. If you accidentally enter the conditions with an AND clause by putting
them on the same row, you would not get any matches. In this database, no cus-
tomer can live in both Denver and Chicago at the same time.
It is also easy to sort the results. For example, you probably want to which
customer owes the most money. Instead of trying to fnd just one customer, busi-
nesspeople often want to see the list sorted by the AccountBalance. That way, if
two people owe close to the same amount, they will both be displayed. Figure
4.16 shows that you can sort the results simply by selecting the sort-order in the
Sort row. In this case, you want to sort the data in descending order (high-to-low)
so that the customers who owe the most money are displayed at the top of the list.
Create and run the query to see which person ends up on top.
You will also encounter situations when you need to sort by multiple columns.
Names are the most common example. In an English-speaking nation, your data-
base might contain many people with the last name Smith. If you sort only by last
name, the rows will still be diffcult to read. Instead, you should sort by LastName
and FirstName. The one catch in QBE systems is that you need to display the
LastName column to the left of the FirstName column so that the query sorts frst
by LastName, followed by FirstName.
SQL
Another method of retrieving data from a DBMS is with the query language SQL.
Although some people fnd SQL more diffcult to learn, it has two advantages.
First, it is a standard language that is supported by many different database sys-
tems, so the commands will work the same in many situations. Second, it is easier
to read than QBE, so it is easier to understand your queries. It is also simpler to
write down on paper because it relies on words instead of pictures or layout. Keep
in mind that SQL requires the same answers as QBEthe main difference is that
you have to type all of the column names instead of dragging them into place.
SQL is a moderately complex language. Fortunately, this chapter uses only a
few simple SQL statements. You can take a database class to learn more SQL
Figure 4.15
Rows that match the Or condition. Customers are displayed who either liven in
Denver or Chicago.
228 Chapter 4: Database Management
details and understand the true power of the language. If SQL seems complex,
remember that it is considerably easier than trying to write programming code to
retrieve the data. It is even much simpler than trying to build a spreadsheet to fnd
the answers.
The standard command for retrieving data in SQL is SELECT. To be clear,
SQL command words in this book will be written in capital letters with tabs to
separate the words, but you can type them into the computer as lowercase. The
simple form of the command is shown in Figure 4.17. The fve parts are written
on separate lines to make the command easier to read. One of the benefts of SQL
is that you can write down the keywords and then fll in the blanks in any order.
Typically, you can start with the list of columns to display and then fll in the con-
ditions. From these two lines you can fgure out exactly which tables are needed.
In most cases, the best approach is to decide which columns you want to see.
When you read a business question, think about the values that you want to see
that would answer the question. For example, if you want to see a list of custom-
ers that meet some condition, you want the fnal result to include at least their
FirstName, LastName, and possibly the phone number or address. These columns
can be listed in whatever order you want. The column names should be separated
by commas. If you want to see all the columns, you can use the key word ALL or
an asterisk (*). This approach (SELECT *) reduces the typing, but often results in
a huge number of columns. But it is also useful if you cannot remember the names
of the columns or how they are spelled.
To illustrate the power of SQL, try creating a simple query to list all of the col-
umns and all of the rows from the Customers table. Figure 4.18 shows the query
you want to enter. Microsoft Access supports SQL. In fact, all of the QBE queries
you build are actually converted to SQL. Start a new query in Access and choose
Design view. Do not add any tables. Click the SQL button to switch to SQL text
mode. Type the SELECT command shown in the fgure and run the query. You
Figure 4.16
Sorting the results. Select Ascending or Descending on the Sort row for the column
that needs to be sorted.
229 Chapter 4: Database Management
will receive an error message if you type one of the words incorrectly, such as
forgetting the s in Customers. The results are similar to those in Figure 4.10, but
also include the Street column.
Next, you need to know the name of the table. The SQL command to retrieve
all of the customer data is SELECT * FROM Customers. The result can be sorted
by adding the ORDER BY clause. For example, SELECT * FROM customers
ORDER BY City.
To get a list of customers who live in Denver with account balances greater
than $200, you need to add a WHERE clause. The command becomes SELECT
* FROM Customers WHERE (AccountBalance > 200) and (City = Denver).
Notice the similarity to the QBE command. Of course, with SQL, you need to
remember (and type in) the names of the tables and columns. NULL values and
BETWEEN commands are also available in SQL.
SQL is also useful when you have complex conditions with several AND and
OR connectors. It is easy to enter conditions in the QBE grid, but they can be dif-
fcult to read. Remember that you get completely different results if a condition is
entered on a different line. But, with many conditions spread across several col-
umns, it can be diffcult to see if conditions are on the same line. With SQL, you
simply read the text and verify the AND or OR connectors. Figure 4.19 shows the
query that lists the customers who live in Denver and owe more than $200. Notice
that it is easy to read the AND connector. However, you should always use paren-
theses to isolate the separate conditions. Also, you have to type in the quotation
marks for any text comparisons (Denver).
One nice feature of Microsoft Access is that you can switch back and forth be-
tween SQL and QBE. You can even edit the query in either mode and get the same
results. You can use drag-and-drop to create the query, and switch to SQL to veri-
fy the AND and OR connectors. To see the effect, use QBE to rebuild the query in
Figure 4.16 that lists customers from either Denver or Chicago. Figure 4.20 shows
the text when you switch to SQL view. First, note that Access always uses the full
Figure 4.17
The SQL SELECT command. This command is used to retrieve and display data. It is
the foundation of many of the other SQL commands.
SELECT columns
FROM tables
JOIN matching columns
WHERE conditions
ORDER BY column {ASC | DESC}
SELECT *
FROM Customers
Figure 4.18
Display all columns and rows from the Customers table. You begin to see the power
of SQL when you realize you can instantly get all of this data with only three words
(and a symbol).
230 Chapter 4: Database Management
name of columns, which includes the table name, such as Customers.Name. This
approach is reasonable because different tables might use the same column name
(such as Salespeople.Name and Customer.Name), and Access needs to keep track
of exactly which column you mean. Second, Access uses too many parentheses in
the conditions, which makes it hard to edit; but the OR connector is easy to see
and you can always return to the QBE grid to change the query conditions.
Diferent Types of Conditions
It is relatively easy to enter conditions on the criteria rows of the QBE grid or to
add them to the SQL WHERE clause. However, to handle more complex cases,
you need to understand all of the comparison operators. Some special operators
also exist that can save you effort when creating queries. As a manager, you need
to be able to convert business questions into database queries. Identifying and
specifying conditions is a key step in this process. Once you understand the ba-
sic elements of the conditions, the real challenge lies in correctly interpreting the
business question.
Figure 4.21 shows the primary comparison operators used in business queries.
SQL does support some advanced techniques, such as the IN ( list ), but you need
to understand the basic operators before trying to tackle the complex ideas. The
standard comparison operators (=, <, >) work exactly as you expect them to work
from basic math. The not-equal operator seems a little tricky (< >), but you get
used to it after a while.
The BETWEEN operator is a nice way to enter a range of values. It is com-
monly used for testing a date because you often need to see if a business date falls
between two specifed days. The condition will match any row where the value
is between or equal to the start and end value. For example, to retrieve rows of
sales data that occurred in January 2009, you would use: WHERE SaleDate BE-
Figure 4.19
SQL query to list customers who live in Denver and owe more than $200. It is
relatively easy to verify the AND connector. Be sure to use parentheses to separate
the conditions.
SELECT Name, Phone, City, AccountBalance
FROM Customers
WHERE (AccountBalance>200) AND (City=Denver)
SELECTCustomers.CustomerID,Customers.Name,Customers.Phone,
Customers.City,Customers.AccountBalance
FROM Customers
WHERE(((Customers.City)=Denver))
OR(((Customers.City)=Chicago));
Figure 4.20
Displaying a query built in Design view. Microsoft Access always uses the full name
of the column which includes the table name. It also puts too many parentheses in the
conditions. But, the OR connector is easy to read.
231 Chapter 4: Database Management
TWEEN 01-Jan-2009 AND 31-Jan-2009. However, note that date values are
sometimes tricky to enter into a DBMS. The format used here will work on most
systems, but Microsoft Access uses pound signs (#) instead of quotation marks
to signify dates: BETWEEN #01-Jan-2009# AND #31-Jan-2009#. Also, when
you use the BETWEEN command remember that you must always have two val-
ues separate by the AND keyword. Figure 4.22 shows the use of the BETWEEN
clause to obtain a list of the sales that took place in June. Figure 4.23 shows the re-
sults. Always look through some of the rows of data to verify that you entered the
conditions correctly. The DBMS will almost always return results, but you have to
inspect them to ensure it is selecting the rows you want to include.
The Is Null and Is Not Null operators are useful but have an important trick.
Any value that was not entered is automatically assigned a missing value and can
only be found by searching for Is Null. For example, if someone failed to enter the
name of the city the customer lives in, you would search: WHERE City Is Null.
The important trick is that you cannot use City=Null. Most systems will actually
accept the equals sign, but will never return any matching rowseven if the City
value is missing. You can stare at that last command a long time trying to fgure
out what went wrong, until you remember that you must use the IS operator in-
stead of equality. Along the same lines, the condition City= (quoted text with
no value), will also fail. There is a difference between a zero-length string and a
value that was never entered. This difference presents problems if someone hap-
pens to enter blank spaces for a text value. The DBMS will often display missing
values as blank spaces, but they are stored differently internally.
The LIKE command is a useful tool but it can be diffcult to understand at frst.
Essentially, you are specifying a search pattern or flter. Only rows that match
that condition will be displayed. The LIKE command uses two special charac-
Figure 4.21
Query conditions. The standard comparisons are easy to understand. BETWEEN is
most useful for dates but can be used in other cases. Pattern matching with LIKE is
used for simple searches of text data. Be careful to use Is Null when searching for
missing data.
Operator Meaning Examples
= Equals City=Denver
Salary=60000
<
>
Less than
Greater than
Salary < 60000
Sales > 15000
< > Notequal City < > Denver
BETWEEN Between x and y SaleDate BETWEEN 01-Jan-2012 AND 28-Feb-2012
Sales BETWEEN 10000 AND 20000
LIKE Simple pattern
matching % or
* matches any
characters _ or ?
matches one
LastName LIKE J%
ProductID LIKE BL_ _DR_ _ _
Null Missing data City Is Null
NOT Negation Not City = Denver
232 Chapter 4: Database Management
ters to form patterns. The SQL standard states that a percent sign (%) will match
any other characters, including no characters; and an underscore ( _ ) will match
any single character. Microsoft Access uses an asterisk (*) and question mark (?)
to create the same patterns. You can see the power of pattern matching even for
simple business questions. For example, to list the customers with a last name that
starts with B, you would use: WHERE LastName LIKE B% (or WHERE Last-
Name LIKE B* in Access). The B in the pattern requires the name to have that
letter in the starting position, followed by any other characters (including none).
As another example, the condition WHERE Description LIKE %smart% will
Figure 4.22
The BETWEEN clause. This query uses BETWEEN to retrieve sales that occurred in
June.
Figure 4.23
Date results. Verify that the rows returned match the condition you desire. The
DBMS will rarely tell you if you make a mistake. It will almost always return results,
so you need to check to ensure you entered the conditions correctly.
233 Chapter 4: Database Management
search for any product that contains the word smart anywhere within the de-
scription. The word smart must exist, but can be preceded or followed by any
other letters. The single-character search is used less often, but can be useful if
you have specially-formatted codes. For instance, many companies create product
codes that describe the product. Perhaps the frst two letters are a color code, fol-
lowed by a size code, a category, and a three-digit identifer, such as: BL09DR293
to represent a blue (BL) dress (DR) of size 9 (09) with an product identifer of
293. A salesclerk could search the inventory for all blue dresses using the pat-
tern: WHERE ProductID LIKE BL_ _DR _ _ _. You need to know the details
of how the product codes are created to build these conditions. In other cases, it
is probably easier to search for items by using other columns of data, such as:
(ProductType=Dress) AND (Color=Blue).
It is generally easy to create any individual condition. The process becomes
more diffcult, with more chances for error, when you are given many conditions
at the same time. The key is to be patient and write one condition at a time and test
the values one at a time. As you will see in the next section, it is important to test
the conditions with a simple SELECT statement so you can ensure that the query
is retrieving only the rows you need.
Computations
Many business questions involve totals or other calculations. All database systems
have some mechanism to perform simple calculations. The calculations are usu-
ally simpler than those found in spreadsheets, but they are easier to use and can
operate on millions of rows of data.
Query processors can perform two types of computations: (1) Compute totals
across multiple rows of data, or (2) Use arithmetic and functions to operate on data
one row at a time. You can also combine these two methods, but it is best to treat
them separately for now. You often need to compute totals or average of business
data. Figure 4.24 shows the aggregation functions commonly provided by SQL
and QBE. SUM, AVG, and COUNT are the most-used functions in business.
SUM computes the total value of a numeric column. Essentially, it looks at
each row of data that matches the WHERE clause and adds up the values stored
in each row. Similarly, AVG works only on numeric columns, but it computes the
simple average. COUNT is slightly trickier. It simply counts the number of rows
of data that would be displayed, so it works with any column or even without a
Figure 4.24
The standard aggregation functions available in SQL and QBE. These functions
operate on multiple rows of data at a time. SUM, AVG, and COUNT are the most-
used functions in business.
SUM total value of items
AVG average of values
MIN minimum value
MAX maximum value
COUNT number of rows
STDEV standard deviation
VAR variance of items
234 Chapter 4: Database Management
Technology Toolbox: Building Forms in Access
Problem: Every month you have to create a report that uses several new pieces of
data. You have an assistant to help enter data, but need to create a system that is
simple to use.
Tools: Most DBMSs have a forms tool to quickly generate forms. In Microsoft Ac-
cess, the Form Wizard is easy to use, as long as the tables are defned correctly.
It is relatively easy to make
forms to enter and edit data
for a single row at a time. You
can quickly build a form to
edit data for a single customer.
Start the Form Wizard, select
the Customer table and all of
its columns by moving them
to the right-side column. Work
through the remaining selec-
tions by choosing design op-
tions. If you do not like the re-
sult, you can always delete the
form and start over. When the
form is complete, use it to enter
data for a couple of customers.
The Form Wizard can build
more complex forms, such as the Sale form that includes data from the tables: Sale,
Customer, SaleItem, and Item. You need to be cautious in choosing columns. Start
the Form Wizard and choose all columns from the Sale table. Then choose most of
the columns from the SaleItem table, but do not include the SaleID. The SaleItem ta-
ble represents the repeating section. If you include the SaleID, it will waste space by
displaying the same value on every row. Next, choose columns from the Customer
table, but do not include the CustomerID. You should not include the CustomerID
column from the Customer table, because you will not use this form to add new cus-
tomers. Keep your forms relatively simple, so each form has a clear purpose. Finally,
select any desired columns from the Item table (Description, Color, Price, and so
on). Once again, do not include the ItemID column from the Item table, because you
will not use this form to add items. Once the columns have been selected, follow the
prompts to fnish building the form.
To make the form easier to use, you will want to switch to Design View and rear-
range the items on the form so they are grouped in a layout that is easier to read.
Look at some of the problems with the form. To enter a new sale, you will have
to enter the CustomerID. Did you memorize all of the CustomerID values? Instead,
delete the CustomerID text box. Select the Combo box in the Toolbox and click on
the form where the CustomerID box used to sit. Follow the Wizard prompts to select
the Customer table; choose at least the CustomerID and Name columns. On the last
screen, make sure you mark the option to store the result in the CustomerID column.
Test the result. This procedure displays all of the customers in the drop-down box.
When you select a customer, the corresponding CustomerID is transferred to the
CustomerID column in the Customer table.
Quick Quiz:
1. Create a simple customer form and enter data to test it.
2. Create a basic order form and add a combo box to select customers.
235 Chapter 4: Database Management
column name: Count(*). Although the functions are similar, you must be cautious
when choosing them. It can be diffcult to determine when you should use SUM
instead of COUNT. Figure 4.25 shows the AccountBalance column for the rows
of data in the Customer table. Due to the small amount of data, you can easily
verify that there are 6 rows of data.
Figure 4.26 shows the QBE query and the values returned by the COUNT,
AVG, and SUM functions. A few seconds with a calculator will convince you that
the sum is correct. Always remember that Avg and Sum work only on numeric
data because they compute the total of the values stored within each row. You
have to carefully evaluate any business question to decide if it requires adding
numbers or simply counting rows. The VAR and StDev functions are for simple
statistical calculations and compute the variance and standard deviation of the
data in the chosen column, using n-1 weighting. The older versions of the SQL
query language did not specify standard names for these functions so they are
spelled differently depending on the DBMS you are using. The more advanced
Figure 4.25
AccountBalance column from the Customer table.
Amount
$197.54
$526.76
$353.76
$153.00
$863.39
$255.93
Count Avg Sum
6 $391.73 $2,350.38
Figure 4.26
Count versus Sum. Count returns the number of rows that would be returned with a
SELECT statement. Sum adds up the values within each row.
236 Chapter 4: Database Management
(more expensive) DBMSs support additional aggregation functions, and you can
read about them in the vendors documentation or help system.
Query by Example
Although most database management systems provide a means to compute totals
and averages, there is no standard method for entering the commands. Typically,
the commands are displayed on a menu. Access uses an extended grid, which is
shown in Figure 4.27. The total row is enabled by clicking the summation (sigma)
button. You then select the desired function on the Total row using the drop-down
list in the appropriate column. The example shows how to get the number of cus-
tomers and the average account balance.
Computations within a row are a little more complicated because you have to
type everything instead of picking from a list. Consider the Items table that lists
all of the products for sale. It contains a Category column and a Price column. You
are told that all items in the Electronics category have a cost that is 70 percent of
the listed price. You want to display the list of items in theElectronics category,
their price, and their estimated cost. Figure 4.28 shows the query. Start a new que-
ry, choose the Items table, and display the Category and Price columns. Enter the
Clothes condition to restrict the rows. Create a new column by typing the formula:
0.7*Price. When you move the cursor to another location, Access will add the
brackets and enter Expr1 as the title of the new column. Change Expr1 to EstCost,
but be careful to leave the colon separator.
Figure 4.27
QBE for aggregation. In Access, you select the table and columns. Clicking the
summation button (sigma) adds the Total row to the grid, where you can pick the
Count and Avg functions.
237 Chapter 4: Database Management
Figure 4.29 shows the results of running the query. If desired, you can use the
Round or Format functions to alter the calculation or the way it is displayed. The
main thing to remember is that these computations are performed using only the
data on one row. You can use data from multiple columns, but not from different
rows.
SQL
Because QBE actually uses SQL, it should be clear that these same queries can
be written directly in SQL. In many cases SQL is so easy that it is faster to type
the simple SQL commands than it is to work through the QBE grid. Figure 4.30
shows the SQL command to count the number of customers and return the aver-
age amount owed. The functions are easy to use, but notice the use of the AS
Figure 4.28
Row-by-row calculations. You can use basic arithmetic (+, -, *, /) and common math
functions to create a new, computed column in a query. Just type in the formula and
then change the text before the colon EstCost) to be displayed as the new column
heading.
Category Price EstCost
Electronics $1,000.00 700
Electronics $400.00 280
Figure 4.29
Row-by-row calculations. You can use basic arithmetic (+, -, *, /) and common math
functions to create a new, computed column in a query. Just type in the formula and
then change the text before the colon EstCost) to be displayed as the new column
heading.
238 Chapter 4: Database Management
command to provide a new name for the column. If you leave out this name, the
system will pick something that is unique but meaningless.
Row-by-row calculations are also straightforward in SQL. In fact, because you
have to type the formula even within QBE, it is often easier to type the entire
query within SQL. But, if you have complex WHERE clauses (or many tables),
you might want to build the base query in QBE and switch to SQL to enter the
formula. Figure 4.31 shows the SQL statement to list and estimate the cost of the
items in the Electronics category.
Computing Subtotals
One of the most powerful features of SQL is its ability to create subtotals by add-
ing one line to the SELECT statement. Many business questions require the com-
putation of subtotals. In fact, it is diffcult to fnd business questions that do not
require subtotals. A subtotal is an aggregate calculation (usually SUM) that you
want to perform for all members within a group. Common business examples in-
clude: Find the customer with the most sales, or the employee who sold the most
last month, or identify the product or category that is the best or worst seller. Sub-
totals are also used whenever you want to compute totals by time period, such
as total costs per month or sales this year compared to last year. Each of these
questions requires adding up the value for each element specifed (customer, em-
ployee, product category, month, year, and so on). It is diffcult to compute these
subtotals by hand. It is time-consuming even if you write your own program code.
First you have to sort the data by the selected attribute to group the values togeth-
er, then you fnd the break points where the value switches (such as from James
to Jones). SQL (and QBE) solve this problem with one simple line: GROUP BY.
SQL
It is easier to see how subtotals are created by using SQL. Once you understand
the process, you can use QBE to defne the calculations. The frst point to remem-
ber is that you want to see subtotalsso you have to use the aggregation functions
in the output (SELECT) line. Figure 4.32 shows how to defne a basic subtotal
Figure 4.30
Aggregation functions in SQL. The use of the function is straightforward, but note
the use of the AS command to create a new name for the output column.
SELECT Count(CustomerID) AS NCustomers,
Avg(AccountBalance) AS AverageOwed
FROM Customers
SELECTCategory,Price,0.7*PriceASEstCost
FROM Items
WHERE (Category="Electronics")
Figure 4.31
Row-by-row computations in SQL. Simply type the formula as a new column and
use the AS keyword to give the column a meaningful name.
239 Chapter 4: Database Management
using SQL. The frst two lines are similar to what you have already done. You are
asking to see the name of the City and the total of the AccountBalance column.
The third line tells the query processor that you want the subtotal computed for
each value of city. The nice part is that you do not need to know which cities ex-
ist in the database. It automatically sorts and groups the data and then reports the
total for each of those cities.
Figure 4.33 shows the total amount due by each city. The query processor au-
tomatically sorts the data by the City column because that is how it computes the
subtotals. More commonly, you would add an ORDER BY line to sort by the sub-
totalso you can fnd the city where customers owe you the most money.
Take a couple of minutes and study the SQL statement. You will need to use it
many times. The query itself is relatively simplejust remember to keep it that
way. A common mistake is to add too many columns or extra tables. For GROUP
BY queries, you must the smallest number of tables and columns possible. The
easiest way to create the query is to think about the output. For any business ques-
tion, decide what you want to see. In this example, you want a list of cities and the
total of the AmountDue for each city, so the SELECT statement contains only the
City and Sum(AmountDue). Both columns are in the Customers table, so you list
that on the FROM statement. The phrases for each or group in any business
questions are clues that you need to add the GROUP BY line.
An important catch with basic SQL is that any query using GROUP BY can
display only subtotals (or other aggregate functions). It cannot display the detail
rows and then the subtotals. If you want both details and totals, you must write
a second query. A newer version of the SQL standard does have the ability to
display both detail rows and subtotals, but it is relatively complex and it is not
supported by Microsoft Access. More importantly, if you truly want to see that
much information, better tools exist to examine the data interactively, and these
are covered in Chapter 9.
SELECT City, Sum(AccountBalance) AS SumOfAccountBalance
FROM Customers
GROUP BY City
Figure 4.32
Subtotals by City. The output line contains a SUM function and the attribute you
want to group. Then add the GROUP BY City line to tell the query parser what you
want to see.
City SumOfAccountBalance
Chicago $197.54
Denver $1,016.39
Miami $255.93
Phoenix $526.76
Seattle $353.76
Figure 4.33
Subtotals by City. Each city is listed followed by the total amount owed by customers
in that city. It is important that you include only these columns and nothing extra.
240 Chapter 4: Database Management
Customers
CID LastName Phone City AccountBalance
12345 Jones 312-555-1234 Chicago $197.54
28764 Adamz 602-999-2539 Phoenix $526.76
29587 Smitz 206-656-7763 Seattle $353.76
33352 Sanchez 303-444-1352 Denver $153.00
44453 Kolke 303-888-8876 Denver $863.39
87535 James 305-777-2235 Miami $255.98
Salespeople
SPID LastName DateHired Phone Commission
255 West 5/23/75 213-333-2345 5
452 Tomas 8/15/94 213-343-5553 3
554 Jabbar 7/15/91 213-534-8876 4
663 Bird 9/12/93 213-225-3335 4
887 Johnson 2/2/92 213-887-6635 4
Items
ItemID Category Color Description Price
1154 Shoes Red Red Boots $100.00
2254 Clothes Blue Blue Jeans $12.00
3342 Electronics Black LCD-40 inch $1,000.00
7653 Shoes Blue Blue Suede $50.00
8763 Clothes Black Mens Work Boots $45.00
9987 Electronics Silver Blu-Ray Player $400.00
ItemsSold
SaleID ItemID Quantity
117 1154 2
117 3342 1
117 7653 4
125 1154 4
125 8763 3
157 7653 2
169 3342 1
169 9987 5
178 2254 1
Sales
SaleID CID SPID SaleDate Amount
117 12345 887 3/3/2012 $1400.00
125 87535 663 4/4/2012 $535.00
157 12345 554 4/9/2012 $100.00
169 29587 255 5/5/2012 $1800.00
178 44453 663 5/1/2012 $12.00
188 29587 554 5/8/2012 $1180.00
201 12345 887 5/28/2012 $100.00
211 44453 255 6/9/2012 $2800.00
213 44453 255 6/9/2012 $12.00
215 87535 887 6/9/2012 $62.00
280 28764 663 5/27/2012 $1036.00
285 44453 887 6/15/2012 $100.00
Figure 4.34
Multiple tables. The true power of a database lies in the ability to combine data from
multiple tables. Actual databases can have hundreds or thousands of related tables.
Notice that each table is related to another table through matching columns. You
should be able to draw lines between column labels that will connect each of the
tables.
241 Chapter 4: Database Management
Joining Multiple Tables
The true strength of a database management system lies in its ability to combine
data from several tables. Part of the Customer table is shown in Figure 4.34, with
additional tables that show a list of sales to those customers and the salespeople
involved. Notice that the tables were designed so they can be connected. For ex-
ample, the Sales table can be connected to the Customers table by matching the
CustomerID (abbreviated as CID to save space). The Sales table can be matched
to the Salespeople table through the SalespersonID (SPID). Once you have joined
the tables together, the database system retrieves and displays the data as if it were
stored in one table.
The chief advantage to using multiple tables is that data is stored one time
even for one-to-many relationships. For example, each salesperson may be associ-
ated with many different sales. Instead of repeating the salesperson information
on every order, you only need to include the salespersons ID (SPID) number.
Joining the tables together tells the DBMS to automatically look up the corre-
sponding data from the Salespeople table.
Query by Example
Most people fnd that database systems that use graphical QBE commands to
join tables together are much easier to use than straight SQL commands. With a
DBMS like Access you join the tables together by pointing to the column name in
one table and dragging it to the matching column in the other table. The DBMS
displays the connection between the two columns. Whenever you want to retrieve
data from more than one table, you must frst join them together.
SQL
In SQL, connections between tables are typically made with the INNER JOIN
clause in the FROM statement. For example, to join the Customers and Orders
tables by equal customer numbers and get the combined data, use the command
SELECT * FROM Customers INNER JOIN Orders ON Customers.CustomerID =
Orders.CustomerID
Notice that both tables must be listed in the FROM statement. Always remem-
ber that if you list more than one table, the tables must be joined. The dot before
the column (CustomerID) separates the table name from the column name (table.
column). You can use this form any time you type in a column name, but it is only
required when there might be confusion about which table the column is in. In the
example, both tables have a column called CustomerID. To keep them straight,
you have to specify which table you want to use.
Examples
You now have the basics to begin asking questions of the data. Start with an easy
one. Which customers (CustomerID) have placed orders since June 1, 2012? The
query and result are shown in Figure 4.35. Notice that customer number 44453
has placed two orders. Some systems will show you the order number twice; oth-
ers will automatically delete the duplicates.
It can be diffcult to remember each customers number, so it is better to use the
customer name and have the DBMS automatically look up the customer number.
This second query is shown in Figure 4.36. Note that the Customer table is joined
to the Orders table by the matching values of CustomerID. Be cautious when add-
ing tables to a query and make sure that all of the tables are connected. If you
242 Chapter 4: Database Management
place two tables in the query with no connection, the query will still runvery
slowly. The query processor will match every row in the frst table with every row
in the second table. For example, if each table has 1,000 rows, the resulting query
would contain 1 million rowsand the results would be meaningless.
SELECT DISTINCT
CustomerID,
Name, SaleDate
FROM Sales
INNER JOIN Customers
ONSales.CustomerID
=Customers.CustomerID
WHERE SaleDate >= #6/1/2012#
CID Name OrderDate
28764 Adamz 6/27/2012
44453 Kolke 6/9/2012
44453 Kolke 6/15/2012
87535 James 6/9/2012
Figure 4.36
Multitable queries. Queries that use more than one table are slightly more complex. Because
columns can have any name, you must tell the database system how the tables are connected.
What are the names of the customers who placed orders since June 1?
SELECT CustomerID, SaleDate
FROM Sales
WHERE SaleDate >= #6/1/2012#
CustomerID SaleDate
44453 6/9/2012
44453 6/9/2012
87535 6/9/2012
28764 6/27/2012
Figure 4.35
QBE and SQL. Which customers have placed orders since June 1, 2006? QBE and SQL are
based on the same fundamental concepts. You build each query by asking the same four basic
questions.
243 Chapter 4: Database Management
Now, try a more complicated query: List the salespeople (sorted alphabetically)
with the names of the customers who placed orders with that salesperson. This
question sounds diffcult, but the command is easy when you join all three tables
together. The query and the result are shown in Figure 4.37. Notice there is no
entry for the salesperson (Zeke) who has no sales at this point.
Multiple Tables, GROUP BY, and WHERE
The basic concept of multiple tables is straightforwardonce you have chosen
the tables and joined them correctly, you can select columns from any of the ta-
bles. However, be cautious about using extra tables. Each query should use the
minimum number of tables needed to answer the question. Extra tables can create
problems and incorrect answersparticularly when computing totals.
Figure 4.37
Multitable queries with several joins. More complicated queries follow the same basic rules.
Note that some database management systems can automatically switch displays between
QBE and SQL. This feature is useful so that you can check the joins and the criteria to be sure
they are being interpreted correctly. salespeople (sorted alphabetically) along with the names
of customers who placed orders with that salesperson.
SELECT DISTINCTSalespeople.LastNameName,
Customers.LastName
FROM Salespeople
INNER JOIN (Customers INNER JOIN Orders ON
Customers.CustomerID=Sales.CustomerID)
ONSalespeople.SalespersonID
=Sales.SalespersonID
ORDERBY Salespeople.LastName
SalesName Cust.Name
Bird Adamz
Bird James
Bird Kolke
Jabbar Jones
Jabbar Smitz
Johnson James
Johnson Jones
Johnson Kilke
West Kolke
West Smitz
244 Chapter 4: Database Management
With the ability to use multiple tables, it is now time to look at more realistic
questions. Consider the business question: Who are the top salespeople in June?
The key to understanding this question is to recognize that the answer requires
computing the total sales by employee in the month of June. Begin by creating a
query that lists the sales in June along with the name of the salesperson.
As shown in Figure 4.38, you can add a WHERE condition to control the rows
that will be used in the computations. The other important step is to create the
Value column which multiplies price by quantity. Notice that this query requires
four tables: One for the name of the salesperson, two for the Sales data, and one
for the price of the items.
Figure 4.39 shows the rows from the initial query. Each row displays the sale of
one item, although there can be multiple quantities of that item. Notice that Price
and Quantity are displayed so you can verify that the Value column is computed
correctly. When building queries, it is important to display intermediate results to
Figure 4.38
Subtotals with a WHERE condition. The WHERE condition is applied frst and limits the rows
used to compute the totals.
Figure 4.39
Initial query results to compute the value column. Each row represents the sale of one item.
Price and quantity are temporarily displayed to verify the Value computation.
SalespersonID Name SaleDate Quantity Price Value
255 West 6/9/2012 2 $1,000.00 $2,000.00
255 West 6/9/2012 5 $50.00 $250.00
255 West 6/9/2012 1 $12.00 $12.00
887 Johnson 6/9/2012 1 $12.00 $12.00
887 Johnson 6/9/2012 1 $50.00 $50.00
245 Chapter 4: Database Management
ensure that computations are specifed correctly. Because a WHERE condition is
also used, the SaleDate values should also be checked to ensure the correct data is
being displayed. If you make a mistake when specifying a WHERE condition, the
only way to catch it is to look at the rows that are returned.
The next step is to remove the Quantity and Price columns and then compute
the total of the Value column. Figure 4.40 shows the SQL statement that answers
the question about total sales by salesperson in June. Note the Sum function in the
SELECT clause which specifes the total computation. More importantly, observe
that the WHERE clause holds the date condition (June). This condition flters the
rows that will be used in the computations. Finally, the GROUP BY clause speci-
Figure 4.40
SQL query to compute subtotals with WHERE condition. Notice that the date
condition is specifed in a WHERE clause because that flters the rows that will be
used in the computation.
SELECT Salespeople.SalespersonID, Salespeople.Name,
Sum([Quantity]*[Price]) AS [Value]
FROM Items INNER JOIN ((Salespeople
INNER JOIN Sales
ON Salespeople.SalespersonID = Sales.SalespersonID)
INNER JOIN ItemsSold
ON Sales.SalesID = ItemsSold.SaleID)
ON Items.ItemID = ItemsSold.ItemID
WHERE (Sales.SaleDate Between #6/1/2012# And #6/30/2012#)
GROUP BY Salespeople.SalespersonID, Salespeople.Name
ORDER BY Sum([Quantity]*[Price]) DESC;
Figure 4.41
Initial attempt to compute subtotals. Click the Totals button and set the Sum option
for the Value column. Notice that the other columns are automatically set to GROUP
BY.
246 Chapter 4: Database Management
Technology Toolbox: Creating Database Reports
Problem: Your company has a large database that contains the information you
need. However, you need to produce a relatively complex report every month based
on data in that database.
Tools: A database Report Wizard can help you build reports with a visually oriented
tool that makes it easy to create the layout and subtotals that you want.
If you need in-line computa-
tions, such as price * quantity,
it is generally easiest to create a
query that performs these sim-
ple calculations and selects the
columns you will need on the
report. Just create a query, test
the data, and save it as a view.
Then open the Report Wizard
and select the saved view. Oth-
erwise, you can select individ-
ual tables and choose the col-
umns you want from each table.
The key to understanding
reports is to use the groupings
and levels correctly. First, identify the data that you want to see at the most detailed
level. For example, you might want to see individual sale items. In creating the un-
derlying query, make sure you select the tables and columns necessary to display the
detail level you need. Sometimes, you will want to use subtotals in the query, but
many times you will simply let the report writer create the totalsit all depends on
what you want to see at the detail level. The next decision is to identify what group-
ings and levels you need. For instance, you might want to see a list of items ordered
by each customer, so you set a grouping by customer. Alternatively, you might want
to see a list of orders by each customer, so you set groupings for customer and then
for order.
The Form Wizard contains an option to compute totals for the numeric columns.
The button to select this option is easy to miss, so look carefully. Once the Wizard
creates the design, you will still have to set properties to improve the format and
layout of the report. You can also add new text boxes to compute other values. For
example, to create a total, just place a text box in the desired footer and enter the
formula =Sum(Value), using whatever column you want to total.
Creating reports is detail work. It takes time to get the layout and the format right.
It takes a sense of design to make the report look good. Remember that the goal is to
present the important information so that it can be found quickly.
Quick Quiz:
1. Create a report that prints all of the items ordered by each customer.
2. Create a report that prints each customer, followed by the orders for that cus-
tomer.
3. Create a report that displays a chart of total sales by customer.
247 Chapter 4: Database Management
fes that the totals are to be computed for each sales person. The ID and the name
are both included because there is a chance that two employees have the same
name. Including the ID ensures that employees with the same name will be treated
separately.
Look at the SQL statement again and be sure that you understand the main
points; then you can use the Access design grid to fnish the query. Figure 4.41
shows the initial attempt. Remove the Quantity and Price columns. Use the totals
button to add the Total row and select the Sum option for the Value column. Leave
the other columns at the default GROUP BY option.
Figure 4.42 shows what happens when this initial query is executed. Look at
the ID and Name columns. The question calls for computing totals for each sales-
person, so the query should have only one row for each person. These results con-
tain two rows for ID 255 (West). Why? Look back at the query grid, or better
yet, look at the SQL statement. The query lists three columns as GROUP BY: ID,
Name, and SaleDate. So the DBMS computed exactly what you asked for: The
total value for each salesperson for each day. The second row for West arose be-
cause the sale took place on a second day. If the database contained a complete set
of monthly data, the query would return different totals for every day in the month
for each employee.
The solution to the problem is to remove the SaleDate from the GROUP BY
condition. In the Access grid, this task is accomplished by changing the GROUP
BY entry on the Total row to WHERE. Figure 4.43 shows the fnal query in the
grid. Set the SaleDate row to Where and sort the Value in descending order to
display the highest value at the top of the list. When you change the SaleDate to
the WHERE entry, notice that the display checkbox is unset. Do not attempt to
restore the check markthat would tell the query to display both the individual
detail rows and the totals. But Access, and the standard GROUP BY SQL query,
cannot display details and totals at the same time. Run the query now and you will
see that it returns exactly one row for each employee who participated in a sale in
June. Remember this lesson. When computing subtotals that involve date condi-
tions, you almost always want to move the date condition to the WHERE clause.
The only exception is when you actually want to compute sales by day.
Views
There is one important feature of queries that you will fnd useful. Any query can
be saved as a view. For example, if you have a complex query that you have to run
Figure 4.42
Unfnished query. GROUP BY with SaleDate results in two rows for Salesperson
255one for each day.
SalespersonID Name SaleDate Value
255 West 6/9/2012 $2,250.00
255 West 6/10/2012 $12.00
887 Johnson 6/9/2012 $62.00
248 Chapter 4: Database Management
every week, you (or a database specialist) could create the query and save it as a
view with its own name. The important point is that the view can now be treated
like any other table. In the example, you might defne a view that combines the
tables for customers, orders, and salespeople, and call it SalesOrders. Then, to get
the total sales from customers in Miami, you run the query on the SalesOrders
view and you no longer have to worry about joining tables because the query has
already performed the step.
The advantage of views is that you can look at the data in different ways with-
out having to duplicate the data. As a manager, you can create complex views so
your employees can look up information using much simpler commands. Think of
a view as a mirror. If you stand in front of a three-way mirror in a clothing store,
you get different views of yourself although there is still only one person.
Converting Business Questions to Queries
The query grid and SQL are relatively easy to use. The real challenge lies in un-
derstanding the business question and correctly converting it into a query. In fact,
this task demonstrates the true role of MIS. One of the most diffcult tasks in
applying information technology and creating systems is to identify the business
needs and translate them into the computer realm. Students who become good at
this translation, can solve problems quicker and become more successful.
The key to translating business questions into queries is to focus on the four
questions posed at the start of this section: (1) What do you want to see? (2) What
constraints are you given? (3) What tables are involved? And (4) How are the
tables joined? And, it is usually easiest if you answer the questions in that order.
In business, the second key is to understand exactly what data is stored in the
database tables. Ultimately, you need to know what all of the tables mean and ex-
actly what type of data is stored in each column. The good news is that once you
have worked for a company for a couple of years, the terms and data will become
Figure 4.43
Correct version of the query grid. The WHERE identifer under the SaleDate column
removes the SaleDate from the GROUP BY clause and places it in the WHERE
clause.
249 Chapter 4: Database Management
familiar to you. The bad news is that company databases can hold hundreds of
tables and thousands of columns.
For longer queries, you should write down the basic SQL clauses as shown in
Figure 4.44. As you read the business question, you fll in the blanks. Of course,
you will need the relationship diagram or a list of tables in the database so you
know the names of the tables and columns. Consider an example from the Roll-
ing Thunder Bicycle company database. The business question: Which customers
from California spent the most money on race bikes in 2010? The relationship
diagram is shown in the Exercises at the end of this chapter, or you can open the
database and examine the diagram or the tables directly.
The frst step is to decide what you want to see. The business question calls
for information about customers, so you should include at least the customer last
name and perhaps their phone numbers. You have some fexibility to add other
data but keep it simple at the beginning. You also want to see the total amount of
money spent by each customer. The best way to represent that value is to look at
the SalePrice of each bicycle that was purchased. This number ignores taxes and
shipping costs which are not revenue to the frm, but managers might want these
additional values in some cases. You can now write the SELECT clause:
SELECT LastName, Phone, Sum(SalePrice) As TotalSales
Now look at the constraints you are given. Reread the business question and
you should see three constraints: California, 2010, and race bikes. Each of these
becomes a condition in the WHERE clause. Since all three conditions must be met
at the same time, they are all connected with AND clauses. Look through the list
of columns in the Bicycle table and you can fnd the appropriate columns to use
(SaleState, OrderDate, and ModelType). If you are unsure about the data held in
each column, you can display a few rows of data from the table to check the val-
ues. You can now write the WHERE clause.
WHERE (SaleState=CA)
AND (OrderDate BETWEEN #1/1/2010# AND #12/32/2010#)
AND (ModelType=Race)
Because you need to compute the total value for each customer, you must add a
GROUP BY clause. This clause must list each column in the SELECT clause that
is not part of an aggregation function.
GROUP BY LastName, Phone
Now that you know all of the columns needed, you can see which tables were
used. In this case, the Bicycle and Customer tables, so you can write the FROM
clause.
SELECT
FROM
INNER JOIN
WHERE
GROUP BY
ORDER BY
Figure 4.44
Primary SQL clauses. Write these down and fll in the blanks to start a new query.
You can simplify the FROM and INNER JOIN parts by just listing the tables and
drawing connector lines.
250 Chapter 4: Database Management
FROM Bicycle, Customer
To avoid memorizing the INNER JOIN syntax, you will eventually use the
query grid tool to enter the tables and build the joins graphically. But, you should
still verify that the tables will be connected. On the INNER JOIN clause, draw
lines between the tables to indicate how they are connected.
INNER JOIN Bicycle.CustomerID = Customer.CustomerID
In some cases, you will initially list tables that are not directly connected. For
instance, you might use the Bicycle table and the Components table in a query.
But, remember that every table must be connected when you build a query. In
these situations, go back to the relationship diagram and look for an intermediary
table that connects the ones you need. In this example, the BikeParts table con-
nects to both the Bicycle and Component table, so you must add it to your FROM
clause.
Finally, you can sort the data to organize it to answer the question. In this case,
you want to know which customers spent the most money, so sort the results in
descending order of the total.
ORDER BY Sum(SalePrice) DESC
Notice that this query will give you multiple rows. The best customers will
be listed at the top, but does that really answer the question? Technically, you
could cut off the list to display just the values at the top (SELECT TOP 5 Last-
Name, Phone, ). However, as a businessperson, you probably want to see more
than just the frst row. You generally want to know if there are ties, how close the
second-place person is to the frst, and so on. So, in reality, when a businessperson
asks for the best or worst he or she generally means to sort the list and show
at least the frst few top items in the list.
The other big hint in building queries is that sometimes they get very complex
and it is diffcult to determine how to approach the problem. In these situations,
always start with the parts you know how to do. For example, you generally know
how to enter conditions, so write those down. Then fgure out roughly what you
want to see for output and write those columns down on the SELECT line. Build
the query in pieces and test it to ensure that you are obtaining exactly the rows you
need. If necessary, work with one table at a time and add them one at a time, veri-
fying each step by running the query. If you need computations, verify that you
know how to do them, and add them to the SELECT line. Hold off on the totals
until the end because you cannot tell if the totals are correct when looking at just
one number.
Designing a Database (optional)
How do you create a new database? Database management systems are
powerful tools with the ability to present data in many ways. They are used by
managers to answer many different types of questions. However, this fexibility is
not automatic. Databases need to be carefully designed; otherwise, managers will
not be able to get the information they need. Poor design also leads to unneces-
sary duplication of data. Duplication wastes space and requires workers to enter
the same data several times. Normalization is an important technique to design
databases.
To understand the process of normalization, consider the example of retail
sales. You begin by thinking about who will be using the database and identi-
fying what data they will need. Consider the situation of the salespeople. They
frst identify the customer then record each item being purchased. The computer
251 Chapter 4: Database Management
should then calculate the amount of money due along with any taxes. Figure 4.45
shows a sample input screen that might be used.
The key design point is that you will need multiple tables to store the data. If
you try to cram all of it into a single table, you will end up with unnecessary du-
plication of data and plenty of problems when you try to delete or insert new data.
Each entity or object on the form will be represented by a separate table. For this
example, there are fve objects on the form: Customers, Salespeople, Items, Sale,
and ItemsSold..
Before explaining how to derive the fve tables from the form, you need to
understand some basic concepts. First, remember that every table must have a
primary key. A primary key is one or more columns that uniquely identify each
row. For example, you anticipate problems with identifying customers, so each
customer will be assigned a unique ID number. Similarly, each item is given a
unique ID number. There is one drawback to assigning numbers to customers: you
cannot expect customers to remember their number, so you will need a method to
look it up. One possibility is to give everyone an ID card imprinted with the num-
berperhaps printed with a bar code that can be scanned. However, you still need
a method to deal with customers who forget their cards. It is usually better to build
a method to lookup customers by name.
The second aspect to understand when designing databases is the relationships
between various entities. First, observe that there are two sections to the form: (1)
the main sale that identifes the transaction, the customer, the salesperson, and the
date, and (2) a repeating section that lists the items being purchased. Each cus-
tomer can buy several different items at one time. There is a one-to-many rela-
tionship between the Sale and the ItemsSold sections. As you will see, identifying
one-to-many relationships is crucial to proper database design.
In some respects, designing databases is straightforward: There are only three
basic rules. However, database design is often interrelated with systems analysis.
Figure 4.45
The order form is used in almost any frm. We need to determine the best way to
store the data that is collected by this form.
252 Chapter 4: Database Management
In most cases, you are attempting to understand the business at the same time the
database is being designed. One common problem that arises is that it is not al-
ways easy to see which relationships are one-to-many and which are one-to-one
or many-to-many.
Notation
It would be cumbersome to draw pictures of every table that you use, so you
usually write table defnitions in a standard notation. The base customer table is
shown in Figure 4.46, both in notational form and with sample data.
Figure 4.46 illustrates another feature of the notation. You denote one-to-many
or repeating relationships by placing parentheses around them. Figure 4.47 repre-
sents all the data shown in the input screen from Figure 4.45. The description is
created by starting at the top of the form and writing down each element that you
encounter. If a section contains repeating data, place parentheses around it. Pre-
liminary keys are identifed at this step by underlining them. However, you might
have to add or change them at later steps. You can already see some problems with
trying to store data in this format. Notice that the same customer name, phone, and
address would have to be entered several times.
Remember that some repeating sections are diffcult to spot and might con-
sist of only one column. For example, how many phone numbers can a customer
have? Should the Phone column be repeating? In the case of the retail store, prob-
ably not, because you most likely want to keep only one number per customer. In
other businesses, you might want to keep several phone numbers for each client.
Data normalization is directly related to the business processes. The tables you
design depend on the way the business is organized.
First Normal Form
Now that you have a way of writing down the assumptions, it is relatively straight-
forward to separate the data into tables. The frst step is to split out all repeating
sections. Think about the problems that might arise if you try to store the repeat-
ing data within individual cells. You will have to decide how many rows to set
aside for storage, and you will have to write a separate search routine to evaluate
data within each cell, and complications will arise when inserting and deleting
data. Figure 4.48 illustrates the problem.
Reality Bytes: Internationalization: ZIP Codes
Databases often contain addresses (of customers, suppliers, employees, etc.), that
typically use zip codes. In the United States, zip codes typically consist of fve digits,
so it is tempting to set up a ZipCode column that restricts input to fve integers. How-
ever, bulk mail is often cheaper if it uses nine-digit zip codes (zip + 4).
Even more important, if your addresses might someday include international data,
you have to be more careful in column restrictions. For instance, Canadian and Brit-
ish postal codes include alphabetic characters in the middle of the code. Some areas
(such as Hong Kong) do not use any postal codes.
Similarly, when you set up databases that include phone numbers, be sure to allo-
cate enough space for area codes. If international phone numbers will be listed, you
need to add three extra digits on the front for the international country code.
253 Chapter 4: Database Management
The answer to this problem is to pull out the repeating section and form a new
table. Then, each item purchased by a customer will fll a new row. Figure 4.48
uses the notation to show how the table will split. Notice that whenever you split
Figure 4.46
Notation for tables. Table defnitions can often be written in one or two lines. Each
table has a name and a list of columns. The column (or columns) that makes up the
primary key is underlined.
Figure 4.47
Converting to notation. The basic rental form can be written in notational form.
Notice that repeating sections are indicated by the inner parentheses. If we actually
try to store the data this way, notice the problem created by the repeating section:
Each time a customer checks out a video we have to reenter the phone and address.
CID Last Name Phone Street City Balance
12345 Jones (312) 555-1234 125 Elm Street Chicago $197.54
28764 Adamz (602) 999-2539 938 Main Street Phoenix $526.76
29587 Smitz (206) 676-7763 523 Oak Street Seattle $353.76
33352 Sanchez (303) 444-1352 999 Pine Street Denver $153.00
44453 Kolke (303) 888-8876 909 West Avenue Denver $863.39
87535 James (305) 777-2235 374 Main Street Miami $255.93
SaleID SaleDate CID Name Phone Street ItemID Qty Description Price
117 3/3/2012 12345 Jones (312) 555-1234 125 Elm Street 1154 2 Red Boots $100.00
117 3/3/2012 12345 Jones (312) 555-1234 125 Elm Street 3342 1 LCD-40 inch $1,000.00
117 3/3/2012 12345 Jones (312) 555-1234 125 Elm Street 7653 4 Blue Suede $50.00
125 4/4/2012 87535 James (305) 777-2235 374 Main Street 1154 4 Red Boots $100.00
125 4/4/2012 87535 James (305) 777-2235 374 Main Street 8763 3 Men's Work Boots $45.00
157 4/9/2012 12345 Jones (312) 555-1234 125 Elm Street 7653 2 Blue Suede $50.00
169 5/6/2012 29587 Smitz (206) 676-7763 523 Oak Street 3342 1 LCD-40 inch $1,000.00
169 5/6/2012 29587 Smitz (206) 676-7763 523 Oak Street 9987 2 Blu-Ray Player $400.00
178 5/1/2012 44453 Kolke (303) 888-8876 909 West Avenue 2254 1 Blue Jeans $12.00
188 5/8/2012 29587 Smitz (206) 676-7763 523 Oak Street 3342 1 LCD-40 inch $1,000.00
188 5/8/2012 29587 Smitz (206) 676-7763 523 Oak Street 8763 4 Men's Work Boots $45.00
201 5/23/2012 12345 Jones (312) 555-1234 125 Elm Street 1154 1 Red Boots $100.00
SaleForm(SaleID, SaleDate, CustomerID, Phone, Name, Street, (ItemID, Quantity, Description, Price ) )
Repeating Section
Causes duplication
Table name Table columns
Customer(CustomerID, LastName, Phone, Street, City, AccountBalance)
254 Chapter 4: Database Management
a table this way, you have to bring along the key from the prior section. Hence,
the new table will include the SaleID key as well as the ItemID key. When a table
contains no repeating sections, you say that it is in frst normal form.
Second Normal Form
Even if a table is in frst normal form, there can be additional problems. Consider
the SaleLine table in Figure 4.49. Notice the two components to the key: SaleID
and ItemID. The nonkey items consist of the Quantity, Description, and Price of
the item. If you leave the table in this form, consider the situation of selling a new
item. Every time an item is sold it will be necessary to reenter the Description and
list Price. It means that you will be storing the description every time an item is
sold. Popular items might be sold thousands of times. Do you really want to store
the description (and other data) each time?
The reason you have this problem is that when the SaleID changes, the item de-
scription stays the same. The description depends only on the ItemID. If the Price
represents the list price of the item, the same dependency holds. However, what
if the store offers discounts on certain days or to specifc customers? If the price
can vary with each transaction, the price would have to be stored with the SaleID.
The fnal choice depends on the business rules and assumptions. Most companies
resolve the problem by creating a list price that is stored with the item and a sale
price that is stored with the transaction. However, to simplify the problem, stick
with just the list price for now.
When the nonkey items depend on only part of the key, you need to split them
into their own table. Figure 4.50 shows the new tables. When each nonkey column
in a table depends on the entire key, the table is in second normal form.
Tird Normal Form
Examine the SaleForm2 table in Figure 4.49. Notice that because the primary key
consists of only one column (SaleID), the table must already be in second normal
form. However, a different problem arises here. Again, consider what happens
when you begin to collect data. Each time a customer comes to the store and buys
something there will be a new transaction. In each case, you would have to record
SaleID SaleDate CID Name Phone Street ItemID, Quantity, Description, Price
117 3/3/2012 12345 Jones 312-555-1234 125 Elm Street 1154,2,RedBoots,$100.00
3342,1,LCD-40inch,$1,000.00
7653,4,BlueSuede,$50.00
125 4/4/2012 87535 James 305-777-2235 374 Main Street 1154,4,RedBoots,$100.00
8763,3,Men'sWorkBoots,$45.00
157 4/9/2012 12345 Jones 312-555-1235 125 Elm Street 7653,2,BlueSuede,$50.00
169 5/6/2012 29587 Smitz 206-676-7763 523 Oak Street 3342,1,LCD-40inch,$1,000.00
9987,2,Blu-RayPlayer,$400.00
178 5/1/2012 44453 Kolke 303-888-8876 909WestAve. 2254,1,BlueJeans,$12.00
188 5/8/2012 29587 Smitz 206-676-7763 523 Oak Street 3342,1,LCD-40inch,$1,000.00
8763,1,Men'sWorkBoots,$45.00
201 5/23/2012 12345 Jones 312-555-1234 125 Elm Street 1154,1,RedBoots,$100.00
Figure 4.48
A table that contains repeating sections is not in frst normal form. Each table cell
can contain only basic data. Storing it in repeating form makes it diffcult to search,
insert, and delete data. This version is not in frst normal form.
255 Chapter 4: Database Management
the customer name, address, phone, city, and so on. Each entry in the transaction
table for a customer would duplicate this data. In addition to the wasted space,
imagine the problems that arise when a customer changes a phone number. You
might have to update it in hundreds of rows.
The problem in this case is that the customer data does not depend on the pri-
mary key (SalesID) at all. Instead, it depends only on the CustomerID column.
Again, the solution is to place this data into its own table. Figure 4.51 shows the
split. Splitting the table solves the problem. Customer data is now stored only one
time for each customer. It is referenced back to the Rentals table through the Cus-
tomerID. The same rule applies to Salespeople, resulting in the ffth table.
The fve tables you created are listed in Figure 4.52. Each table is now in third
normal form. It is easy to remember the conditions required for third normal form.
First: There are no repeating groups in the tables. Second and third: Each nonkey
column depends on the whole key and nothing but the key.
Note in that if the Customers table contains complete address data, including
ZIP Code, you could technically split the Customers table one more time. Because
ZIP codes are uniquely assigned by the post offce, the city and state could be de-
termined directly from the ZIP code (they do not depend on the CustomerID). In
fact, most mail order companies today keep a separate ZipCode table for that very
reason. For our small retail frm, it might be more of a nuisance to split the table.
Although you can purchase a complete ZIP code directory in computer form, it is
SaleForm(SaleID, SaleDate, CID, Phone, Name, Street, (ItemID, Quantity, Description, Price) )
SaleForm2(SaleID, SaleDate, CustomerID, Phone, Name, Street) Note replication
SaleID SaleDate CID Name Phone Street
117 3/3/2012 12345 Jones (312) 555-1234 125 Elm Street
117 3/3/2012 12345 Jones (312) 555-1234 125 Elm Street
117 3/3/2012 12345 Jones (312) 555-1234 125 Elm Street
125 4/4/2012 87535 James (305) 777-2235 374 Main Street
125 4/4/2012 87535 James (305) 777-2235 374 Main Street
SaleLine(SaleID, ItemID, Quantity, Description, Price) Note replication
SaleID ItemID Quantity Description Price
117 1154 2 Red Boots $100.00
117 3342 1 LCD-40 inch $1,000.00
117 7653 4 Blue Suede $50.00
125 1154 4 Red Boots $100.00
125 8763 3 Men's Work Boots $45.00
157 7653 2 Blue Suede $50.00
169 3342 1 LCD-40 inch $1,000.00
169 9987 2 Blu-Ray Player $400.00
178 2254 1 Blue Jeans $12.00
188 3342 1 LCD-40 inch $1,000.00
188 8763 4 Men's Work Boots $45.00
201 1154 1 Red Boots $100.00
Figure 4.49
Splitting a table to solve problems. Problems with repeating sections are resolved by
moving the repeating section into a new table. Be sure to include the old key in the
new table so that you can connect the tables back together.
256 Chapter 4: Database Management
ItemsSold(SaleID, ItemID, Quantity
SaleID ItemID Quantity
117 1154 2
117 3342 1
117 7653 4
125 1154 4
125 8763 3
157 7653 2
169 3342 1
169 9987 2
178 2254 1
188 3342 1
Items(ItemID, Description, Price)
ItemID Description Price
1154 Red Boots $100.00
2254 Blue Jeans $12.00
3342 LCD-40 inch $1,000.00
7653 Blue Suede $50.00
8763 Men's Work Boots $45.00
9987 Blu-Ray Player $400.00
SaleLine(SaleID, ItemID, Quantity, Description, Price)
Figure 4.50
Second normal form. Even though the repeating sections are gone, we have another problem.
Every time the ItemID is entered, the description has to be reentered, which wastes a lot of
space. There is a more serious problem: if no one has purchased a specifc item yet, there is no
way to fnd its description or price since it is not yet stored in the database. Again, the solution
is to split the table. In second normal form, all nonkey columns depend on the whole key (not
just part of it).
Sales(SaleID, SaleDate, CustomerID, SalespersonID)
SaleID SaleDate CID SPID
117 3/3/2012 12345 887
125 4/4/2012 87535 663
157 4/9/2012 12345 554
169 5/6/2012 29587 255
178 5/1/2012 44453 663
188 5/8/2012 29587 554
Customers(CustomerID, Phone, Name, Address, City, State, ZIPCode, AccountBalance)
CID Name Phone Street City Balance
12345 Jones (312) 555-1234 125 Elm Street Chicago $197.54
28764 Adamz (602) 999-2539 938 Main Street Phoenix $526.76
29587 Smitz (206) 676-7763 523 Oak Street Seattle $353.76
33352 Sanchez (303) 444-1352 999 Pine Street Denver $153.00
44453 Kolke (303) 888-8876 909 West Avenue Denver $863.39
87535 James (305) 777-2235 374 Main Street Miami $255.93
SaleForm2(SaleID, SaleDate, CustomerID, Phone, Name, Address)
Figure 4.51
Third normal form. There is another problem with this defnition. The customer name does
not depend on the key (SalesID) at all. Instead, it depends on the CustomerID. Because the
name and address do not change for each different SalesID, the customer data must be in a
separate table. The Sales table now contains only the CustomerID, which is used to link to the
Customers table and collect the rest of the data. The same rule applies to Salespeople.
257 Chapter 4: Database Management
a large database table and must be updated annually. For small cases, it is often
easier to leave the three items in the Customer table.
Database Applications
How do you create business applications using a DBMS? Data-
base systems typically have tools to help build applications. The tools make it
relatively easy to create input forms and reports. Even if you never learn how to
design a database, or become a programmer, you can learn to use these tools to
build small applications and customized reports.
Data Input Forms
Rarely is data entered directly into the databases tables. Instead, input forms are
used to enter some data automatically and to present a screen that is easier for us-
ers to understand. It is common to use colors and boxes to make the screen easier
to read. Input screens can be used to perform calculations (such as taxes). Longer
descriptions and help screens can be included to make it easier for the user to
remember what goes in each column. A sample form from the Rolling Thunder
Bicycles case is shown in Figure 4.53.
Many times, input screens look like older paper forms. Consider a typical or-
der form, which frst collects customer information such as name and address. It
also contains lines for items ordered, descriptions, and prices. These are usually
followed by subtotals and totals. If these forms exist on paper, it is easy to create
them as a DBMS input screen. If you are creating a completely new form, it helps
to draw it on paper frst to get a feel for what you want it to look like.
Most input forms begin as a screen that is empty except for a menu line or
some other help message. Three types of information can be placed on an input
screen: (1) simple text, (2) input blanks, or (3) data retrieved from the database. A
Windows-based DBMS can also include pictures, graphs, sound, and video.
Figure 4.52
Third normal form tables. There are no repeating sections and each nonkey column
depends on the whole key and nothing but the key. This fgure also shows the
relationships between the tables that will be enforced by the DBMS. When referential
integrity is properly defned, the DBMS will ensure that rentals can be made only to
customers who are defned in the Customers table.
258 Chapter 4: Database Management
Paper forms have labels to tell the user what is supposed to be entered into
each blank. For instance, many paper forms ask for a name: NAME ________.
The label (NAME) tells you what you are supposed to enter on the blank line. A
DBMS input form works much the same way. The frst step is to type in the vari-
ous labels. Move the cursor to a spot on the screen and type in a label or sentence
that will tell the user what needs to be entered.
Most database systems automatically enter some types of data, such as the cur-
rent date. If necessary, users can change the date, but it saves time by enabling
them to press ENTER to accept the displayed value. The same situation holds for
sequential items like order numbers, where the DBMS can automatically generate
each unique order number.
After you have typed in the basic labels, the next step is to add the data-en-
try boxes. Just as you would type a blank line on a paper form, you need to tell
the DBMS exactly what data will be entered by the user. For instance, move the
screen cursor to a position next to the Date label, and then tell the DBMS to enter
data at that point. You will specify the name of the column where the data will be
stored. You can also specify default values. A default value is a value that is auto-
matically displayed by the computer. For the case of the date, the DBMS will let
you enter a name like Date() that will display the current date.
Text/Labels Data Variables
Scrolling Region/Subform Record Selectors
* Subform
* Main
Command Buttons
Figure 4.53
DBMS input forms. Input forms are used to collect data from the user and perform
basic computations. Subforms or scrolling regions are used when there is a one-to-
many relationship.
259 Chapter 4: Database Management
When a DBMS prints out data, it can be formatted in different ways. You can
control the way the data is displayed by using a format command. A date might be
displayed as 10/24/2012 by entering the format MM/DD/YYYY. There are sev-
eral common date formats; most frms tend to use one standard format. Note that
many European frms use a format that is different from the common ones used in
the United States. Most database software automatically picks up the regional set-
tings from the Windows environment and displays dates in the local format.
The next section of the order form contains basic customer information. This
data is stored in the Customer table, not the Orders table. When you select the
Orders table, you might have to indicate that the Orders and Customer tables are
connected to each other by the phone number. Now, place the text labels on the
screen (customer name, address, etc.). Then place a data entry box after each label.
Next, you can add the Sales table; it is connected to the Orders table by the
order number. Type in the column names for Item#, Description, Price, and Quan-
tity. The DBMS input form will defne this part of the table as a scrolling region
or subform. To users, this subform will behave somewhat like a spreadsheet. They
can see several rows at a time, and keys (or the mouse) will move the screen cur-
sor up and down as users enter data into any row.
The only items entered in the Sales table are the Item# and the Quantity or-
dered. The Description and Price can be found by creating a look-up in the Items
table. If the clerk using this screen types in the item number, the description and
price will appear. With a good DBMS, it is possible to defne a pop-up form or
combo box in case the clerk does not know the number. This way, by pressing a
certain key, a table listing each Item# and Description will be displayed in a win-
dow on the screen. The clerk can then scroll through the list to fnd the item.
Reports
Most of the time, the data listed in one table is not complete enough to help man-
agers make decisions. For example, a listing of a Sales table might provide only
phone numbers, item numbers, and the quantity ordered. A more useful report
would print sales grouped by customer. It would also compute total sales for each
customer. Because this report relies on data from several tables, it is best to base
the report on a view.
Reality Bytes: JPMorgan Chase Needs Better Database Design
In late 2010, JPMorgan Chase bank had a problem with its online site for three days.
For at least 24 hours, customers could not conduct any transactions. The problem
was eventually traced to a third-party authentication system that relied on an Oracle
database. Apparently, some fles in the Oracle database were corrupted and through
mirroring the corruption was spread to the replicated copies. These copies then af-
fected several other systems including Automated Clearing House (ACH) transac-
tions and some loan applications. It also took developers several hours to clean up
the problems because a large amount of extra data was being stored in the authen-
tication database that should have been located elsewhere, including customer Web
usage data.
Adapted from Jaikumar Vijayan, Oracle Database Design Slowed Chase Online
Banking Fix, Computerworld, September 24, 2010.
260 Chapter 4: Database Management
The view for the sales report example needs four tables. An OrderReport view
is created that joins the Customer table to Orders by CustomerID, Orders to Item-
Sold by OrderID, and ItemsSold to Items by ItemID. The DBMS will have a cre-
ate report option to create the sales report. The report will be based on the Order-
Report view. The report writer consists of a blank screen. You can put simple text
statements anywhere on the page. You also can place data values on the page, and
you can compute totals and make other calculations.
Most reports can be broken into categories. For example, there might be report
titles that appear only at the front of the report (such as cover pages). Other in-
formationsuch as the report title, date, and column labelswill be repeated at
the top of each page. All of these items are called page headers. Similarly, there
can be page footers at the bottom of each page. Reports may also contain group
breaks. For instance, the sales report needs subtotals for each customer, so you
need to break the report into subsections for each customer. Generally, you can
specify several levels of breaks. For instance, you might break each customer or-
der into totals by date. Each break can have a break header, a detail section, and
a break footer. In the example, the customer name is printed on the break header.
There is a detail line that lists the item information. The subtotals are displayed
on the break footers. The report design or layout is illustrated in Figure 4.54. The
report with sample data is printed in Figure 4.55.
To create this report, you frst tell the DBMS that the report will contain one
break based on customer phone number. You also defne the variable Extended,
Figure 4.54
DBMS report writers. Reports are created in sections. The report header is printed
one time at the top of the report. Data in the page header section is printed at the top
of every page. There are corresponding page footers and report footer. Primary data
is printed in the detail section. Data can be organized as groups by creating breaks.
Titles are often printed in the break header with subtotals in the break footer.
261 Chapter 4: Database Management
which is price multiplied by
quantity. Now you move the cur-
sor to the top of the screen and
type in the titles for the top of
the page. Then place each col-
umn and variable on the report.
You can format each item to
make it look better. For exam-
ple, you might want to format
dates as MM/DD/YYYY so that
all four digits of the year are dis-
played. Similarly, you can add
dollar signs to the subtotals and
totals.
When you have fnished cre-
ating the report, you can print
it. When you print this report,
it should be sorted by customer
name. The DBMS will also en-
able you to print the report so
that it contains data just for one
month. Notice that only fve or
six lines are needed to create
a complex report. Without the
DBMS report writer, it would
take a programmer several hours
to create this report, and it would
be much harder to make changes
to it in the future.
Putting It Together with
Menus
If you are creating a database for
yourself with just a couple of in-
put screens and reports, you can probably quit at this point. On the other hand, for
more complex databases or for projects other people will use, it would be wise to
make the system easier to use. Application generators are tools that enable you
to combine the various features into a single application. The resulting application
can be used by selecting choices from a menu, much like users do with commer-
cial software. The important design feature is that you can create the entire appli-
cation without writing any programming commands.
Consider a simple example. As a manager, you need a sales report printed ev-
ery day that shows the best-selling items. Every week you want a list of total sales
for each employee to bring to your sales meetings. You also send letters to your
best customers every month offering them additional discounts. You want to put
your secretary in charge of printing these reports, but you do not have time to ex-
plain all the details about how to use the database program. Instead, you create a
simple menu that lists each report. The secretary chooses the desired report from
the list. Some reports might ask questions, such as which week to use. The secre-
tary enters the answers and the report is printed.
Figure 4.55
Sample report. Reports are often printed by groups or
breaks with subtotals for each group. With a report writer,
the layout, typefaces, and computations are easy to
change.
262 Chapter 4: Database Management
The frst step in creating an application is to think about the people who will
use it. How do they do their jobs? How do the database inputs and reports ft into
their job? The goal is to devise a menu system that refects the way they work.
Two examples of a frst menu are shown in Figure 4.56. Which menu is easier for
a clerk to understand? The one that best relates to the job. Once you understand
the basic tasks, write down a set of related menus. Some menu options will call
up other menus. Some will print reports; others will activate the input screens you
created.
Once you know how you want the menu structure to appear, you fll in the
menu templates in the application generator. To create a menu, you type in a title
and fll in the choices. Then you assign an action to each choice. Usually you just
pick from a list of actions and type in specifc data such as the name of the report
and how you want it sorted. When you are fnished, the application generator cre-
ates the application.
Database Administration
What tasks need to be performed to keep a database running?
Managing a database can be a complex job. Often hundreds of choices need to be
made when the database is designed. Someone needs to be in charge of defning
the data, making sure that all useful facts are captured, and managing security for
this valuable asset. Databases have to be evaluated and fne-tuned on a regular
basis. Someone has to keep track of these maintenance changes and decide when
major updates should be installed. A database administrator (DBA) is usually
appointed to manage the databases for the frm. The DBA needs to know the tech-
nical details of the DBMS and the computer system. The DBA also needs to un-
derstand the business operations of the frm.
The database administrator is responsible for all operations involving the da-
tabase. These duties include coordinating users and designers, establishing stan-
dards, and defning the data characteristics. When new programs are created, the
DBA makes sure they are tested and documented. The DBA also schedules back-
ups and recovery, and establishes security controls.
In a few large companies, an additional person known as the data administrator
(DA) is charged with overseeing all of the data defnitions and data standards for
the company. In this case, typically several DBAs are used to monitor and con-
Main Menu
1.SetUpChoices
2.DataInput
3.PrintReports
4.Utilities
5.Backups
Customer Information
Daily Sales Reports
Friday Sales Meeting
Monthly Customer Letters
Quit
Figure 4.56
Designing menus for users. Which menu is easier for a secretary to understand?
When designing applications, you should organize the application to match the
processes users perform.
263 Chapter 4: Database Management
trol various databases. The DA is responsible for making sure data can be shared
throughout the company.
Standards and Documentation
In any company of moderate size, many different databases will be used by hun-
dreds of workers. These databases were created at different points in time by
teams of employees. If there are no standards, each piece will be unique, making
it diffcult to combine information from multiple databases or tables. The market-
ing department may refer to customers, but management calls them clients. The
DBMS needs to know that both terms refer to the same set of data. Also, someone
has to determine the key values for each table. Consider the Customer table. One
department might assign identifcation numbers to each customer; another depart-
ment might use customers phone numbers, and a third department might use the
customer names. To prevent confusion and to be able to combine information, it is
best for all users to use only one of these methods to identify the customers.
Many standards are related to the database process. It is easier to use a database
if all input screens have similar characteristics. For instance, the base screen might
use a blue background with white characters. Data that is entered by the user will
be displayed in yellow. Similarly, certain function keys may be predefned. ESC
might be used to cancel or escape from choices. F1 might be used for help and F3
to display a list of choices. If each application uses keys differently, the user will
have a hard time remembering which keys do what with which database.
Likewise, it is helpful to standardize certain aspects of reports. It might be nec-
essary to choose specifc typefaces and fonts. Titles could be in an 18-point Hel-
vetica font, whereas the body of reports could be printed in 11-point Palatino. To
provide emphasis, subtotals and totals could be printed in boldface, with single
and double underlining, respectively.
One of the crucial steps in creating a database is the defnition of the data. Many
important decisions have to be made at this point. Besides the issues of what to
call each item, the DBMS has to be told how to store every item. For instance, are
phone numbers stored as 7 digits, or should they be stored as 10 digits, or perhaps
stored with the 3-digit international calling code? Postal zip codes pose similar
problems. The United States uses either a fve-digit or nine-digit zip code, but is
considering adding two more digits. Other countries include alphabetic characters
in their codes. Someone has to determine how to store this information in the
manner that is best for the company.
There are many other aspects of database design that need standards to make
life easier for the users. However, whenever there are standards, there should be a
mechanism to change these standards. Technology always changes, so standards
that were established fve years ago are probably not relevant today. The DBA
constantly reviews and updates the standards, and makes sure that employees fol-
low them.
Even though databases are easy to use, they would be confusing if the design-
ers did not document their work. Picture a situation where you want to fnd infor-
mation about customers but the designers named the table Patrons. You might
never fnd the information without documentation.
Documentation can assume many forms. Most DBMSs allow the designers to
add comments to each table and column. This internal documentation can often
be searched by the users. Many times it can be printed in different formats so that
it can be distributed to users in manuals. Because it is maintained in the database
264 Chapter 4: Database Management
along with the data, it is easy to fnd. It is also easy for the designers to add these
comments as they create or change the database, so the documentation is more
likely to be current. It is up to the DBA to ensure that all designers document their
work.
Testing, Backup, and Recovery
One advantage of the DBMS approach is that it provides tools such as report writ-
ers and application generators that end users can employ to create their own sys-
tems. Although it is easier for users to create these programs than to start from
scratch, the programs still need to be tested. Corporate databases are extremely
valuable, but only if the information they contain is accurate. It is the responsibil-
ity of the DBA to keep the information accurate, which means that all software
that changes data must be tested.
Most companies would not survive long if a disaster destroyed their databases.
For this reason, all databases need to be backed up on a regular basis. How often
this backup occurs depends on the importance and value of the data. It is pos-
sible to back up data continuously. With two identical computer systems, a change
made to one can be automatically written to the other. If a fre destroys one sys-
tem, the other one can be used to continue with no loss of information. Obviously,
it is expensive to maintain duplicate facilities. Many organizations choose to back
up their data less frequently.
The main point of backup and recovery is that someone has to be placed in
charge. Especially in small businesses, there is a tendency to assume that someone
else is responsible for making backups. Also, remember that at least one current
copy of the database must be stored in a different location. A major disaster could
easily wipe out everything stored in the same building. There are some private
companies that for a fee will hold your backup data in a secure, freproof building
where you can access your data any time of the day.
Access Controls
Another important task in database administration is the establishment of security
safeguards. The DBA has to determine which data needs to be protected. Once
basic security conditions are established, the DBA is responsible for monitoring
database activity. The DBA tracks security violation attempts and monitors who
is using the database. Because there are always changes in employees, removing
access for departed employees and entering new access levels and passwords can
be a full-time job.
Databases and e-Business
Why are databases so important in e-business? Many people still
think of Web sites as simple pages of text with a few images. But e-business re-
quires interaction with customers and the company data. Consequently, most e-
business Web sites are connected to databases. In e-commerce, customers want
to know if a product is in stockthis information is in the database. Similarly,
customer, order, and shipping data have to be maintained and shared throughout
the company. Other e-business sites use databases to provide services, store trans-
action data, and provide search and matching capabilities.
Designing an e-business database is no different than traditional business ap-
plications. However, the technologies for building Web-based applications are
still evolving. Currently, two leading systems are being developed: Oracle/Sun
265 Chapter 4: Database Management
is championing a Java-based approach known as J2EE, and Microsoft is building
the .NET platform. Databases are the heart of both systems, and both are server-
based technologies designed to build interactive Web sites. Unfortunately, the two
systems are completely independent and incompatible. If you build an application
to run with one approach, you would have to completely rewrite it to use the other
method.
Because the two approaches are so different, if you are building an e-business
system, one of your frst actions is to select one of these systems. In most cases,
the J2EE approach runs on UNIX-based computers, but some versions exist for
Microsoft-based systems. The Microsoft approach will probably only run on Mi-
crosoft servers, but some companies are experimenting with building versions that
run on UNIX systems. Because the two systems are both new, it is diffcult to
evaluate them on technical grounds. The Microsoft approach offers a little more
fexibility with its support for multiple languages. Microsoft .NET also provides
a complete development environment with several easy-to-use tools that make it
relatively easy for beginners to create database-oriented Web sites.
The basic approach is shown in Figure 4.57. Web developers create script pag-
es that interact with the database. When customers request a page, the server ex-
ecutes the associated program script. The script sends queries to the database and
retrieves the desired data. For example, the script might retrieve product descrip-
tions, prices, and in-stock status. The data and images are added to the Web page
and sent to the customer, who sees only the simple results.
Customer
Web Server
Database Server
Results
SQL
Order Form
Description
Prices
Web program script
<HTML>
Text
Data
</HTML>
Figure 4.57
E-business database. When a customer requests a page, the server runs a script
program that interacts with the database by sending queries and formatting the data to
build a new Web page.
266 Chapter 4: Database Management
Generally, the database runs on a separate serverwhich reduces the load on
the Web server and makes it easier to handles backups and other database mainte-
nance chores. However, with increasingly powerful servers, one server can handle
smaller applications.
Cloud Computing
How are databases used in cloud computing? Several of the pioneers
in cloud computing created their own special-purpose database systems. These
are not relational database systems. For example, Google needs a way to store
and retrieve huge amounts of data quickly. The company built huge sets of paral-
lel servers, and then created a database system called BigTable that is designed
to work over this distributed network. The system works well for storing docu-
ments and has built-in support for versioning. But it works nothing like SQL. For
instance, there are no JOIN commands. Instead, you specify key values for the
row, column, and time and store a single object at that location. BigTable can be
accessed through the Google App Engine application. It is useful for storing com-
plex document-type data. A more generic version of the database known as Ha-
doop is available from several open-source providers, and Facebook has created
(and distributed) the Cassandra database system that works in a similar manner.
Amazon is another early Web company that provides cloud computing ser-
vices. It currently offers three ways to store data: S3, SimpleDB, and Relational
Database Service (RDS). S3 is primarily designed to store and deliver Web pages
and other common Web objects. It is easiest to think of it as a fle service. You
upload fles to the S3 servers, and build links to them on your Web pages. When
users view your pages, the content linked to the S3 service is delivered from the
Amazon network. Because Amazon has distributed servers and high-speed In-
ternet connections, this content is delivered relatively quickly even under heavy
loads. It is best used for storing large media fles (music, video, and so on) that
will be needed by many people. Pricing is based on the amount of data stored
and transferred each month with no fxed costs. Amazon SimpleDB is similar to
Googles BigTable. For starters, you need a programmer to use either one. You
basically store and retrieve data by specifying an item name, an attribute name
and the value. Differences exist between the Google and Amazon systems, but the
Reality Bytes: Salesforce and Database.com
Salesforce.com is often listed as a leader in cloud computingmoving customer
information to the Web. In late 2010, the company released Database.com, a cloud-
based system largely based on Oracles tools to support applications running on any
platform. The system uses application programming interfaces (APIs) to deliver data
to other systems. Essentially, the site becomes a giant database store to hold any
information programmers need for Web-based services. The basic free version sup-
ports three users, 100,000 records and 50,000 transactions per month. Each set of
100,000 rows costs $10 per month, and each set of 150,000 transactions carries a
charge of $10. They system does not really use a relational data model, which reduc-
es its fexibility, but simplifes data storage and retrieval for some types of problems.
Adapted from Chris Kanaracus, Salesforce.com Unveils Database.com, Comput-
erworld, December 7, 2010.
267 Chapter 4: Database Management
underlying concepts are similar. More recently, Amazon introduced a cloud-based
relational database service. It is largely based on the MySQL DBMS and uses the
same syntax. Amazon has also indicated that it will implement an Oracle 11g da-
tabase as well.
Microsoft sells the online service Azure which is a complete implementation
of SQL Server as cloud computing. The system is built on multiple servers run by
Microsoft administrators and your database can scale up to relatively large sizes.
It is relatively easy to convert applications built using standard Microsoft devel-
opment tools to run on the cloud servers.
The main beneft to using cloud computing for databases is that you do not
have to run the hardware or software. That means you do not need to hire people
to maintain and update everything, and you do not have the initial fxed costs. You
are free to concentrate on the data and the applications. With most cloud database
services, pricing is based on usage rates. If your company is starting up and you
have small amounts of data and few users, monthly prices will be low. As the
company grows and data increases, you will pay higher fees. But, you should be
generating more revenue to cover those fees. And, most services include econo-
mies of scale so the rates decrease when you hit certain levels.
Cloud based databases are ideal for building Web-based applications. The re-
liability and scalability provided by the big service providers ensures that your
applications will be available even as demand increases. Yet, the fexible pricing
keeps the prices low during the start-up or low-use periods. Figure 4.58 shows an
estimate of costs using Amazon RDS for a mid-size database. The transfer values
are estimated to be about equal to a full T1 utilization rate. The point is that the an-
nual cost is less than 10 percent of the cost of hiring a single IT worker to run the
systemand one worker would not be able to provide 24-hour support. Another
approach is to look at the cost of the T1 lineprobably $300-$400 a month or
half of the lease cost alone. Server and network hardware costs (3-year life) would
easily make up the other half of the costs. So even if you ignore personnel costs, it
is unlikely that a similar system could be confgured in-house for this price.
On the other hand, the costs continue to increase even as your company be-
comes large. At some point, it becomes cheaper to pay the fxed costs of buying
and running your own hardware, software, and networks. It is up to you as a man-
ager to monitor the operating costs and compare them to the costs of running your
Figure 4.58
Amazon RDS (MySQL) estimated cost. Calculation is from Amazons Web site
calculator. Values are estimated and might not include all costs. But the example
provides a mid-size database with T1-level data transfer for less than 10 percent of
the cost of a single DBA.
Amazon RDS (MySQL), U.S. East
1 Extra large instance
20 hours/day
20 GB/month at 50 million I/O per month
10 GB/month data transfer in
500 GB/month data transfer out
20 GB/month regional transfer
Estimated cost: $616 per month or $7400/year.
268 Chapter 4: Database Management
own facilities. The cloud computing providers have expertise and specialize in
providing their support, so it will be expensive to acquire that same level of exper-
tise. Also, as the number of cloud providers increases, the competition should help
to hold down prices. Documentation for the various services along with pricing
models are available online, so it is straightforward to estimate the costs based on
the amount of data and the monthly data transfer rates.
Summary
Everyone needs to search for information. Computers make this job easier, but
someone must set up and maintain the databases to ensure their integrity. Rela-
tional database systems are increasingly used as the foundation of the information
system. They make it easy to share data among users while maintaining access
controls. Equally important, the databases are easy to alter as the organization
changes. Sophisticated databases can handle all the data types in use today, not
just simple numbers and text.
It is relatively easy for users to obtain data using SQL or query-by-example
tools. Because SQL is a recognized standard query language, it is worth remem-
bering the basic elements of the SELECT command. The syntax is easy (SELECT
columns, FROM tables, WHERE conditions, ORDER BY columns). Just remem-
ber that whenever you use more than one table, they must be joined by related
columns.
An important step in databases is to design them correctly. The trick is to split
the data into tables that refer to exactly one concept. Most organizations have a
database administrator to help users create the initial database tables, defne stan-
dards, establish access rights, and perform backups and testing. Once the tables
have been defned, users can create input screens, reports, and views by using
graphical tools to draw the desired items on the screen.
It is important to choose the right tool for each job. Databases excel at handling
huge amounts of data and sharing it with other users. On the other hand, spread-
sheets are designed to perform calculations and create graphs. One indication that
a problem should be solved using a DBMS instead of a spreadsheet is that several
tables of data are involved.
Several database systems, using different technologies, are available as cloud
computing services. These services provide scalability in the amount of data
stored and transferred across the Web, with almost no fxed costs. But they can
be expensive for some applications so managers must compare the in-house fxed
costs to the total variable costs of using a cloud service.
A Managers View
Every business has to store data. Every manager needs to do research. Some-
times you will have to summarize and evaluate transaction data. Sometimes
you will use external databases to evaluate the industry and your competi-
tors. Database management systems provide important capabilities to man-
agers. One of the most useful is a query language, such as QBE or SQL, that
enables you to answer questions without the need for hiring an MIS expert.
A DBMS also speeds the development of new systems and provides basic
features such as report writers and input forms.
269 Chapter 4: Database Management
Key Words
Web Site References
Database References
Computerworld data Management www.computerworld.com/s/
topic/173/Databases
eWeek Database www.eweek.com/c/s/Database/
Car Shopping Services
America's Automall www.automall.com
Autobytel www.autobytel.com
AutoNation www.autonation.com
AutoTrader www.autotrader.com
Carmax www.carmax.com
Dealer Net www.dealernet.com
Edumnds www.edmunds.com
Kelley Blue Book www.kbb.com
Vehix www.vehix.com
Review Questions
1. How is data stored in a relational database?
2. What are the main benefts of using databases to build business applications?
3. What four questions do you need to answer in order to create a database
query?
4. How do you join tables with QBE? With SQL?
5. How do you enter restrictions or constraints with QBE? With SQL?
6. How do you perform computations with QBE? With SQL?
7. Would you prefer to use QBE or SQL to access a database? Why?
8. What tasks are performed by a database administrator?
9. Why are forms (input screens) important in a relational database?
application generator
BETWEEN
break footer
break header
break
column
composite key
concurrency
data independence
data integrity
database administrator (DBA)
database management sys-
tem (DBMS)
default value
detail section
LIKE
normalization
one-to-many
page footer
page header
primary key
QBE
query by example
row
scrolling region
SQL
table
view
270 Chapter 4: Database Management
10. Do you think business users can create their own reports with a DBMS report
writer? What limitations does it have?
11. Why are standards important in a database environment?
12. Why is a DBMS important for e-business?
13. How are non-SQL databases different from relational databases?
Exercises
C04Ex15.mdb
It is best to answer the frst 15 exercise questions using a DBMS, but if one is
not available, you can use the tables in the text and write your queries by hand. If
you have a DBMS that handles both QBE and SQL, you should do the exercise
with both methods. The number at the end of the question indicates the degree of
diffculty.
1. List the customers who live in Chicago. (1)
2. List the items where the color is Blue. (1)
3. List the salespeople with a commission rate greater than 4%. (1)
4. List the customers with a last name that begins with the letter S. (1)
5. How many customers have an account balance of more than $400? (2)
6. Which customers have purchased a Blu-Ray player? (3)
7. List all of the customers of salesperson West. (3)
8. List all of the items purchased by Customer Kolke. (3)
9. Which salesperson made the most sales by count? (3)
10. What was the total value of sales in May? (4)
11. Compute the commission owed to each salesperson in June based on the
Sales Amount. (4)
12. What is the total amount of sales value in June? (4)
13. Which item category had the highest sales value in May? (4)
14. Write queries to test if the Amount value in the Sales table is correct for all
sales. (5) Hint: Save a separate query to perform the computations.
15. Which items had no sales in June? (5) Hint: This query requires a LEFT
JOIN or a subquery, which are not covered in this book.
16. You have been hired by a small county government offce to track properties
for tax purposes. The annual property tax rate is set by the local governments,
but the assessors offce is responsible for tracking the value of each property.
Whenever a house is sold, the sale price is reported to the offce. Since this
price is a concrete measure of the price, it has to be recorded permanently. In
other cases, the assessor estimates the value of a property from its primary
features, such as the lot size (measured in fractions of an acre), house size
271 Chapter 4: Database Management
(square feet), age (year built), neighborhood, and general condition. New
values are estimated every year if a house has not been sold. If a property has
not sold for more than fve years, an assessor performs a simple inspection of
the property and takes pictures from the road. Property owners can appeal an
assessment to a board. The appeal date and any comments are recorded. The
data is currently recorded on a form organized by each property. Recently,
the offce has been assigning GPS coordinates (latitude, longitude, altitude)
to each property. Many do not have data yet but will be added when the
properties are inspected. Create a list of normalized tables need to build this
database.
Property ID
Year Built Construction Price
Year Remodel
Address
Tax Code Area
Zone Code
Subdivision Township/Range/
Section
Latitude
Longitude
Altitude
Lot size
House size
Sewer
Water
Utilities
Bedrooms
Bathrooms
Fireplaces
Garage
Basement
Property Description
Year Valuation Method Comments
Appeals
Date Claimed Value Resulting Value Comments
17. A friend has asked for your help in training for a triathlon. No, you do not
have to run with her at 5 AM. She wants a personal log to track her progress
and well-being. She has been writing entries in a journal, but she wants to be
able to plot the data and compute totals. The basic layout of her existing log
is shown in the form. For each day, she tracks the distance and time of each
272 Chapter 4: Database Management
run, bike ride, and swim. In all three cases, distance is recorded in miles; but
often includes fractions. Eventually, when she plots the data, she wants the
ability to exclude some days. For instance, one day her bike broke and she
had to run home, so the time would not match with the others. She usually
records her basic meals and estimates the total calories for the day. For the
health category, she estimates the number of hours of sleep she gets at night,
but the other entries are subjective comments and notes about the day.
Date Run Bike Swim Food Health
Sunday Dist.
Time
Comment
Dist.
Time
Comment
Dist.
Time
Comment
Breakfast
Lunch
Dinner
Snacks
Calories
Sleep
Illness
Comments
18. Using your experience in a job, school, or any organization; identify a
problem that could be supported with a database management systemthat
requires at least three separate tables. Sketch a sample form.
19. Think about business or Web-based applications and identify a task that you
believe could best be supported by a non-SQL DBMS. Explain why.
Technology Toolbox
20. For the Sales database, create input screens for Items, Customers, and
Salespeople. Add an ItemCategory table that holds a list of the categories
so you can add a combo box to the Items form to select from the list of
categories.
21. Using a different design, rebuild the Sales form.
22. Add a button to the Sales form that enables users to open the Customer form
to edit the data or enter a new customer.
23. Create an inventory report that lists all of the products; group them by
category; and, within each category, sort them by price.
24. Create the customer sales report that is described in the chapter.
25. Create a start-up form that can be used as a menu. Begin in Design View and
add buttons that open the other forms and reports. Use colors or images to
enhance the appearance of the form.
Teamwork
26. As individuals, each person should investigate a cloud-based DBMS in terms
of capabilities and pricing. Combine the results as a team and select one tool
that you would choose for a start-up Web-based company that anticipates
starting with 1,000 customers a month and increasing to 10,000 customers a
month within two years.
273 Chapter 4: Database Management
27. Assign the tables in the Sales database to each person on the team. As a
group, identify the primary users of the system. Each person should then
specify the security access rights for each user on each table: SELECT,
INSERT, UPDATE, or DELETE.
28. Assume that you need to buy a DBMS to create a Web-based company.
Research the components needed and have each person fnd information
and evaluate a DBMS package. Try to identify costs as well as strengths and
weaknesses of the package. Share the individual results and create a report
that makes a recommendation.
29. With the cooperation of a local small business, create a database for that
company. Note that you should verify the initial layout of the tables with
your instructor or someone who has studied database design. Assign specifc
forms and reports to individual team members and combine the pieces.
30. Each team member should write up three business questions related to either
the C04Ex15.mdb or Rolling Thunder database. Exchange the questions with
the other team members, and then create the queries to answer each question.
Share your answers.
CustomerID
Phone
FirstName
LastName
Address
ZipCode
CityID
BalanceDue
Customer
CustomerID
TransDate
EmployeeID
Amount
Description
Reference
CustomerTrans
StoreID
StoreName
Phone
ContacFirstName
ContactLastName
Address
Zipcode
CityID
RetailStore
State
TaxRate
StateTaxRate
SerialNumber
CustomerID
ModelType
PaintID
FrameSize
OrderDate
StartDate
ShipDate
ShipEmployee
FrameAssembler
Painter
Construction
WaterBottle
CustomName
LetterStyleID
StoreID
EmployeeID
TopTube
ChainStay
HeadTubeAngle
SeatTueAngle
ListPrice
SalePrice
SalesTax
SaleState
ShipPrice
FramePrice
ComponentList
Bicycle
CityID
ZipCode
City
State
AreaCode
Population1990
Population1980
Country
Latitude
Longitude
City
ModelType
Description
ComponentID
ModelType
Paint
EmployeeID
TaxpayerID
LastName
FirstName
HomePhone
Address
ZipCode
CityID
DateHired
DateReleased
CurrentManager
SalaryGrade
Salary
Title
WorkArea
Employee
SerialNumber
TubeID
Quantity
BicycleTube
ModelType
MSize
TopTube
ChainStay
TotalLength
GroundClearance
HeadTubeAngle
SeatTubeAngle
ModelSize
LetterStyle
Description
LetterStyle
PurchaseID
EmployeeID
ManufacturerID
TotalList
ShippingCost
Discount
OrderDate
ReceiveDate
AmountDue
PurchaseOrder
SerialNumber
TubeName
TubeID
Length
BikeTubes
SerialNumber
ComponentID
SubstituteID
Location
Quantity
DateInstalled
EmployeeID
BikeParts
PurchaseID
ComponentID
PricePaid
Quantity
QuantityReceived
PurchaseItem
ManufacturerID
ManufacturerName
ContactName
Phone
Address
ZipCode
CityID
BalanceDue
Manufacturer
CompGroup
GroupName
BikeType
Year
EndYear
Weight
Groupo
ComponentID
ManufacturerID
ProductNumber
Road
Category
Length
Height
Width
Weight
Year
EndYear
Description
ListPrice
EstimatedCost
QuantityOnHand
Component
ManufacturerID
TransactionDate
EmployeeID
Amount
Description
Reference
ManufacturerTrans
TubeID
Material
Description
Diameter
Thickness
Roundness
Weight
Stiffness
ListPrice
Construction
TubeMaterial
GroupID
ComponentID
GroupCompon
ComponentName
AssemblyOrder
Description
ComponentName
PaintID
ColorName
ColorStyle
ColorList
DateIntroduced
DateDiscontinued
274 Chapter 4: Database Management
Rolling Thunder Database
Create queries to answer the following questions. (Diffculty level: 1 = easiest.)
31. List all race bikes that sold in 2009 with a sale price greater than $5000. (1)
32. List all the purchase orders in 2008 with a total value greater than 200,000.
(1)
33. List the employees hired after January 1, 1995 with a salary grade higher
than 10. (1)
34. List the road bikes purchased in December 2009 with a FrameSize greater
than 50 cm. (1)
35. List the paint colors introduced after 1995. (1)
36. List the retail stores in Delaware. (2)
37. List the customers (name and phone) who bought full suspension mountain
bikes in December 2008. (2)
38. List all the race bikes ordered in 2010 that were painted with red in the color
list sold to the state of New York. (2)
39. List the manufacturers who supplied mountain bike (MTB) forks in 2010. (2)
40. List the employees who painted race bicycles in January 2010. Hint: change
the relationship from EmployeeID to Painter. (2)
41. Compute the number of bicycles sold by state for 2009. (3)
42. Which letter style was the most popular for Road bikes in 2010? (3)
43. What was the average discount (ListPrice SalePrice) given on mountain
bicycles in 2009? (3)
44. Which manufacturer did RT buy the most components from by value in
2010? (3)
45. Which employee sold the most race bikes in March 2010 by count? (3)
46. By count, what was the most popular crank installed on full suspension
mountain bikes in 2010? (4)
47. How many bikes were sold each month in 2010. Hint use the function
Format(OrderDate, yyyy-mm). (4)
48. For 2009, was the average price of mountain bikes lower than the average
price of full suspension bikes? (4)
49. What was the average effective sales tax rate (tax/SalePrice) by state in
2010? (4)
50. In 2009, did race bikes have more Cranks made by Campy or Shimano? (4)
51. Which customers who have purchased mountain bikes have also bought
Road bikes at any time? (5) Hint: Create two separate queries and save them.
52. Which customers purchased two or more bikes in at least two different years?
(5)
275 Chapter 4: Database Management
Additional Reading
Disabatino, Jennifer, NHL Scores With Database On Draft Day,
Computerworld, July 9, 2001. [NHL uses a database to provide more
information and cut hours off the time to draft players.]
Fox, Prim, Tax Filing Gets Connected to the Web, Computerworld, August
8, 2001. [The importance of connecting databases to the Web even for
governments.]
Mayer, Merry, New DNA Database Extends The Long Arm Of Law
Enforcement, Government Computer News, October 19, 1998, p. 47.
[Government database to identify criminals.]
Post, Gerald, Database Management Systems: Designing and Building
Applications, Irwin/McGraw-Hill, 2002. [How to design databases and use
them to build business applications.]
Sliwa, Carol, Lee Copeland, and Don Tennant, Dead voters in Florida?
Computerworld, November 13, 2000. [Only 10 states have an online central
voter registration database, and 16 have no state database at all.]
Trombly, Maria, Schwab Database Glitch Cuts Users Off From Some
Information, Computerworld, February 13, 2001. [The importance of
database availability and reliability.]
Tiboni, Frank, FEMA Automates Property Inspection Scheduling, Government
Computer News, November 9, 1998, p. 14. [Emergency agency uses
telephone registration and database to help disaster victims in less time.]
276 Chapter 4: Database Management
Cases: Pharmaceuticals
Te Industry
The pharmaceutical industry has received considerable attention in the past few
years. Several organizations, including the AARP, have criticized the industry for
price increases on name-brand drugs that exceed the infation rate. The AARP
reported that prices have increased by 6 to 7 percent a year in 2002 and 2003
(Kaufman and Brubaker 2004). Prescription drugs often form a signifcant per-
centage of household budgets for elderly retirees. Yet the pharmacy industry notes
that identifying and testing a new drug is expensive. On average, it takes 10 to
15 years and costs $800 million to bring one new drug to the market. And only
one in fve potential drugs makes it through the entire process. The industry spent
an estimated $33.2 billion on R&D in 2003 (PhRMA 2004). On the fip side, the
pharmaceutical companies spend about as much on marketing as they do on R&D
(fnancial statements). In the same report, the industry observes that 10.5 percent
of total health care dollars in the United States are spent on prescription drugs.
0
10
20
30
40
50
60
70
80
1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010
B
i
l
l
i
o
n
$
Annual Revenue
Pfizer
GlaxoSmithKline
Bristol-Myers Squibb
Eli Lilly
-0.2
-0.1
0
0.1
0.2
0.3
0.4
0.5
0.6
1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010
R
a
t
i
o
Net Income / Revenue
Pfizer
GlaxoSmithKline
Bristol-Myers Squibb
Eli Lilly
277 Chapter 4: Database Management
Drug Prices
The combination of high research costs, high risk, and the need to make a proft
makes it diffcult to set public policy. Profts encourage additional research and
development to create new drugs. High prices keep the drugs out of the reach of
some people who need them. Some governments have imposed price controls in
an attempt to keep prices lower for patients. Canada presents an interesting ex-
ample. Because trade with Canada is relatively unrestricted, U.S. patients have
turned to Canadian pharmacies to fll their prescriptions. Even some state and lo-
cal governments have tried to save costs by purchasing drugs from Canada, where
the prices are held down by government rules (Schiavone 2003). Drug companies
have staged an all-out battle to prevent the purchase of drugs from other countries.
GlaxoSmithKline went as far as stopping sales to Canadian pharmacies (CNN
2003).
In 2004, the U.S. government introduced a Medicare insurance policy for pur-
chasing name-brand prescription drugs. Participants have to sign up for the plan
and pay a specifed amount. The policies are sold by private companies, and the
terms vary. Essentially, the policy covers a certain level of drug costs. However,
with the copayments, limits on total value, and rising prices, it is not clear how
many people will be able to beneft from the plan.
Research and Development
Research and development is a diffcult process. Many times, luck and accidents
play a role in creating new drugs. Yet companies need a huge infrastructure to take
advantage of that luck. Research requires people and labs. Increasingly, it also
needs information technologyin the form of databases, analytical tools, and col-
laboration software.
Finding a potential drug is only the frst step (research). Development requires
extensive testing, fnding ways to deliver the drug with minimal side effects, and
manufacturing it cheaply and consistently to narrow tolerances.
A pharmaceutical frm has to recover all costs within the life of a patented drug.
Once the patent expires, the drug can be manufactured generically, and the invent-
ing frm no long makes any money. Since 2000, several of the leading frms have
suffered substantial declines in revenue as their patents expired on several block-
buster drugs.
An interesting twist on pharmacy research arose in 2004. A couple of frms,
particularly GlaxoSmithKline, were charged with withholding research data. All
potential drugs have to go through clinical human trials to identify the specifc
gains and evaluate potential side effects. The drug companies provide the results
of the studies to the Federal Drug Administration (FDA), which has to give fnal
approval to the drug. In at least some cases, negative research was withheld. Many
of the trials are somewhat secretiveneither patients nor physicians can be al-
lowed to know which patients have the specifc drugs. Consequently, it is relative-
ly easy to bury negative results and only publish the positive ones. Of course, easy
is not the same thing as ethical. As a result of substantial publicity in 2004, several
agencies, companies, and people are pushing for a national registry of clinical tri-
alsbefore they are started. This way, everyone can check on the progressboth
good and bad (Martinez 2004).
Genetics is playing an increasing role in drug discovery and testing. Several
specialist frms (e.g., Genentech) have been struggling for several years to use ge-
netic modifcations techniques to create completely new drugs. A few of the drugs
have been successful, but the sub-sector has not yet matched its early promises.
278 Chapter 4: Database Management
Marketing
Pharmaceutical frms have substantially pushed the boundaries of drug marketing
in the last decade. Originally, the frms relied on publications in medical journals
to highlight the success of their drugs. Of course, sales representatives made di-
rect calls to physicians to point out the results, offer comparisons with existing
drugs, and answer basic questions. These activities are still important to the indus-
try. However, the industry changed enormously when it began marketing drugs di-
rectly to consumers. The FDA has relatively strict rules about the contents of these
ads, and it routinely monitors the ads and requires companies to alter the ads.
Nonetheless, physicians are now bombarded with questions from patients about
a new drug they saw on television. Of course, patients rarely read the fne print
telling about the side effectsand few can make comparisons among the vari-
ous drugs. So, physicians have to spend time explaining their choices. The phar-
maceutical industry points out that increased communication between doctor and
patient is a good thing. But, there remain many unresolved questions about the
effectiveness of the campaignsother than to boost pharmacy company profts.
Increasingly, pharmaceutical frms are being asked to track drugs and ship-
ments more closely. California and Florida both passed laws that will require the
industry to track the entire supply chain of drugs from the manufacturer to the
wholesaler and retailer. Californias law takes effect in January 2009. The security
company VeriSign has established a database that can be used to track ownership
of drugs, and sales will not be allowed until the seller can verify its ownership
of the drug. AmerisourceBergen, a drug wholesaler, is working with the pharma-
ceutical companies to develop the system. In the early stages, the companies are
considering the use of RFID tags instead of simple bar codes to make it easier to
read the data (Weier 2007). Many Schedule 1 drugs, such as the addictive pain-
killer OxyContin, are already tracked with RFID tags. Pfzer also announced that
to reduce thefts and diversions to drug dealers, it would begin tracking bottles
of Viagra (Carr and Barrett 2005).
By 2011, pharmaceutical frms began changing their approach to marketing.
The frms were facing declining profts, loss of patents, and the fact that physi-
cians do not like being interrupted. By 2010, about 25 percent of physicians put
themselves on do-not-see lists and about 75 percent of sales rep visits did not
result in face-to-face meetings. So tens of thousands of sales reps were eliminated,
and largely replaced with Web sites, iPad apps, and other digital tools. Older-style
Web sites were discontinued in favor of interactive sites that enable physicians to
ask questions, or get information from online reps (Whalen 2011).
Information Technology Needs
The pharmaceutical industry runs on data, information, and knowledge. The re-
search departments generate and need to scan enormous amounts of data. They
experiment and produce papers that disseminate knowledge. Researchers need to
collaborate and share this data and knowledge. But the size of the companies, the
variety of products, and the geographical dispersion all add complications. Ad-
ditional data comes from physicians and even customers. On top of the research
data, the marketers need to track salespeople, physician contacts, and marketing
plans. The legal staff needs to monitor progress, evaluate patent documents, and
shepherd thousands of documents through the FDA approval process. On top of
all that, the CFO and CEO have to run the businesswatching the fnancial data
and creating the standard business reports.
279 Chapter 4: Database Management
Additional Reading
Carr, David F. and Larry Barrett, Philip Morris International: Smoke Screen,
Baseline Magazine, February 1, 2005.
CNN Online, GlaxoSmithKline Stops Selling Drugs To Canadian Pharmacies,
January 21, 2003.
Kaufman, Marc and Bill Brubaker, Study: Drug Prices Outpace Infation, The
Washington Post, May 25, 2004.
Martinez, Barbara, Spitzer Charges Glaxo Concealed Paxil Data, The Wall
Street Journal, June 3, 2004.
Pharmaceutical Research and Manufacturers of America (PhRMA),
Pharmaceutical Industry Profle 2004, Washington, DC: PhRMA (http://
www.phrma.org/publications/publications//2004-03-31.937.pdf).
Schiavone, Louise, Governments Eye Canada For Cheap Drugs, CNN Online,
October 16, 2003.
Simons, John, When Big Pharma Gets Too Big, Fortune, December 4, 2006.
Weier, Mary Hayes, Pharma Industry Debating Bar Codes Vs. RFID For Drug
Tracking, Information Week, March 28, 2007.
Whalen, Jeanne, Drug Makers Replace Reps with Digital Tools, The Wall
Street Journal, May 9, 2011.
Case: Eli Lilly and Company
Eli Lilly (ticker: LLY) is one of the leading pharmaceutical companies. Founded
in 1876, the frm now has more than 46,000 employees (www.lilly.com). Like
other pharmaceutical frms, Lilly is dependent on revenue from blockbuster drugs.
When patent protection expires for a blockbuster drug, as it did for Lillys Prozac
in the early 2000s, revenue and profts drop. The challenge for companies is to fll
the pipeline with new drugs that will provide a new revenue stream. Research and
development are key elements in this process. But fnding new blockbuster drugs
that solve a major medical problem is not easy. Lilly, like the other frms, is turn-
ing to biotechnology to help create and test new drugs. Lillys genetically engi-
neered insulin has been one of the frst successes in this new line of research. Lilly
is also hoping to capitalize on the erectile dysfunction sales by heavily advertising
its Cialis drug directly to consumers.
Research and Development
R&D is critical to generating profts. But R&D has become considerably more
complicated. Research is no longer performed by one or two scientists working
alone in a lab. Instead, Lilly has thousands of researchers working on various proj-
ects. Each of the compounds being created needs to be shared across the company.
Collaboration has become a critical success factor. Throw in the fact that most of
the large companies have expanded through mergers. Now, how do you combine
the systems and the people to provide effective collaboration? Charles Cooney,
codirector of the Program on the Pharmaceutical Industry at MIT, observes that
R&D is useless unless it can be integrated into a bigger picture that helps you
280 Chapter 4: Database Management
convert leads to drug candidates. The diffculty for the CIO is getting the team to
work between the various disciplines needed to integrate the information in order
to create knowledge (Overby 2002).
Genetics is an increasingly important factor in pharmacy, and it adds many
complications. Lilly, as well as the other frms, is looking at a future where drug
selection may be tailored to a patients DNA. Some drugs are more effective when
specifc genes are present. This level of knowledge will require a tremendous
amount of information fowboth in R&D and in marketing.
In 2006, Lilly took an interesting step by outsourcing some data management
and data analysis to Tata Consultancy Services (TCS) in India. TCS is well known
for providing off-shore consulting for programming and other IT services. But
this contract calls for scientifc analysis using a facility dedicated to working on
data analysis for Lilly. Steve Ruberg, Lillys group director for global medical
information sciences said that the agreement includes gaining access to a global
talent pool, increasing fexibility and scalability of our resources, and maintaining
a global workfow that is operational 24 hours a day (McDougall 2006).
Information Technology
Information technology with its connections to customers provides a new way
to evaluate drug effects. All drugs go through scientifc trials where physicians
carefully monitor patients and evaluate side effects. But testing on a few hundred
or even a thousand subjects does not always provide complete information. His-
torically, drug frms have relied on physicians to evaluate and report on effective-
ness and side effects. Lillys drug Strattera was the frst nonstimulant treatment for
children with attention-defcit hyperactivity disorder. On the basis of early trials,
the company knew that sleepiness could be a side effect. To evaluate the drug
when it was released to customers, Lilly designed a customer relationship man-
agement system to track customer contacts through its call center. With the feed-
back from actual customer use, the company was able to identify that the sleepi-
ness was minimized if the drug was taken at a meal and at night. Sidney Taurel,
Lillys CEO, notes that weve seen that IT makes you more effective. Its a big
shift. Weve changed to seeing IT as an enabler of effectiveness (Murphy 2004).
Big shift is right. When Lilly hired Tom Trainer as its frst CIO in 1994, he
found a messwith 17 different IT organizations and minimal use of comput-
ers for business. By the time Trainer left in 1999 to head global IT for Citigroup,
the technology had improved considerably. But IT was still largely used to re-
duce costs. CFO Charlie Golden says, We had gone through quite a change in
our perspective and strategy in IT. It was important to try to sort through what it
would take to continue to change, but also to make IT a more integral part of our
strategy (Ewalt 2003). Roy Dunbar was chosen as the new CIO. He began as a
pharmacist, had some business experience, but little experience with information
technology. With some intense education, and a lot of humility, Dunbar learned
the foundations of information systems. His ultimate charge was to fnd ways to
use technology to support the strategy of the frm. For that, he needed everyone to
start with a business perspective. One of the key tools his team created in 2000 was
the Molecule Library. It is a knowledge management system that makes it easy for
researchers to fnd information about chemical compounds being worked with in
the companys pipeline. The system reduces research time from days to minutes.
Another new tool, the Sample Identifcation Database, functions as a registry of
all compounds being developed. The Gene Anatomy Made Easy (Game) project
281 Chapter 4: Database Management
helps scientists identify DNA analysis without requiring expert help. Shaving a
few hours a week off the research time of every scientist can help get projects to
market earlier, saving billions of dollars in costs (Ewalt 2003).
In 2001, the IT department began expanding its use of SAP (its enterprise re-
source planning system) to improve connections to suppliers and customers.
Combining the companys shipping, billing, and sales data makes it easier to track
sales and keep on top of billing problems. The company also implemented a sales
management system to provide better information to salespeople.
Coming from the pharmacy side of the business, Dunbar knew that it was criti-
cal for the scientists to not only understand the value of the technology but also
defne and shape it to make it useful. He notes that even as the projects move
into production, its senior-level scientists who are championing the new tools and
evangelizing about their benefts (Overby 2002). To improve communication be-
tween the IT staff and scientists, the IT development teams hold meetings at least
once every two weeks between the two groups. Moreover, Dunbar doubled his
IT department staff to 2,700 people, with an emphasis on hiring people with dual
computer science and biology or chemistry degrees. In 2003, Mike Heim was ap-
pointed as the new CIO. Mike began his career at Lilly as a systems analyst in
1979.
In 2008, Lilly signed an agreement with TopCoder Inc. to help build some of
its large applications for global drug discovery operations. TopCoder sponsors
worldwide competitions trying to attract creative programmers. Code written by
the programmers is stored in libraries that can be used by sponsoring companies
such as Lilly (Havenstein 2008).
From various reports, Lilly uses Amazon Web Services (AWS) to handle some
computing tasks. Using the cloud services is faster than trying to buy and set up
a new physical server. But, rumors also exist about issues surrounding the basic
contract and potential liability issues (Vaughan-Nichols 2010).
In 2010, Lilly began reducing costs by eliminating 5,500 workers, including
340 information technology jobs in addition to 140 cuts due to layoff, retirement,
and resignations; out of 1,250 IT workers (Sears 2010). By 2013, drugs generating
half of Lillys revenue will lose patent status and face competition from generics.
Marketing
Developing a new drug is only the frst step to making a proft. Companies also
have to convince physicians to prescribe the drugs. With competition, and a huge
array of new drugs, physicians need to evaluate the benefts and side effects. In
the past, drug companies had sales representatives call on physicians. But Brian
Weed, global marketing and sales IT director for Lilly, points out that doctors
offces are closing their doors to pharmaceuticals sales representatives and citing
HIPAA and privacy concerns as reasons (Greenemeier 2003).
Sales force management and customer relationship management software are
becoming more important at the pharmaceutical frms. Salespeople need to tell a
consistent story to physicians. In terms of patients, Lilly is encouraging customers
to contact the drug frm directly, instead of frst going to their physician (Greene-
meier 2003). The direct contacts can be benefcial in building brand awareness. As
Lilly learned with Strattera, the call centers can provide more immediate feedback
on actual usage and side effects. Ultimately, the process might require tighter links
between the patients, physicians, and pharmaceutical frms, but those are not yet
on the drawing boards.
282 Chapter 4: Database Management
Over the years, Lilly, and many other pharmaceutical frms, have faced bad
publicity with various lawsuits. A common complaint is that the drug frms with-
hold or bury important information from physicians, usually regarding side ef-
fects. Thousands of plaintiffs claimed that Lillys Zyprexas anti-psychotic drug
led to obesity and diabetes. In an interesting twist, a doctor and a lawyer involved
in the case obtained many of the documents from plaintiffs and posted them on a
Web site. Lilly attempted to obtain an injunction to (1) get the documents returned
and (2) have all copies removed from all Web sites. Jack B. Weinstein, a federal
judge in Brooklyn, ruled that the documents had to be returned, but it would be
impossible to enforce any court order to prevent Web sites from displaying copies
(Thomas 2007).
Questions
1. How does Eli Lilly use databases to improve effciency?
2. What types of data does Lilly store in its databases?
3. How could Eli Lilly use additional information technology in marketing?
Additional Reading
Claburn, Thomas, Eli Lilly Recovers Confdential Documents But Loses Secrets
To The Web, Information Week, February 15, 2007.
Ewalt, David M., Roy Dunbar, Information Week, December 15, 2003.
Greenemeier, Larry, Pharmaceutical Makers Turn To CRM, Information Week,
October 29, 2003.
Havenstein, Heather, Eli Lilly Aims to Tap Rock Star Programmers,
Computerworld, May 14, 2008.
McDougall, Paul, Drug Company Eli Lilly Outsources Clinical Data to India,
Information Week, November 20, 2006.
Murphy, Chris, Answers That Matter, Information Week, February 2, 2004.
Sears, Don E., Eli Lilly Eliminates 340 IT Jobs, eWeek, July 16, 2010.
Overby, Stephanie, They Want a New Drug, CIO, October 15, 2002.
Vaughan-Nichols, Steven J., Falling Through the Clouds, Computerworld,
August 3, 2010.
Case: GlaxoSmithKline
GlaxoSmithKline (ticker: GSK) is one of the leading global pharmaceutical frms.
Created through the merger of several frms over the past decade, it is headquar-
tered in England and has over 100,000 employees worldwide. Like the other large
pharmaceutical frms, GlaxoSmithKline (GSK) is suffering from the transition of
its blockbuster drugs to generic status. It could easily lose $3 billion to $4 bil-
lion in revenue from its antidepressants Wellbutrin and Paxil and the antibiotic
Augmentin (Business: Glaxo 2004. Because the company is headquartered in
England, but almost half of its sales are in the United States, profts have suffered
from the 35 percent depreciation of the dollar in 2003-2004. Nonetheless, CEO
Jean-Pierre Garnier is optimistic. Through the mergers, he was able to trim $6
283 Chapter 4: Database Management
billion in costs. He has rearranged the research teams into divisions focused on
specifc areas (cancer, AIDs, and so on). More important, the company has 80
new products in the pipeline and half have reached advanced stage clinical trials
(Business: Glaxo 2004).
GSK faces other issues. In 2004, the New York attorney general, Eliot Spitzer,
fled suit against GSK for concealing negative data about Paxil. Spitzer contends
that of all the studies Glaxo performed, only one generated the results they wanted
to promote the drug. Their effort to suppress the other studies was harmful and
improper to the doctors who were making prescribing decisions and it violated the
law (Martinez 2004). The primary concern is that Paxil might lead to suicidal be-
havior if used in children under 18 years of age. Glaxo notes that Paxil was never
approved for use by children in the United States and was not promoted that way.
Glaxo spokesperson Mary Anne Rhyne notes that there are many, many stud-
ies each year. Its impractical to believe that every company in the industry will
be able to publish from every study (Martinez 2004). But Glaxos problems are
compounded by a couple of internal memos. One noted that the company would
have to effectively manage the dissemination of these data in order to minimize
any potential negative commercial impact. Another stated that it would be com-
mercially unacceptable to include a statement that effcacy had not been demon-
strated (Martinez 2004).
In response to these problems, several organizations have called for a clinical
trial registry to track the progress of all trials and outcomes. The leading pharma-
ceutical companies are also backing the registry. However, the process is not that
simple. Many of the Phase I trials are designed to test for side effects and do not
focus on effcacy. So, some drugs might not appear to be useful. Some companies
have noted that the National Institute of Health already maintains an online regis-
try (www.clinicaltrials.gov), and it could be expanded to include results from all
Phase III trials (Hovey 2004).
Relying on blockbuster drugs for profts is a risky strategyparticularly when
bad news erupts concerning the heavily-used drugs. In 2007, some medical infor-
mation was reported suggesting that GSKs second-biggest selling drug Avandia,
a diabetes treatment, was linked in some way to a risk of heart attack. The data
on both sides of the argument appeared weak and additional studies were being
conducted. Nonetheless, physicians had basically stopped prescribing the drug for
new patients. In managing the crisis, Jean-Pierre Garnier, CEO of GSK suggested
fve tips (Whalen 2007):
(1) Fight data with data.
(2) Communicate to employees. Daily phone calls are essential.
(3) Study doctor opinion to catch any changes.
(4) Put data on company Web site so everyone can see.
(5) Keep working on long-term business goals.
In 2007, it was estimated that GSK spent about $560 million on U.S. consumer
ads; which is only a fraction of the $5.2 billion spent annually on U.S. pharmaceu-
tical ads. But, in part to head off potential new regulations, Glaxos CEO Andrew
Witty said the company would cut back on television advertising. (Whalen 2009).
Information Technology in Research
In one sense, pharmaceutical R&D is similar to a university. Sharing knowledge
within the organization is a key factor. The company generates and acquires infor-
mation in the form of documentssome electronic, some in paper. GSK built a
284 Chapter 4: Database Management
centralized library system (Lynx) to give researchers immediate access to the doc-
uments. The system provides access to over 2,000 electronic journals. Requests
for paper books or articles are handled by librarians, who frst try to locate the
appropriate title within one of the companys nine libraries. If it is not available,
they check with their outside suppliers. Of course, the company would prefer to
digitize all paper documents, making it simpler to deliver the information, plus
make it available to other users later. However, copyright limits the number of
documents that can be digitized and prevents the company from disseminating
them (Delaney 2003).
Genetics, particularly individual differences among patients, is one of the big
target areas for pharmaceutical frms. Glaxo has forged a relationship with First
Genetic Trust to study how variations in individual DNA can affect the effcacy
and side effects of various drugs. Glaxo even built a proprietary high-speed net-
work to communicate with First Genetic Trust. The company uses data mining
and huge databases to compare drug effects across individuals. The main system
runs on several HP 16L-Series 9000 UNIX servers. The company uses commer-
cial applications to enable patients to provide informed consent and specify how
their genetic data can be used. In general, only the genetic data without personal
patient identifers is given to Glaxo researchers (Greenemeier 2002).
In 2009, GSK was looking at many of the same cost issues facing other phar-
maceutical frmsnotably the number of proftable drugs losing patent status. VP
of IT Ingo Elfering said that he was using this pressure to push for changes in the
IT operations. The company signed a deal with Microsoft to shift standard e-mail,
calendars, and collaboration services to Microsofts hosted system (Lai 2009).
The deal will transfer 100,000 employees from the existing IBM Lotus Notes to
Microsoft Exchange, SharePoint, and Offce Live Meeting. The company expects
to reduce costs by 30 percent.
Questions
1. How does information technology help Glaxo in its research?
2. Would a national database of clinical trials prevent the problems that Glaxo
had with approval of its Paxil drug?
3. Assuming that new drugs are developed that are tailored to specifc DNA
markers, how would you build an information system to take advantage of
this data? How will you handle the privacy issues?
Additional Reading
Delaney, Emma L., Glaxosmithkline Pharmaceuticals Research And
Development, Interlending & Document Supply, Vol 31(1), 2003.
The Economist, Business: Glaxos Big Challenge, May 15, 2004.
Greenemeier, Larry, Genetic Research Drives High-End Computing,
Information Week, February 18, 2002
Hovey, Hollister, H., J&J Adds Its Support For Idea Of Clinical Trial Registry,
The Wall Street Journal, June 18, 2004.
Lai, Eric, GlaxoSmithKline Deal Highlights Microsofts Overseas Launch of
Hosted Collaboration Software, Computerworld, March 2, 2009.
285 Chapter 4: Database Management
Martinez, Barbara, Spitzer Charges Glaxo Concealed Paxil Data, The Wall
Street Journal, June 3, 2004.
Whalen, Jeanne, Glaxos Garnier Is Taking the Heat, The Wall Street Journal,
July 9, 2007.
Whalen, Jeanne, Glaxo to Pare Ads on U.S. Television, The Wall Street
Journal, January 9, 2009.
Case: Bristol-Myers Squibb
Bristol-Myers Squibb (ticker: BMY) has headquarters in New York City and em-
ploys about 44,000 people worldwide. One of the companys recent innovations
was the development of TAXOL to treat breast cancer. The company was able to
create a synthetic compound that duplicated the original drug derived from the
bark of the Pacifc Yew (an endangered tree). In 2004, Bristol-Myers Squibb was
approved to market the genetically created drug Erbitux in conjunction with Im-
Clone Systems. You might remember the drug as the one that led Martha Stewart
to be found guilty of lying to SEC investigators. Bristol-Myers Squibb also sells
many consumer-level products (www.bristolmyers.com). In 2006, the company
earned $1.6 billion on sales of $17.9 billion. However, 18 percent of sales revenue
came from one drug: Plavix. The patent for Plavix expires in 2008 in Europe and
2011 in the United States (2006 Annual Report).
Research Data
Laboratory equipment today is generally automated. Often, it can be controlled by
computers and most machines generate data that can be collected by computers.
The catch is that machines can generate enormous amounts of data. BMY was
having trouble keeping up with the amount of data generated. The BioAnalytical
Sciences (BAS) group turned to the Scientifc Data Management System (SDMS)
developed by NuGenesis Technologies Corporation. The system collects all in-
coming data and reports and archives them to a central repositorywhich frees
up the hard drives on the local workstations. The data and reports are then avail-
able to other researchers from a secure Web site. The system also provides access
to the binary data, which is needed for compliance with federal laws. The system
enables researchers to tag the raw data by researcher, project, analytical method,
and so on. It collects data from diverse systems and makes the data accessible via
a common interface. The BAS group connects to over 100 instruments in two sites
in New York and New Jersey. The central server also backs up two main servers.
Because the system consolidates historical data, it makes it easy for researchers
to compare current results to older analyses. Data is stored in a secure Oracle
database and marked with time-stamp and audit trail data so everything can be
tracked. In a six-month pilot test, the system generated 5,000 reports. The system
automates most data management tasks, freeing up time by researchers and IT
administrators. More important, it enables greater collaboration because the data
and reports are accessible throughout the company, regardless of the geographic
location or software installed on a specifc machine (DeVincentis 2002).
Knowledge is critical to pharmaceutical researchers. And knowledge is vastly
more complex than simple data. How can a researcher in one location quickly fnd
an expert in another division of the company? How does the research in one area
compare to that by another department? Bristol-Myers Squibb purchased tools
286 Chapter 4: Database Management
from LexiQuest to help solve these types of problems. LexiQuest is a linguistic
search specialist, providing the ability to search based on information instead of
just key words. LexiQuest Guide uses language-recognition technology to search
documents based on everyday language. It semantically analyzes each document
to evaluate its content. The two companies are also building a custom dictionary
and search system to handle the specifc terms used in pharmaceutical research
(Jezzard 2001). In essence, the system reads the documents, enabling it to pro-
vide a more precise match to researcher requests. By providing more accurate and
faster responses, researchers can save considerable time. And time is critical when
you need to bring a new drug to the market.
Business Operations
Pharmaceutical frms are pressured by expiring patents, government attempts to
reduce drug costs, and increased competition. Like any business, they are turning
to information technology to reduce costs and improve the business operations.
Bristol-Myers Squibb is turning to the Web for its purchasing needs. It acquired
Aribas Buyer e-procurement software in 2000, saving over $90 million a year
within the frst year. The system standardizes purchasing methods. Employees
who need to buy something, such as a PC, check the suppliers and options on the
Web site. Then a request for quote (RFQ) is posted on the Ariba network and sup-
pliers bid for the contract. Employees can also use the system to purchase smaller
items directly. The system aggregates the purchases where possible and orders in
bulk. In 2001, as much as 16 percent of sales orders were conducted over the sys-
tem (Yasin 2001).
In 2007, Bristol-Myers Squibb lost an important initial lawsuit. U.S. District
Court Judge Patti B. Saris in Boston ruled that Bristol, AstraZeneca, and Scher-
ing-Plough were guilty of infating average wholesale prices (AWP) for certain
drugs. Some insurers use the AWP to establish reimbursement rates. On the other
hand, Medicare stopped using the list in 2003, largely because of the inaccuracies
that it perceived. Judge Saris wrote that unscrupulously taking advantage of the
fawed AWP systemby establishing secret mega-spreads far beyond the stan-
dard industry markup was unethical and oppressive (Tesoriero and Korn 2007).
In 2008, Bristol faced the many of the same issues as the other pharmaceutical
frmsand is also responded by cutting jobs. It cut 10 percent of its workforce
in 2008 and again in 2009. The goal was to reduce costs by $2.5 billion (Wang
2008).
Questions
1. Can machines replace lab workers and scientists in conducting experiments
and evaluating data? What problems might arise and how would you
minimize the risks?
2. How does Bristol-Myers use information technology to reduce costs
particularly in purchasing?
3. Why is a central research database system so important to Bristol-Myers?
Additional Reading
DeVincentis, John, Performance, Speed Improve With Scaleable SDMS, R&D,
October 2002.
Jezzard, Helen, LexiQuest Aids Drug Co., Information World Review,
287 Chapter 4: Database Management
December 2001
Tesoriero, Heather Won and Melissa Korn, Ruling on Drug Pricing Faults Three
Companies, The Wall Street Journal, June 22, 2007.
Wang, Shirley S., Bristol-Myers Sets More Job Cuts, The Wall Street Journal,
December 16, 2008.
Yasin, Rutrell, E-Procurement is Drug for Bristol-Myers Squibb, InternetWeek,
June 11, 2001.
Case: Pfzer
With almost $68 billion in sales in 2010, Pfzer (ticker: PFE) is the largest of the
pharmaceutical frms (www.pfzer.com). As a research organization, the company
has produced some well-known brands, including prescription drugs such as Ce-
lebrex, Difucan, Lipitor, and Viagra. It also has a big presence in the consumer
market with Benadryl, e.p.t., Listerine, Neosporin, and Rolaids, among others. In
2010, the company had 15 brands generating over $1 billion a year in sales (2010
Annual Report). It has 130 potential drugs in the pipeline (Overby 2002). But, $12
billion of revenue came from Lipitor, the biggest-selling medicine ever produced
by any pharmaceutical company. But Lipitor faced competition from generics in
2010, and the company has had no success in creating another blockbuster drug.
The company had been betting on a new drug torcetripib to boost good cho-
lesterolbut a 15,000-patient study was cancelled when patients developed high
blood pressure and started dying (Simons 2006). Pfzer offcials tried to impress
investors by revealing it had 242 research programs in progress. But it is diffcult
to say that any of the drugs will make it to market or produce the blockbuster rev-
enue Pfzer depends on. Hank McKinnell, the CEO who engineered many of the
mergers that made Pfzer a giant, stated in 2002 that size helps. Chemical sup-
pliers return our calls faster, we can run very large-scale global clinical studies,
and we can try out the newest technologies and implement them rapidly in order
to do things others cant. So, there are real advantages to scale. But the board of
directors ousted McKinnell in 2005 when the promised gains did not appear. Ad-
ditionally, some people are concerned that the big companies are creating fewer
new drugs. Submissions to the FDA fell from an average of 41 per year to 27 per
year, and many of those are created by smaller companies but licensed by the big
four (Simons 2006). The company also created a Web site to enable investors and
potential customers to track drugs in the pipeline (www.pfzer.com/pipeline). The
concept of making this information openly available is a radical change for any
pharmaceutical company.
Pfzer continued its expansion by purchasing Pharmacia Corporation in 2003,
Esperion Therapeutics in 2004, and Vicuron Pharmaceuticals in 2005. Closing off
a co-development agreement with sanovi-aventis, Pfzer purchased the worldwide
rights to Exubera an inhaled insulation therapy. However, Pfzer did sell off its
consumer products division to Johnson & Johnson for $16.6 billion in 2006 (2006
Annual Report). In 2010, Pfzer acquired Wyeth, another large pharmaceutical
frm (2010 Annual Report).
The company faces many of the same problems as the other pharmaceutical
companies. One of the biggest issues is how to integrate data and knowledge
across the companyparticularly when growth came through mergers.
288 Chapter 4: Database Management
Walter Hauck, vice president of worldwide informatics at Pfzer, knew he faced
a huge problem in trying to integrate the many research departments. He needed
to create tools that would support collaboration not only among the scientists but
also among the lawyers and marketers who bring the drugs to market. He began
with an ambitious task: integrate all of the changes at once. At La Jolla Labs in
California, his IT team introduced one new application a week for six months.
The scientists almost rebelled, saying that the sheer number of changes was tak-
ing away time from their research. Hauck heard similar complaints from many
other divisions: It was a lot of change to drop on people while expecting them to
continue to deliver (Overby 2002). With little control over introducing new tools,
some employees were asked to sit through training sessions on the same prod-
uct multiple times. Hauck knew it was time to implement a change management
strategy. One of the keys was to standardize the process by creating a checklist,
making sure that the business units needed the changes and understood the value.
The lists also ensured that the developers captured the feedback and evaluated the
pilot tests accurately.
Pfzer also tried to help employees by creating a new application to enter ex-
pense reports. But, the new system was harder to use than paper forms, help calls
increased, and many people stopped using it. Joseph C. Schmadel Jr., senior di-
rector of business technology, observed that that was an indication to us that
something was wrong. To solve the problem, Pfzer brought in netNumina, Inc.,
a consulting frm, to rethink the user interface. By rebuilding the user screens and
linking them to the back-end reporting system, the system became easier to use
and still collected the necessary data. The system also creates a digital dashboard
that provides summary statistics for executives (Weiss 2004).
Integrating data is critical to a company as large as Pfzer. The company had 14
different fnancial systems and wanted to combine the data into a data warehouse.
The IT group built a data warehouse as a central repository, and then built links
to each of the individual systems. But the IT department quickly encountered a
problem. Each of the systems had different defnitions for the data. It took months
to clean up the data so that it could be combined and managed as a single source.
Danny Siegel, senior manager of business technology, says, We saw that we had
to put in place some rigorous data standards. This kicked off a six-month, totally
non-technical effort to devise a set of standards that allow users to slice and dice
data in whatever context they need it (King 2003).
Vita Cassese, VP of global business technology at Pfzer summarized the chal-
lenges the company faces in trying to reduce costs but still support research. She
said there are two opposing challenges. We need to drive a level of consistency
and standardization to operate effectively while still fostering innovation. She
also noted that the size of the business makes it more challenging to manage IT,
noting in many ways, it demands different approaches to data demand and infor-
mation management. That makes for very big challenges, because we also need
to drive down the costs of managing this information (King 2006). Pfzer has
tackled these challenges by centralizing the primary IT services, including ERP,
the data center, help desk, and networking. But local support is provided by plac-
ing IT staff members into the various divisions around the world. Ms. Cassese
noted that IT still needs to be close to the business and have a deep, deep un-
derstanding of the business, but we also need a deeper level of discipline around
how we deploy technology to control the costs. To reduce costs, the company is
trying to centralize much of the data handling. In 2005, the company initiated a
289 Chapter 4: Database Management
project to consolidate 30 document management systems. The company is also
trying to standardize desktop hardware. The document consolidation program is
also driven by new federal rules that require greater sharing of data on drug trials
and submission of labeling data in XML. Consequently, the system will use XML
to store all of the data, integrating information across divisions in 26 nations.
Because Pfzer has acquired or partnered with many companies since the in-
troduction of computerized database management, the company has a staggering
amount of legacy data. The diffculty is to get the data into a shape where it can
be easily accessed by researchers that span the globe and be nimble enough to be
able to accept new data and new systems as more companies come in via mergers
and acquisitions. In addition, they need to convince scientists that what they have
is not just an archive of past experiments but also a rich resource of information
for future drugs (Derra 2004).
Pfzer, like many other pharmaceutical companies, is pushing to become more
effcient in drug discovery, and is looking to its legacy data as a source of use-
ful information and insights into new drug development. But the sheer number
of legacy systems within even one research facility is overwhelming. Bhooshan
Kelkar, PhD, advisory software engineer at IBM Life Sciences, Dallas, says that
the comments of a colleague speak to the enormity of the issue. He was working
with a big pharmaceutical company last year and reported that they had 500 lega-
cy applications just in their discovery and clinical areaIt was costing them 50%
of their IT budget every year, just in maintenance and reconciliation of different
legacy systems. That is huge. The key to unlock the power of mining legacy sys-
tems will be a combination of robust systems, standard methods, consistent data,
and cultural change from within the drug discovery environment (Derra 2004).
While the task is daunting, it is essential to new drug development to effectively
catalog all the known compounds within Pfzers extensive library in order to rap-
idly develop new pharmaceuticals or delivery methods. Transferring all of the cor-
porations legacy data to a common format is the best possible way for researchers
to have quick access to important older data.
This same need for a universal data standard for collecting, sorting, and pro-
cessing clinical trial data for FDA submission is currently occupying the entire
pharmaceuticals industry. But the data-collection standards have been slow to
catch on. However, in June 2004, a consortium of American pharmaceutical com-
panies debuted a data-interchange standard for electronically submitting drug-ap-
proval applications to the U.S. Food and Drug Administration. This could speed
the entire drug-review process, reducing the time between submission and FDA
approval. The major pharmaceutical companiesincluding Eli Lilly, Merck, Aven-
tis, and Pfzerare the sponsors of the move, under the heading of the Clinical
Data Interchange Standards Consortium (CDISC). Among the standards are a uni-
versal fle structure and submission form, both within XML programming. CDISC
previously developed standards for collecting lab data and clinical-trial data such
as patient information. Those are designed to simplify the collection of clinical-
trial data by pharmaceutical companies and the contract research organizations
such as Quintiles Inc.that drug makers hire to manage clinical trials (Whiting
2004). The FDA will not require CDISC standards for drug-approval applications,
but it has endorsed CDISCs efforts.
In 2007, a Pfzer employee used a company laptop to work at home. She in-
stalled a peer-to-peer fle sharing application on the computer, and inadvertently
made the entire machine a sharing device on the P2P network. The action exposed
290 Chapter 4: Database Management
the personal data of 17,000 Pfzer employees, including Social Security numbers.
Pfzer reported the breach and noted that various outsiders had downloaded data
on about 15,700 employees (Vijayan 2007).
With 86,000 employees, and several thousand scientists in R&D, it can be chal-
lenging to coordinate and share information. So Pfzer customized Imaginatiks
Idea Center tool to enable employees to submit ideas for new products or process
improvements. Rob Spencer, a senior research fellow noted that the tool saved
the company at least $20 million and helped solve hundreds of business problems
(Rosencrance 2010). The goal is to use collective intelligence of the employees
to attack diffcult problems. The ideas or comments from one person can trigger
ideas or solutions by other people.
Pfzer is facing the same cost-cutting challenges as other companies. The ac-
quisition of Wyeth and King help increase total sales, but the company closed
major research facilities in 2010 to achieve a 24 percent reduction in R&D costs.
Pfzers CEO Ian Read noted that This is a fundamental change in culture. We
have to fx this innovative core (Loftus 2011).
Questions
1. Why did Hauck introduce so many new applications at one time? Why was it
such a failure? Could you have predicted that outcome?
2. Why does Pfzer have so many different research systems and why is it so
diffcult to integrate them? What information technology tools might help?
3. How did Pfzer manage to have so many different fnancial systems?
Additional Reading
Derra, Skip Legacy Systems: More than Old Data in the Attic Drug Discovery
and Development, May 1, 2004.
Havenstein, Heather, Rules Prompt Pfzer to Consolidate Content Management
Systems, Computerworld, May 23, 2005.
King, Julia, Business Intelligence: One Version of the Truth, Computerworld,
December 22, 2003.
King, Julia, Pfzer: Striking a Balance, Computerworld, October 30, 2006.
Loftus, Peter, Pfzer to Cut Research, Shift Funding to Buybacks, The Wall
Street Journal, February 1, 2011.
Overby, Stephanie, They Want a New Drug, CIO, October 15, 2002.
Rosencrance, Linda, Tap the Wisdom of Employees -- and Boost the Bottom
Line, Computerworld, February 24, 2010.
Vijayan, Jaikumar, Personal Data on 17,000 Pfzer Employees Exposed,
Computerworld, June 12, 2007.
Weiss, Todd, Pfzer Case Study: Hiding Complex Apps Behind User-Friendly
Interfaces, Computerworld, March 9, 2004.
Whiting, Rick Standards May Speed Approval of New Drugs Information
Week, June 14, 2004.
291 Chapter 4: Database Management
Summary Industry Questions
1. What information technologies have helped this industry?
2. Did the technologies provide a competitive advantage or were they quickly
adopted by rivals?
3. Which technologies could this industry use that were developed in other
sectors?
4. Is the level of competition increasing or decreasing in this industry? Is it
dominated by a few frms, or are they fairly balanced?
5. What problems have been created from the use of information technology
and how did the frms solve the problems?
2
Part
Business Integration
How do you protect data? How do you process transactions and
what problems will arise? How do you integrate data across the
organization and with suppliers and customers, including across
the Internet? What tools are used to support teamwork?
Protecting computers and data today is no longer the job of
just the security director. Because of the network-based threats, it
is everyones responsibility to be aware of potential problems and
maintain good computing habits.
A hundred years ago, most businesses were tiny. As frms be-
came larger, owners needed a way to manage and control the
huge number of employees. Managers needed assistance with
hundreds of daily operational decisions. Information technol-
ogy provides the means to both share and protect data. It is relied
on today to collect transaction data. Firms, even large ones, are
increasingly creating enterprise systems that store fnancial and
transaction data in a common central formatmaking it available
to managers throughout the company.
The Internet offers new ways to extend companies into rela-
tionships with suppliers and customers. As a manager, you need
to use information technology to reduce costs, create new sales
opportunities, and organize the company.
Teamwork is increasingly important to managersparticular-
ly in service organizations. Many tools have evolved to support
groups of people working on documents and projects.
Chapter 5: Computer Security
Chapter 6: Transactions and Entreprise Resource Planning
Chapter 7: Electronic Business
Chapter 8: Teamwork
How are information systems used to integrate business data
and support teams?
293
What You Will Learn in This Chapter
How do you protect your information resources?
What are the primary threats to an information system?
What are the primary security threats faced by individuals?
What primary options are used to provide computer security?
How do you protect data when unknown people might be able to fnd it or intercept it?
What additional benefts can be provided by encryption?
What non-computer-based tools can be used to provide additional security?
How do you prove the allegations in a computer crime?
What special security problems arise in e-commerce?
If you have to track everyones computer use to improve security, what happens to
privacy?
Chapter Outline
Computer Security
5
Chapter
Introduction, 294
Threats to Information, 295
Disasters, 297
Employees and Consultants, 299
Business Partnerships, 301
Outsiders, 302
USB Drives, 303
Threats to Users, 303
Virus/Trojan Horse , 304
Phishing: Fake Web Sites, 306
Updates and Patches, 307
Intercepted Data, 308
Computer Security Controls, 310
User Identifcation, 311
Access Control, 313
Administrator Access Rights, 314
Single Sign-On and Lack of Standards,
314
Encryption, 315
Single Key, 316
Public Key Infrastructure, 318
Additional Security Measures, 322
Audits, 322
Physical Access, 323
Monitoring, 323
Hiring and Employee Evaluation, 325
Computer Forensics, 325
E-Commerce and Cloud Computing
Security Issues, 326
Theft of Data from Servers, 327
Firewalls, 328
Intrusion Detection and Prevention, 329
Denial of Service, 330
Privacy, 332
Summary, 333
Key Words, 334
Web Site References, 334
Review Questions, 334
Exercises, 335
Additional Reading, 337
Cases: Professional Sports, 339
294 Chapter 5: Computer Security
National Football League
Introduction
How do you protect your information resources? What are the ma-
jor threats? Figure 5.1 presents some of the issues: outside hackers, people inter-
cepting data, attacks on the server, physical threats to the equipment (including
natural disasters such as foods and fre), and internal threats from employees, as
well as privacy issues such as abuse of personal data. Think about the problem
for a second: Who stole more money in 2010 (or almost any other year): teenage
hackers or CEOs? Computer security has to prepare for both of these threats and
others.
Security is a challenging problem for any business. It has become even more
diffcult with computing devices and data used everywhere in the company, on the
Web, and around the world. Many companies rely on part-time and contract work-
ers and need to give them access to data to complete their tasks. Monitoring tools
are needed to watch for security and privacy issues. Advances in encryption and
biometrics have provided powerful tools, but security ultimately comes down to
people. If a worker is careless with passwords, or a programmer makes a mistake,
or a network engineer falls behind on updates, or an auditor fails to test an ac-
count, holes are created that can be exploited by a thief or miscreant.
On the other hand, organizations can go overboard with security rules. Com-
puter security is a balanceyou must protect the data but still enable workers
to do their jobs. The challenge is that IT security workers often see their jobs as
identifying potential problems and preventing them from occurring. If an attacker
steals data, the security staff is likely to be blamed, but if security is so tight that
workers need to create workarounds to do their jobs, management might never see
the problem, much less blame the security staff. So there is an incentive to try and
security as tight as possibleeven if it interferes with jobs.
Encryption plays an important role in protecting systems. It can also be used to
authenticate the sender of a message. A key aspect of security and encryption is
How do you keep data secure? Any professional football team has dozens of coaches
and playerswhether it is American football or European soccer, the characteristics
are similar. Teams win through cooperationthat means everyone needs to share in-
formation. Coaches create playbooks, players provide feedback, and scouts identify
weaknesses in opposing teams. All of this information has to be sharedso teams
increasingly put the data onto computers. But securing this data is critical. Imagine
the problems that arise if an opposing team gets a copy of the latest player health
reports and new plays. Yet there are dozens of players and coaches, most of whom
are not computer experts (to put it politely, since you really do not want to insult a
300-pound linebacker). Plus, coaches and players are sometimes replaced or switch
teams.
Teams increasingly have to offer more data to fans. Some stadiums are now of-
fering wireless networks. But security again becomes critical. How do you keep the
fans from accidentally interfering with the coaching networks? What other threats
can you think of? Hundreds of things can go wrong with technology, and someone
has to be responsible for protecting the systems and creating contingency plans to
handle problems.
295 Chapter 5: Computer Security
the need to identify users. Consequently, the fip side of many security policies is
the loss of privacy.
The Internet, e-commerce, and cloud computing add some challenging aspects
to security. E-commerce requires that portions of the computer systems be avail-
able to consumers and other businesses. Greater business benefts are generated
when Web sites are integrated with corporate datasuch as inventory levels so
customers can determine if an item is in stock. Yet, allowing public access to these
systems creates greater security risks. Furthermore, since the Internet is a shared
public network, data needs to be protected in transmissionto ensure it is not in-
tercepted or altered. Wireless networks are even more open to eavesdropping and
interception. Because of the public nature of the Internet, even a well-protected
system can be brought down with denial-of-service attacks.
Tightening security can easily lead to a loss of privacy. One way to improve
security is to completely identify every person and every activity performed. But
even completely honest people are not willing to give up that much privacy. So,
security faces another trade-off. These trade-offs are important, but they make the
job harder for the corporate security expert.
Treats to Information
What are the primary threats to an information system? Infor-
mation threats are often described in two categories: Physical and logical. Some
people add a third category: Behavioral. Physical threats are things that go wrong
with the hardware and buildingsparticularly fres, foods, earthquakes, and
hurricanes. Logical security refers to the ability to defne and control access to
Trends
Security has been an issue for thousands of years, from the simple substitu-
tion ciphers of Caesar to the importance of codes and code breaking in World
War II. As more data was moved to computers, several complications arose.
One of the biggest obstacles has been the need to identify people. Passwords
have been the most common method, but they cause many problems. Newer
technologies are available, but they require standards and people will have
to agree to use them. Since security requires identifying people, increased
emphasis on security can result in a reduction in privacy. Firms have col-
lected data on consumers for years, but only recently have technologies ad-
vanced to the point where it is relatively inexpensive and easy to collect and
analyze data on millions of consumers. Despite Hollywoods portrayals, the
greatest security threats come from insiders. On the other hand, it used to be
diffcult to attack servers, and required programmers with a deep knowledge
of the system. Today, with millions of computers connected to the Internet,
it is relatively easy for beginners to download code from a site and run au-
tomated attacks against known bugs in operating systems. This technique
is commonly used for creating denial-of-service attacks on Web sites. As
e-commerce expands in importance, it becomes increasingly critical to de-
velop a more robust Internet protocol that can identify and stop denial-of-
service attacks. Many security tools exist to protect servers and to encrypt
data transmissions, but it is diffcult to stop denial-of-service attacks that
rely on fooding the server.
296 Chapter 5: Computer Security
data. Behavioral security refers to specifc problems related to people. You might
have strong physical and logical security, but employees who write their pass-
words on notes stuck to their computer, or give out private information over the
phone can quickly defeat any security system.
Many potential threats exist to information systems and the data they hold. The
complicated aspect is that the biggest information threat is from legitimate us-
ers and developers. Purely by accident, a user might enter incorrect data or de-
lete important information. A designer might misunderstand an important function
and the system will produce erroneous results. An innocent programming mistake
could result in incorrect or destroyed data. Minor changes to a frail system could
result in a cascading failure of the entire system.
You can detect and prevent some of these problems through careful design,
testing, training, and backup provisions. However, modern information systems
are extremely complex. You cannot guarantee they will work correctly all of the
time. Plus, the world poses physical threats that cannot be avoided: hurricanes,
earthquakes, fres, and so on. Often, the best you can do is build contingency plans
that enable the company to recover as quickly as possible. The most important
aspect of any disaster plan is to maintain adequate backup copies. With careful
planning, organization, and enough money, frms are able to provide virtually con-
tinuous information system support.
A second set of problems arises from the fact that as technology changes, so do
criminals. Today, only a desperate person would rob a bank with a gun. The prob-
ability of being caught is high, and the amount of money stolen is low. Do not take
it as an invitation to become a thief, but the computer offers much easier ways to
steal larger amounts of money.
Figure 5.1
Security and privacy are important issues in the Internet era. People can intercept
data, attack servers directly and indirectly, and companies routinely monitor all
transactions.
Server Attacks
+ Physical Dangers
Data interception
+ external attackers
The Internet
Monitoring/
Spyware
Internal + Privacy
297 Chapter 5: Computer Security
The threats mentioned in Figure 5.2 provide a useful way to organize some of
the concepts of computer security. In particular, the physical threats need to be
separated from the logical or data attacks.
Disasters
Fortunately, fres, foods, hurricanes, and other physical disasters do not hap-
pen too often. But when a disaster does hit a companys data center, it could de-
stroy the company. Without advance preparations, the loss of a data center could
shut down the operations. How long can a company survive without transaction
processing?
Today, there are many ways to plan for and recover from disasters. Figure 5.3
shows a traditional method of using scheduled backups and a disaster recovery
services provider. When computer servers are expensive, it makes sense to con-
tract with a company to provide a facility and possibly spare computers. One lev-
el of support, called a hot site, consists of a fully confgured computer center.
Specifc computer equipment is already installed and ready for immediate use.
When the MIS staff declares a disaster, they install the backup tapes on the hot-
site computers and use telecommunication lines to run the day-to-day operations.
Another alternative is to contract for a cold site, which provides fully functional
computer room space, without the computer equipment. If a disaster occurs, either
the company or the disaster recovery services provider can arrange for the neces-
Figure 5.2
Threats to information. By far, the most serious threats are from insiders: employees,
mistakes, consultants, and partnerships. Businesses have to trust insiders to stay in
operation, but you need to put limits on the access to data. It is possible for outsiders
to break into most computer systems, but it is fairly diffcult. Viruses are a serious
threat both to data and security in general.
Employees & Consultants
Links to
business
partners
Outside
hackers
Virus hiding
in e-mail or
Web site.
298 Chapter 5: Computer Security
sary equipment to be shipped to the cold site. However, there might be a delay of
several days before the new data center will be operational, so a cold site is often
used in conjunction with a hot-site contract.
The problem with the traditional approach is that companies can no longer af-
ford to run without computer supporteven for a few hours. Fortunately, comput-
er prices have also declined while network transfer speeds have increased. Con-
sequently, it is possible for many companies to provide continuous backupboth
in terms of data and processing capabilities. Figure 5.4 shows the basic concepts.
Server clusters are created in separate locations and connected by a network. Each
server contains redundancy in terms of multiple processors, disk drives, network
connections, and even power supplies. If one component in the server dies, the
others pick up the load instantly. Data is often stored on a network-attached stor-
age area network, with its own duplication of drives and RAID confguration.
Finally, in case a fre, food, or network outage knocks out the entire facility, a
second facility hosts another server cluster. Data from one site is continuously
replicated to the second site. User applications are connected by a network so if
one site goes down, everything shifts automatically to the backup site.
Large frms might build or lease their own remote sites with multiple server
clusters. But even small companies can gain many of the same advantages are
relatively low cost by using cloud computing. Large service providers on the
cloud, such as Amazons EC3, automatically provide servers in multiple locations.
Companies can lease almost any level of computing which is handled off site by
Amazon.
Figure 5.3
Disaster planning. 1. You have to back up your data. 2. You can contract with a
disaster facility to have a site ready. 3. Create a detailed plan to move your MIS
people and restore the system. 4. If a disaster strikes, shift the business network to the
temporary facility. 5. Rebuild the original data center.
Business/Operations
Network
Backup/Safe storage Recovery Facility
MIS Employees
299 Chapter 5: Computer Security
Employees and Consultants
Employees are the heart of any company. Companies function and succeed by
trusting their employees. Although almost all employees are honest and diligent,
there is always the chance that one employee will use the companys knowledge,
experience, and trust to misappropriate resources.
It can be diffcult to identify people who might cause damage to the frm.
Many companies today use psychological tests, background checks, and random
drug tests to indicate potential problems. Most companies are wary of employees
whose employment has been terminated. Businesses follow specifc steps when
employees leave, being particularly careful to remove the employees access to
company computers.
A more complicated problem arises with MIS employees. Programmers and
analysts have to be trusted. Without them, there would be no software. However,
it is generally best if the programmers are not the users of the program. Com-
panies enforce a separation of duties among staff programmers and users. Think
about what might happen if a bank teller was also responsible for writing the com-
puter program used by tellers. It would be easy to use the computer to steal money
from different accounts. Auditing transaction-processing systems is an important
task for auditors.
Unscrupulous programmers have also been known to include time bombs
in their software. Whenever the software runs, it checks a hidden fle for a se-
cret word. If the programmer leaves the company, the secret word does not get
changed. When the program does not fnd the correct word, it starts deleting fles.
On large projects, these bombs can be impossible to spot (until they go off). Keep-
Figure 5.4
Continuous backup. Duplicate servers are installed at different locations and
connected across a networkoften the Internet. The servers themselves also have
built-in redundancy. Data is written to multiple drives and multiple locations. If one
site fails completely, the other site can instantly pick up the load.
Server cluster
with built-in
redundancy
Storage area
network with
redundancy
and RAID
Off-site or cloud
computing
processing and data
Users connect
to the servers
Use both sites
continuously or switch
DNS entries to transfer
users in a disaster.
Secure Internet
connection
300 Chapter 5: Computer Security
ing good backups can usually minimize the damage. As a related side note, the
software industry is pushing states to adopt a new set of laws (UCITA) that makes
it legal to include a shutdown time bomb if a software company has a dispute with
a business that uses its software.
Another danger area is that programmers might include a trap door or secret
password that allows them to gain access to the software even if they leave the
company. Sometimes these trap doors are installed innocently, to enable program-
mers to make corrections faster. The important point is to make sure they are re-
moved when the system is permanently installed.
An interesting twist on passwords arose in 2008 when Terry Childs, the system
administrator for the San Francisco network refused to give up the administrative
username and password. Apparently the department suffered from management
and personality differences and he argued that no one else was qualifed to be
an administrator on the network. After sitting in a jail cell for 12 days he gave
the login credentials to the mayor. Later, he was convicted of interfering with a
network and sentenced to 4 years in prison. Ignoring the personality issues, the
case does point out the necessity of providing backup access to administrative ac-
counts. What would happen in a large organization if a network administrator died
in an accident?
An interesting class of threats to securing your data arises from negligence in-
stead of deliberate actions by the users. For instance, employees might acciden-
tally delete data. Or carrying disks, tapes, or even laptop computers past magnetic
felds can sometimes damage the fles. In these cases, the best bet is to have back-
ups readily available. More complicated problems arise when laptop computers
are lost or even stolen. In addition to the data stored on the machines, the fles
often hold passwords for corporate computers. Many laptops provide passwords
and encrypt the data to minimize these problems. One other problem that falls into
this category is a warning to be careful about how you dispose of old tapes, disks,
and computer equipment. Businesses run similar risks when they send computer
equipment out for repairs.
In general, the best way to minimize problems from employees stems from typ-
ical management techniques. Hire workers carefully, treat employees fairly, have
separation of jobs, use teamwork, and maintain constant checks on their work.
Consultants present the same potential problems as employees. However, consul-
Reality Bytes: Hacking is Easy When You Tell Everyone the Answers
In a well-publicized case, attacker David Kernell broke into Sarah Palins Yahoo
e-mail accountlargely by scouring the data that she publicly listed on various ser-
vices. In 2010, George Bronk was arrested for using a similar technique to break
into more than 3,200 e-mail accounts of women. He searched the victims Facebook
accounts for answers to security questions typically used to recover forgotten pass-
words at online sites. Once he was able to obtain the password, he changed the pass-
word, searched for nude photos and posted them on the victims Facebook pages. He
was charged in Sacramento Superior Court and faced six years in prison.
Adapted from Robert McMillan, Nude Photos Stolen from Womens e-Mail Ac-
counts, Computerworld, January 13, 2011.
301 Chapter 5: Computer Security
tants tend to be hired for a short time, so the frm knows even less about them than
about regular employees. Consultants are generally used for specialized jobs, so
there may not be any internal employees who can adequately monitor their work.
Business Partnerships
As computers spread throughout every aspect of business, many companies share
their data. For example, General Motors asks its suppliers to provide all infor-
mation electronically. This electronic data interchange (EDI) means that business
information is processed faster and with fewer errors. The problem is that in many
cases, it means GM gives other companies considerable access to GMs comput-
ers and vice versa. For instance, if GM is thinking about increasing production,
the managers might want to check supplier production schedules to make sure the
suppliers could provide enough parts. To do it electronically, GM needs access
to the suppliers computers. To participate in business today, you must trust your
partners. However, you have limited ability to evaluate all of their employees.
The issue of partnerships becomes more important in an Internet world of soft-
ware and cloud computing. Application service providers (ASPs) on the cloud,
such as NetSuite or Salesforce.com, run software on their Web servers and you
store data on their sitesusing only browsers to access the data and applications.
Cloud computing has advantages such as: (1) experts set up and run the site so
you do not have to hire specialists, (2) storing the data on the Web means it is ac-
cessible to your employees wherever they have Web access, and (3) you can start
small and scale up to a reasonable size without hassles. From a security perspec-
tive, a potential drawback is that all of your fnancial data is stored on a site run
by someone else. Of course, the reputation of the ASP depends on protecting your
data and maintaining security, so it is probably safer than what a small business
could handle independently; however, you should still investigate the ASP secu-
rity procedures.
Attachment
01 23 05 06 77 03
3A 7F 3C 5D 83 94
19 2C 2E A2 87 62
02 8E FA EA 12 79
54 29 3F 4F 73 9F
1
2 3
From: afriend
To: victim
Message: Open
the attachment
for some
excitement.
Virus code
1. User opens an attached program that
contains hidden virus.
2. Virus copies itself into other programs on the
computer.
3. Virus spreads until a certain date, then it
deletes les.
Figure 5.5
Virus activity. Once a virus is loaded on your machine, you will need an antivirus
software package to remove the virus. Several versions are available at low cost. A
virus can come from any software that supports executable code. Attachments sent
through e-mail are currently the most common method of being infected.
302 Chapter 5: Computer Security
Outsiders
There is some threat from outsiders who might dial up your computer and guess
a password. Using some common sense can minimize most of these threats. For
example, in the 1980s, some groups gained access to computers because the op-
erators never changed the default password that was shipped with the computer!
The Internet causes additional problems because it was designed to give other
people access to your machines. The key lies in providing people with just the
level of access they need. The biggest problems today arise from a group labeled
script kiddies, who download system scanning/attack software from the Internet
and randomly search computers for holes. Another major problem with passwords
is a technique hackers call social engineering. A hacker calls up a victim (you),
tells some story, and convinces you to reveal your password. Never give your
password to anyone.
In theory, modern computer security systems are effective and can prevent
most outside attacks. The problem is that operating systems are complex software
programs that have errors. Experts search these systems to fnd the errors, and
ultimately, the vendor fxes the errors. However, this process can result in dozens
of patches a year. Some businesses do not keep up with the patches, and some
patches interfere with other programs and are not applied. Consequently, there
can be thousands of systems connected to the Internet that suffer from published
faws. Software downloaded from the Internet can automatically search for these
faws and provide access even to inexperienced hackers. One key to protecting
your servers is to make sure they have all the current operating system patches.
Figure 5.6
Spyware. Software loaded into your computer captures keystrokes, websites you
visit, or other personal information. It transfers the data to a website run by a
company or hacker who steals your money. The problem is particularly dangerous on
public computers that are used by several people.
Capture
keystrokes
hacker
Password
Credit card
Accounts
303 Chapter 5: Computer Security
USB Drives
USB or fash drives are a useful technology for transferring fles. But, that also
makes them a prime target for carrying viruses and Trojans. Reports indicate that
USB drives were a main vector for spreading the Stuxnet virus that appeared to be
targeted to specifc industrial machines, such as those used by Irans nuclear pro-
cessing. But, even simpler viruses, Trojans, and key-stroke loggers can be spread
with USB drives. USB drives are physically small but can contain huge amounts
of data or complex malware. Some organizations (including at times the U.S. mil-
itary) have banned them, but they are now everywhereincluding cameras and
cell phonesso they are diffcult to stop. Some software tools exist that can turn
off USB ports in computers, or monitor them to prevent anyone from inserting
USB drives.
On the fip side, USB drives can be used to improve computer security in some
situations. In particular, if you need to use a shared or public computer, it is likely
that the computer is already infected with any number of viruses or key-stroke
loggers. If you only need to use the system to browse a few open Web sites, the
risks are minimal. But public computers are risky when you need to connect to
fnancial accounts. (Student labs might be a problem, but many schools are care-
ful to monitor and remove common viruses.) USB drives have the ability to solve
problem of infected public computers. You can install an entire operating system
onto a USB drive along with software and a Web browser. Then if you need to use
a public computer, you can reboot from the USB drive and run a system that you
know is clean. You are only using the computers processor and RAM, not its in-
fected software. However, you should double-check the keyboard cable to ensure
no one installed a physical device on the line to capture keystrokes. Of course, you
need the operating system and licenses to install the software onto the USB drive.
Treats to Users
What are the primary security threats faced by individuals?
Business face threats to data and servers, but they also face threats to user comput-
ers. Individuals face similar threats to their personal computers. Overall, the main
Reality Bytes: You Would Expect TSA to Understand Security
James Duchak was employed as a contractor at the Colorado Springs Operations
Center of the U.S. Transportation Security Administration. He was a data analyst
for about fve years and updated the TSA servers with data pulled from the terror-
ist screening database and the U.S. Marshals Service Warrant Information Network.
He learned in 2010 that he was being let go, and was training his replacement. His
replacement noticed that Duchak deleted code that was used to format the birth dates
for people entered into the system. In October 2010, Duchak, 47, pleaded guilty to
the charges and was sentenced to two years in prison, $60,000 in restitution, and
three years of supervised release. The restitution claim is interesting because the
code should have been backed up and date formatting code is usually fairly easy to
write.
Adapted from Robert McMillan, Former TSA Contractor Gets Two Years for Dam-
aging Data, Computerworld, January 12, 2011.
304 Chapter 5: Computer Security
threat is that an attacker can take over the computergaining administrator ac-
cess to see all of the data and use the computer for any task. Several bad outcomes
can arise from this threat. Your data and passwords can be stolenresulting in
someone impersonating you and stealing your money or trashing your reputation.
By monitoring your use of the computer, the hijacker can steal credit card and
bank account data. The attacker could also turn your machine into a zombie that is
used to attack other computers. Or, it could be used to commit crimesthat would
then be traced back and blamed on you.
Several methods are used to attack individual users. Some of them are diffcult
to detect and hard to prevent. All of them require users to be cautious and pay at-
tention to their computers. Can you see the problem? Many people treat comput-
ers as simple machines that handle basic tasks and never need attention. Software
and operating system vendors (notably Microsoft) have attempted to automate
many of the maintenance tasks to ensure they get handled properly to protect user
computers. But, from the perspective of society, it is not possible to protect all
computers.
Virus/Trojan Horse
Everyone should know the ancient story of the Trojan Horse, where Greek sol-
diers hid inside a giant wooden horse which was then brought into the walls of
the city of Troyleading to the destruction and downfall of the city. In comput-
ing terms, a program or complex data fle might contain a special section of code
designed to take over your computer. When you run the program, the hidden code
executes with your permissions and can take over your computer. A computer vi-
rus is a special Trojan Horse that frst copies itself into other programs, and then
tries to spread every time those programs are run. One complication is that many
applications support macro programming languages, such as Microsofts Visual
Basic for Applications, where code is stored and executed within data fles or Web
pages. These programming languages provide powerful features to integrate ap-
plications but they provide even more opportunities for nasty code to sneak onto
your computer.
As shown in Figure 5.5, the virus code can be diffcult to spot. A virus can be
picked up from many sources, but e-mail attachments are the prevalent method
today. The obvious solution would seem to be the same as for the original Trojan
Horse: Look inside the program to see if soldiers are hiding there. Of course, a
person would never be able to look through the hundreds of thousands of fles
and programs on a computer by hand. Instead, antivirus software is used to scan
your computer by looking through every single fle. But the second complication
is that it is diffcult to recognize a virus. The most common approach is to keep a
signature list of all known viruses and check every line in every fle against every
possible known virus.
Viruses and Trojan Horses remain a threat despite the use of antivirus software.
The reasons are clear when you understand how the antivirus software works.
For the most part, the software works on existing, known viruses. Anything new
or anything that modifes itself can sneak through. Additionally, with the huge
number of fles and the growing number of known viruses, the antivirus software
can take a substantial amount of processing timewhich can slow down your
computer. The software can also make it diffcult to install, update, or create new
software. Many commercial software packages even recommend disabling the
antivirus software before attempting to install anything. Consequently, antivirus
305 Chapter 5: Computer Security
software can help clean fles once a virus is identifed, but it has not proven very
useful in stopping attacksparticularly since new viruses are created every day.
Today, it is easy to create a virussimply fnd a virus software kit on the Web,
make a few changes, and send it to someone. You would need only minimal tech-
nical skills. Of course, it is illegal to create and release viruses and other destruc-
tive software (in most nations).
Instead, the best way to stop a virus is to avoid running software acquired from
the Internet and to never open script attachments sent to you by e-maileven if
they appear to come from a friend. Be cautious, because some attachments that
appear to be pictures are actually virus scripts. Most e-mail services now have
flters that can block script attachments, but they tend to be heavy-handed and also
block useful fles.
Ultimately, the most important step with viruses is to make certain that you al-
ways have current backup fles. Then, if a virus deletes your fles, you can recover
the data, run an antivirus software package, and remove the virus. It will cost you
time, but at least you will save the data.
The problem with viruses and Trojan Horses is that they often install spy-
wareor software that sits on your computer and monitors all of your activity. It
can capture your keystrokes and record Web sites visited, passwords entered, and
credit card numbers. As shown in Figure 5.6, periodically, the spyware software
sends the information to a Web site where it is collected by an attacker.
Viruses, worms (essentially viruses that do not destroy data), Trojan horses,
and spyware are often called malware, because they are designed to do bad (mal)
things to your computer system. Spyware tools are particularly dangerous on pub-
lic computerssuch as those at Internet cafs, print shops, or libraries. Someone
could install the software and capture all of your keystrokes and passwords. You
should avoid entering passwords and credit card data on computers that are shared
with the public. Microsoft Windows includes software that scans your machine
Reality Bytes: Brute Force Password Attacks Using Amazon
Brute force attacks on passwords have always been a possibilitywhere a computer
tests every possible combination of letters and numbers to fnd a password. But, with
reasonable passwords, brute force attacks historically would take many years to fnd.
The obvious solution is to split the task across multiple computers. Still, an attacker
would have to fnd a way to get access to thousands of computers. With cloud com-
puting, anyone can buy cloud computing time, such as that from Amazons Elas-
tic Compute Cloud (EC2) service. In 2010, Thomas Roth, a security consultant in
Cologne, Germany, used a cluster of Nvidia graphics processors through Amazon
to test 400,000 possible passwords per second. He used the system to break into a
wireless network in 20 minutes at a cost of 28 cents per minute. With some improve-
ments, he says he can break wireless passwords in 6 minutes. Roth noted that "The
speed of computers is increasing incredibly fast, and so brute forcing will get faster
and faster, and the new cloud offerings make parallelization of such use tasks easy
and affordable,"
Adapted from Stuart J. Johnston, Researcher Breaks Wi-Fi Passwords Using Cloud
Computing Power, eSecurity Planet, January 12, 2011.
306 Chapter 5: Computer Security
for some known, dangerous spyware. You can also use the Windows Task Man-
ager to show you what processes are currently running on your computer. If you
recognize a malware tool, you can stop the process to shut it down. But you have
to be careful, because a standard computer runs many processes. You need to de-
cipher the cryptic names of the processes to understand which ones are good and
which ones are bad. It is usually best to use a spyware toolwhich contains a list
of the known malware tools.
Phishing: Fake Web Sites
Attackers often want to gain access to your computer or at least your credit card
and bank account numbers. One attack method is phishing for passwords. As a
side note, news writers have been converting words beginning with f to ph
ever since the 1970s episodes of phone phreakingwhere hackers used various
methods to make free phone calls. Figure 5.7 shows one basic method of phish-
ing. An attacker sends mass e-mails pretending to be from a big-name bank. A
certain percentage of users will click the link in the e-mail which takes them to a
fake Web site that looks like the bank site but is actually run by the attackers. If
you do not recognize the fake and enter your username and password, the attack-
ers can quickly turn around and log into the real bank site using your credentials.
From there, they can transfer all of your money to their own accounts. Hundreds
of variations exist.
If you are always alert and moderately paranoid, you can avoid becoming prey
to a phishing attack. Avoid clicking links sent by e-mail. Always double-check the
URL of a site that asks for a login. Verify that the security certifcate exists and is
assigned to the bank. But, some fsh are not as smart as others, or you might be
tired one night and not pay attention and take the bait.
Figure 5.7
Phishing. A fake e-mail contains a link to a fake bank Web site. You inadvertently
click the link and enter your username and password. The attackers running the site
can now log into the real bank and steal your money.
Bank account
is overdrawn.
Please click
here to log in.
E-mail
Really good fake of
your banks Web site.
Username
Password
Sent to hacker
who steals your
money.
307 Chapter 5: Computer Security
Banks have implemented some security features to make it easier for customers
to recognize the real bank site versus fake sites. Figure 5.8 shows the basic pro-
cess of a two-step login. Initially, customers select an image or enter a phrase that
is associated with the username. These values are stored on the banks server and
would not be accessible to an attacker. During subsequent logins, the customer
frst enters the username or ID value for the account. The real bank site retrieves
the matching image or phrase. When the customer recognizes the proper display,
it is safe to enter the password. Of course, you should never use the same phrase
or image for multiple sites. So, customers have to remember one more thing to
log in. It is relatively easy for any business to implement a similar scheme, but it
ultimately makes it more diffcult for people to use the systems. And it raises the
question of how far a company should go to protect customers from their own ac-
tions. Browsers have tried to implement warnings for known phishing sites, but
sites can still get past the warnings. Ultimately, it comes down to people paying
enough attention to avoid fake sites.
Updates and Patches
In the past couple of years, one of the favored methods of attacking your com-
puter has been to exploit faws in the operating system and software running on
your computer. Software that was created with sloppy programming practices can
create holes for outsiders to exploit. Many of the problems are caused by buffer
overruns, where the program allocates a limited amount of memory for data and
an attacker enters a carefully crafted entry that takes up more space than allocated.
This extra data then overwrites the program code and your computer executes the
attackers code. Microsoft, Apple, and other software vendors have been work-
ing hard to fnd and fx these errors. Periodically, these vendors release patches to
their software, which you need to load and install on your computer. The good
news is that the companies are actively fxing the problems. The bad news is that
every time they announce a problem, the attackers also learn of the issues. You
need to immediately patch your computer before the attackers take advantage of
the faw.
Figure 5.8
Two-step login. Customers enter an image or phrase at the real bank site. In future
logins, the username is entered frst, which retrieves the matching image or phrase.
If the customers recognize the image, it is safe to enter the password. Fake/phishing
sites would not have the correct image or phrase.
Username
Real bank site
URL
Security indicators
Image or phrase you
created earlier
Password:
Password
308 Chapter 5: Computer Security
Figure 5.9 shows a basic time line. A vendor or security researcher fnds a prob-
lem and reports it to the software developer. The developer fxes the problem and
releases a patch. Patches are released with varying levels of importance. Critical
faws that could allow an attacker to take over your machine are given the highest
priorityparticularly if the attack has already been seen in the wild or outside
of a lab setting. You need to install these updates as soon as possible, and most
computers should be set to automatically download and install critical updates
when they are released.
This threat is magnifed because attackers put scripts on the Internet that auto-
matically scan for unprotected machines. These scripts make it possible for people
with almost no computer skills to attack your system. Of course, there is still a
risk that attackers can fnd faws before software vendors fnd and patch them.
These zero-day attacks could happen at any time, but they require considerably
more work by the attackers and are likely to be aimed at specifc targets. Still,
you truly need to keep your system up to date to stop the known attacks. Many of
these attacks are based on browsers and add-in software such as Java and Flash.
Intercepted Data
The Web and online content and services continue to be an increasing part of in-
formation systems and even daily life. Mobility and wireless connections are also
gaining importance. Both of these trends lead to a potentially serious problem:
Wireless data is relatively easy to intercept. Any device connected to the same
network has the ability to monitor any packet sent on the network. The device is
supposed to ignore packets not addressed to it, but it is relatively easy to tell it to
capture all packets on the network.
Figure 5.9
Zero-day attack. Attackers exploit a known bug or fnd their own and launch e-mails
or even Web sites that can attack your computer. Because the bug has not yet been
patched, it is easy for many computers to become infected.
time
Researchers
find bug
Vendor
announces
patch
Hacker attacks your
computer when you go
to a Web site
You should
update
immediately
Zero-day attack.
Hacker finds bug/hole first.
Everyone is vulnerable.
309 Chapter 5: Computer Security
In late October 2010, Eric Butler released an add-on for the Firefox Web
browser called Firesheep that makes it incredible easy for anyone to monitor
WiFi traffc and hijack sessions from other users. Note, it is illegal to use an-
others computer accountno matter how easy it is to do. Figure 5.10 shows the
basic process. A user signs into a Web service and the username and password are
usually encrypted. The server generates a cookie and sends it to the userso the
user identity is maintained for the session without requiring a new login for every
page. This cookie and subsequent activities are often unencrypted. The eavesdrop-
per can grab the session cookie and hijack the sessionmaking any changes to
the users account or Web contents.
Wireless transmissions are relatively open and broadcast over an area. The only
way to protect the traffc is to encrypt everything. Web servers and browsers are
designed to encrypt traffc, but most Web site designers tended to limit encryption
to just the username and password pages. The feeling was that encryption slowed
down the server, the browser, and the data transmissions. In the early days of the
Web, these delays were measurable; so designers got in the habit of encrypting
only what they felt were essential items. With faster computers and networks,
sites will now be forced to encrypt all transmissions.
But, as a user of Web services, can you do anything while waiting for sites
to turn on full encryption? You could simply avoid using any important services
while connected to public wireless networks. Browsing Web sites to read the news
is certainly not going to matter to anyone. Logging into a social network or e-mail
site runs the risk of giving access to an eavesdropperand with Firesheep, that
eavesdropper could be anyone. The only other option is to sign up for a service
that provides a virtual private network (VPN). A VPN establishes an encrypted
Figure 5.10
Intercept WiFi connections. Often, only the username and password are encrypted for
many sites. But the session cookie that maintains the login is often unencrypted and it
can be capturedallowing an eavesdropped to hijack the session and make changes
as the user.
Initial page, encryption keys
Username/password
(encrypted)
Cookie/identifier
(Not encrypted)
Session and additional pages
not encrypted. With
unencrypted cookie/identifier.
User
Server
Intercepted
Eavesdropper
hacker
Hijacked
session
310 Chapter 5: Computer Security
network from your computer (laptop) to the VPN server. No one can intercept the
traffc between those two points. Companies often set up VPN services so workers
can securely connect from home into the company network and operate as if they
were on site. Several commercial companies provide VPN services to individuals
for a monthly fee. If possible, you should test the VPN services before signing
onto a long-term contract. You want to ensure that the company has fast and reli-
able connections and servers that are available whenever you need them. It takes
several steps to install a VPN and it might interfere with some applications.
Computer Security Controls
What primary options are used to provide computer security?
Transaction and accounting data is clearly valuable to a company and needs to
be protected. Computer security systems need to protect against three general
problems: (1) unauthorized disclosure of information, (2) unauthorized modifca-
tion, and (3) unauthorized withholding of information. These three problems are
sometimes referred to as: confdentiality, integrity, and accessibility, leading to the
too-cute acronym CIA. As an example of the frst problem, you would not want
Reality Bytes: Rogue IT Employees
Fortunately, most IT employees are extremely honest. They need to be honest be-
cause they have access to most of the company operations. But, that does not mean
you should just ignore employees. Ronald Reagans famous saying when negotiat-
ing a nuclear-arms reduction treaty with the Soviet Union seems to apply to many
situations: Trust but verify. In a different situation involving a Fortune 500 com-
pany, a rogue IT employee had lost 11 laptops over three years. A fag that should
have raised questions earlier. Anyway, in 2008, a retailer in Pennsylvania had to hire
a security consultant to investigate a problem after the Business Software Alliance
(BSA) reported that the company might be using pirated software. The investigation
found that the software was illegal, and that it was sold to the retailer by a com-
pany secretly owned and operated by one of its own IT employees. More digging
found that the seven-year employee had been running a for-pay pornography site
on the companys servers and that he had stolen 400 customer credit-card numbers
from the retailers Web site. And he was the only person who had the administrative
passwords. The U.S. Secret Service and CERT provide a whitepaper that lists basic
steps you can take to reduce threats from insiders. (http://www.cert.org/archive/pdf/
CSG-V3.pdf) To recover the systems, the company sent the rogue employee on a
long overnight fight to California, then used the fve hours to reset every possible
password and lock him out of the systems. When the fight landed, the COO met
him at the airport and fred him on the spot. Although a background check might not
have prevented the hiring of the rogue employee, it probably would have spotted is
lie about having an MBA degree. Other people have suggested that his personality
should have indicated some problems. One of the investigators said that He was
extremely confdent, cocky and very dismissive of other people. Most good IT em-
ployees realize it is impossible to know everything, are willing to consult with other
experts, and are helpful to employees.
Adapted from Tam Harbert, Security Fail: When Trusted IT People Go Bad, Com-
puterworld, January 18, 2011.
311 Chapter 5: Computer Security
hackers to get access to your customers credit card data. An example of the sec-
ond problem would be employees modifying their payroll records to change their
pay rates. The third problem is less obvious, but just as important. Imagine what
would happen if you needed to look at the latest inventory to decide how much
to reorder, but the computer refused to give you access. This problem is often re-
ferred to as denial of service (DoS) and is a diffcult problem faced by Web sites.
User Identifcation
One of the primary diffculties with providing computer security lies in identify-
ing the user. For years, the most common means of identifying computer users
is through usernames and passwordsbecause this method is easy to program.
The programmers simply set up a database of users that contain a username and
password. No standards are needed and every system can be independent. More
recently, interest in biometrics has been increasing; particularly the fngerprint
readers installed on laptops; but the lack of standards has prevented widespread
adoption of these technologies.
Passwords
Each user is given an account name and a password that are known only to the
computer and the user. If someone correctly enters both the name and the pass-
word, the computer assumes it must be the user. This method is cheap, fast, and
does not require too much effort by the user. However, there are problems. The
biggest diffculty is that users are afraid of forgetting their password, so they
choose words that are easy to remember. Unfortunately, passwords that are easy
to remember tend to be obvious to other people. For instance, never use the words
password or secret as a password. Similarly, do not use the names of relatives,
pets, or celebrities. Most of these can be obtained by looking in a phone book,
talking to someone you know, or browsing your Facebook page.. In fact, you
should not use any actual words. Most people use only a few thousand words in
typical conversation. The goal is to make it hard for someone to guess the pass-
word. You need to choose passwords from the largest possible set of characters
and numbers. Two other rules about passwords: Change them often and do not use
the same password for everything. Most systems have a method to enable you to
change passwords. Some systems force users to change passwords on a regular
basis, such as every 30 or 60 days.
One drawback to passwords is that you need too many of them. Everything
from ATM cards to phone calls to computer accounts uses passwords or personal
identifcation numbers (PINs). It is too risky to use the same password for every
account, but it is diffcult to remember several different passwords, especially if
you choose random letters and numbers and change them often. With so many
passwords, it is tempting to write them down, which defeats their purpose. This
confict is the main reason a new system is needed to identify users.
Passwords are not a perfect solution to identifying users. No matter how well
they are chosen or how often they are changed, there is always a chance that
someone could guess the password. Companies are moving to two-factor au-
thentication, where users need a password and a second method of identifcation.
Password generators described in the next section are sometimes used as the sec-
ond method. .
312 Chapter 5: Computer Security
Password Generators
Password generators are small electronic cards that generate new passwords every
minute. The same system is embedded on the main computer. When you want to
log in, you simply enter the number on the card that you are carrying. Since the
password is changed every minute, you do not have to worry about anyone guess-
ing it or intercepting it. On the other hand, you have to carry around the card. You
also have to enter a password when you log in to safeguard against loss or theft of
the card. However, the password does not have to be changed constantly because
the risks are lower. Banks and government agencies have been leading adopters of
this technology for providing secure access by employees. The cards are relatively
inexpensive, easy to confgure, and can be revoked if they are lost or an employee
leaves. The technology could become even more useful if it could be integrated
into your cell phone. You cannot ask people to carry around dozens of security
cards, so it makes more sense to integrate the security into a device they already
carry. At this point in time, no one has built software to perform this task, but it
would be relatively straightforward.
Biometrics
Biometrics is a feld of study that attempts to identify people based on biological
characteristics. The most promising devices are fngerprint and handprint readers.
As shown in Figure 5.11, there are even devices that recognize the pattern of your
iris (the colored ring surrounding the pupil of your eye). These systems work with
a simple camera that can be installed cheaply. They are being tested now for iden-
tifcation at airports and in ATMs. The Canadian government is building a large-
scale system to handle customs check-in for returning Canadian citizens.
As costs decline, the biggest drawback to biometric security devices is a lack
of standards. You can use a fngerprint scanner to log into Windows, and the Win-
dows ID can be used to get access to in-house systems. However, the biometric
Figure 5.11
Biometric devices. Several methods exist to identify a person based on biological
characteristics. Common techniques include fngerprint, handprint readers, and
retinal scanners. The iris scanner is a relatively useful technology since it requires
only a camera and is noninvasive.
313 Chapter 5: Computer Security
data is not used beyond the single computer, and there are no standards for trans-
ferring the data securely to other servers.
Biometric security devices have some important advantages. The user does not
have to remember anything or carry keys around. They are reasonably accurate
and diffcult to fool by an unauthorized person. But the industry still needs stan-
dards so that the security information can be transferred securely and validated by
the fnal server.
Some of the worrisome issues of biometrics have held back its adoption. Many
people are concerned about privacythe perceived ability of governments to
track people if biometrics become widely adopted. Another concern is that to use
biometrics, you must frst register your information (fngerprint or iris scan) and
have that data stored within the system. People worry that if someone steals this
data, the thief could use it to impersonate anyone. The assumption is that it is easy
to change passwords if they are stolen, but diffcult to change your fngerprints.
The fallacy to this argument is that the biometric data is never stored in raw form.
Instead, a one-way hash is used that converts the raw data into a new, encrypted
set of digital data. It is impossible to retrieve the raw data from the stored set. By
using unique encoders each time the data is scanned, such as time stamps and
fuzzy adjusters, it is possible to prevent these replay attacks, where an attacker
captures data as it is entered and uses it on a different system or at a later time.
Access Control
As long as the computer can identify each user, you can control access to any
piece of data. As manager of the marketing department, you could allow other
managers to read the sales data but not change it. Similarly, as shown in Figure
5.12, the accounting department could allow managers to see the accounts pay-
Figure 5.12
Access control. In Windows, right-click the folder or fle to set its properties. Under
the Security tab, you can set permissions to any person or group.
314 Chapter 5: Computer Security
able data, but only the accounting department would be able to modify the data
and write new checks. With a good security system, it is possible for the human
resources manager to allow employees to look up work phone numbers in the cor-
porate database but not to see salaries or other confdential information.
The common access controls available are read, write or modify, execute, and
delete. With these security features, the owner of the information can give other
users exactly the type of access they need. Windows and other operating systems
support additional permissions for folders, so you can control exactly which fles
people can see, whether they can change permissions, or even deny specifc tasks
to individuals.
As a creator of data, it is your responsibility to set the appropriate access per-
missions. Today, most of your fles will be shared through a Web site. You can set
aside different directories for each group of users and assign permissions to each
directory. To avoid accidents, you generally do not give anyone delete permis-
sions. Your main choice is which users should be able to read the data, and which
ones need to be able to change it. Of course, if multiple people have permission to
change a document, you should set the document to track changes so you can see
who made each change.
Administrator Access Rights
Virus, Spyware, and Phishing attacks present diffcult problems in terms of secu-
rity. These attack methods take over the permissions of the user. If you (the user)
have high permissions, the attacking software can gain total control over your
machine. One of the most common tricks is to install software on your computer
that provides back-door access to an attacker. Because the attacking software has
your permissions, you would generally not even know the software was installed.
In early versions of personal computer operating systems, users were often made
Administrators on the computergiving you complete control over all features
of the computer. This permission was generally needed to install new software
and new hardware devices. However, it also gives attacking software total control
over the computer. In most cases, users should not be included in the Administra-
tors group. Microsoft Vista, and Windows 7 go a step further and ask you to verify
the installation of new software. This approach was frst proposed in 1987 (Post
1987), and is designed to notify you if an attacker is trying to install software or
alter your machine. It can be a nuisance when you frst confgure a computer, but
in daily use, the warning notices rarely appear. If they do, you should think care-
fully about whether you want to allow the software to alter your computer.
Single Sign-On and Lack of Standards
Figure 5.13 shows one partial solution to the large number of passwords is to use
a single sign-on method. At least within a company, a central server handles all of
the login tasks. For example, Microsofts Active Directory uses a server based on
Kerberos to authenticate users. This information is then provided to other serv-
ers throughout the company. Users log in once and the security server provides
authentication to all of the authorized servers. At this point in time, it is not used
for access to Internet sites.
It some ways, it would be nice if this feature could extend to Web sites across
the Internet. Once you have logged into your machine, it could authenticate you to
other computers on the Internet. This way, you would need only one password
or perhaps even a biometric scanner attached to your laptop. At this point in time,
315 Chapter 5: Computer Security
the world is not even close to this solution. The problem: lack of standards. Few
standards exist for collecting, storing, or sharing authentication data. Even if you
buy a fngerprint reader for your laptop or cell phone, it cannot be used to verify
your identity to external Web sites. So far, almost no work has been done on de-
veloping standards to support this level of authentication. The lack of standards is
less important within a single company. Within a company, the MIS department
has the authority to create and defne its own standards, which gives it the ability
to purchase and create software so that it can all be integrated. But, it will likely
be several years before everyone sits down and agrees to the standards needed to
share authentication information across the Internet.
Several vendors provide short-term solutions to manage passwords. Several
store your Internet passwords in a fle and then provide them to the server when
you log in. Most browsers have a similar type of password caching mechanism.
A couple of vendors provide USB drive-based solutions that work the same way.
Passwords are cached in an encrypted fle on the thumb drive and software deliv-
ers it to the Web site when you want to log in. Of course, if you lose the USB
drive, you will lose your login information, so you need to be careful.
Encryption
How do you protect data when unknown people might be able
to fnd it or intercept it? What additional benefts can be pro-
vided by encryption? Encryption is the foundation of many aspects of secu-
rity. For example, encryption protects messages sent across the Internet and pro-
tects fles stored on servers. Cryptography has been around for thousands of years,
but computers have radically altered the types of codes available. One important
Figure 5.13
Single sign-on. A security server handles the initial login authentication. Any other
servers or devices verify the user identifcation through a token that was issued by the
security server.
User
login
Security Server
Kerberos
RADIUS
Request
access
Web server Database
Request
access
validate
validate
316 Chapter 5: Computer Security
feature to remember in terms of cryptography and computers is the concept of
brute force attacks. If a hacker knows the algorithm method used to encrypt a
message, it might be conceivable to have a computer test every possible key to
decode the message. The essence of stopping a brute force attack is to have a
key that is so long that it would take millions of years to try every combination.
The problem is that computers get faster every year. So encryption technologies
that were secure 20 years ago can be broken in hours today. Also recognize that a
process that takes a million years could be completed in one year using a million
computers. And, today, it is possible to fnd a million computers to use.
Encryption should be seriously considered for any communications that are
sent between computers. Without encryption, it is relatively easy for unauthorized
people to deliberately or accidentally read or change the messages. Encryption
is available with many personal computer software packages. Almost all spread-
sheets and word processors permit you to encrypt your fle when you save it. To
read it back, you have to enter the correct password. You also can fnd encryption
packages on the Internet that will protect your e-mail messages.
Single Key
For many years, single-key encryption codes were the only systems available.
Figure 5.14 shows the basic steps required to encrypt and decrypt a message with
a single-key system. Both the sender and receiver have the software that handles
the encryption and decryption. Both people also need to have the same key, which
is the diffcult part. How do you deliver a secret key to someone? And if you can
deliver a secret key, you might as well send the message the same way.
On the other hand, single-key systems are fast. They can encrypt or decrypt a
message with almost no delay. Since the late 1970s, most of the business world
standardized on the Data Encryption Standard (DES). However, this system only
supported keys of 56 bits, and by 2000, messages encrypted with DES were bro-
ken in under 24 hours by brute force attacks in various contests. Triple DES was
popular for a whileessentially encrypting the message three times. But in 2001,
the U.S. government chose a new method known as the Advanced Encryption
Standard (AES) because it is fast and users have a choice of a key length of 128,
192, or 256 bits. Keep in mind that longer keys make the message more secure
(harder to break by brute force) but increase the time it takes to encrypt and de-
crypt the message.
Figure 5.14
Single key encryption. Both the person who encrypts the message and the person
who decrypts it use the same key. The systems are fast, but it is diffcult to safely
distribute the key.
Key: 9837362 Key: 9837362
AES AES
Single key
Plain text
message
Plain text
message
Encrypted
text
Encrypted
text
317 Chapter 5: Computer Security
Technology Toolbox: Encryption
Problem: You need to send a fle to someone without it being read by anyone else.
Tools: or single key encryption you can use Offce and protect the fle with a pass-
word. Dual-key encryption requires buying and installing certifcates. You can also
use BitLocker or other commercial programs to encrypt an entire drive or USB drive.
The easiest way to secure a data fle is to encrypt it by adding a password. With Of-
fce 2010, once the document has been created, use the menu: File/Info tab/Protect
Document /Encrypt with Password (in the Permissions section). You will be prompt-
ed to enter a password and then enter it again to ensure you typed it correctly. The
fle is encrypted with AES when it is saved and the password is required to open and
decrypt it. You can then e-mail the fle to someone and not worry about it being in-
tercepted. However, you must still fnd a way to tell the recipient the password. Ob-
viously, you cannot send it by e-mail. A phone call would be better but not perfect.
That is the heart of the problem with single-key encryption.
It is possible to purchase and install digital security certifcates to automatically
encrypt e-mail. After the certifcates are installed, and the e-mail client (Outlook) is
confgured, e-mail and attachments can be encrypted by checking a single box. The
problem is that everyone participating has to obtain and install security certifcates
and exchange public keys with everyone else. And the certifcates usually expire
after a year, so everyone has to repeat the process each year. The detailed steps are
explained on Web sites that sell the personal security certifcates.
A related issue is the need to encrypt an entire driveeither the main disk drive
on a computer or a USB drive. Laptops and USB drives are particularly danger-
ousevery week, thousands of people lose both of these items. Laptops might seem
secureyou need a password to log inbut it is relatively easy to remove the hard
drive, put it in a case and read the entire drive by plugging the case into another com-
puter. Several encryption programs can be purchased to encrypt the entire disk drive
(or volume). Windows 7 (Ultimate and Enterprise) comes with the BitLocker Drive
Encryption program. Other systems require you to purchase a commercial program.
BitLocker is installed by opening the Control Panel and selecting the BitLocker
Drive Encryption option. It works best if the computer has a Trusted Platform Mod-
ule (TPM) chip, which is often installed in business-level laptops (especially Leno-
vo). The software requires additional confguration if the computer does not have a
TPMcheck the Internet for details. Basically, the encryption keys can be stored on
a USB drive which must be inserted to startup the computer. The TPM is easier and
safer because it stores the key on a hardware chip in the computer. BitLocker is also
useful for encrypting USB drives, where a password is required to unlock the drive.
In a corporate environment that uses Active Directory and Group Policies, the
BitLocker encryption keys can be stored centrally. The policies can even require that
USB drives use BitLocker encryption or the system will be blocked from writing to
them.
Quick Quiz:
1. 1. Why would a business want to use encryption?
2. When would it be useful to set up dual-key encryption for e-mail?
3. In a typical company, which drives should use drive-level encryption?
318 Chapter 5: Computer Security
Encryption is useful for almost any type of data that you need to protect. For
example, you can save a Word document or Excel with a password, which en-
crypts the document with AES. If you want anyone else to open the document, you
will have to provide the password. However, be sure to remember the password.
Without it, you cannot retrieve any of the data. A few companies sell software that
attempts to crack the Microsoft Offce passwords. The process takes a long time
if you use long, complex passwords, but keep in mind that these passwords might
not be foolproof.
A second common use of encryption is useful for laptops. Windows (and other
programs) include the ability to encrypt the entire hard drive. Without encryption,
it is possible to remove the disk drive and connect it to another computerwhich
will be able to read all of the data on the drive. With encryption, the drive is tied
to the specifc computer, and the data cannot be read without logging into the
specifc drive. Since laptops are commonly lost or stolen, this level of encryption
provides a useful method to protect the data from theft. The integration with Win-
dows makes it relatively easy to install. On the other hand, encryption makes it
more complicated to upgrade hard drives.
Public Key Infrastructure
Public key infrastructure (PKI) is a substantial leap in encryption technology. The
method arose from a military-political question. Given a U.S. embassy in the mid-
dle of a foreign nation that can intercept all communications, how can a secret
message be transmitted out of the embassy when there is no way to exchange a
secret key? The answer was found by two mathematicians (Diffe and Hellman),
and later refned into a system (and company) named after three other mathemati-
cians (RSA: Rivest, Shamir, and Adleman). The solution is to create an encryption
system that uses two keys: a public key and a private key.
Reality Bytes: Don't be an Idiot
Despite the repeated press reports (and fake actions in Hollywood movies), com-
puter security systems have improved considerably over the past few years. But, a
weak link exists in every system: the component between the chair and the keyboard
(you). It is easy to break into a system or steal money if you give away your pass-
wordor download and run software that gives control to hackers. In a 2010 scam,
criminals called thousands of people and ran a basic scam. They claimed to provide
free security checks and used a variety of social engineering scams to get pass-
words and account information. Microsoft paid for a survey of 7,000 computer users
in the U.K., Ireland, the U.S., and Canada. In total, 15 percent of the respondents
had received a phone call from the scammers. In Ireland, the rate was as high as 26
percent. Of those who had received the call, a whopping 22 percent followed the
instructions and gave the scammers access to their computers. The victims lost $875
on average (but only $82 in Ireland). Perhaps they will consider it an educational fee.
When a random person calls and asks for passwords, accounts, to run software or go
to a specifc Web site; just hang up the phone.
Adapted from Nathan Eddy, Microsoft Survey Reveals Extent of Emerging Internet
Phone Scam, eWeek, June 17, 2011.
319 Chapter 5: Computer Security
Dual Key Encryption
The essence of a dual-key system is that it takes both keys to encrypt and decrypt
a message. Whichever key is used to encrypt the message, the other key must be
used to decrypt it. Figure 5.15 illustrates the process. The beauty of the system is
that anyone can be given your public keyin fact, this key can be published in
a directory. Then, whenever someone wants to send you a secure message, he or
she simply uses the RSA algorithm and your public key. At that point, the mes-
sage is gibberish and can only be decrypted using your super-secret private key.
No one can read or alter the message. However, someone could destroy it before
it reaches you.
Todays Web browsers use this method to encrypt credit card transmissions.
The Web server sends your browser a public key. The browser encrypts the con-
tent and sends it across the Internet. Only the Web server can decrypt the con-
tentsusing the private key. A similar system called Pretty Good Privacy (PGP)
is available on the Internet to encrypt e-mail messages.
The one drawback to dual-key encryption systems is that they tend to be
slowparticularly for long messages. One common solution is to use dual-key
encryption to establish the identity of the parties and to exchange a one-time se-
cret key to be used for the rest of the transmissions. The single-key system is fast
and protects the transmitted data, and the initial dual-key system makes it possible
to distribute the secret key without anyone stealing it.
Authentication
A second aspect of dual keys has even more uses. PKI can be used for authenti-
cation. Consider the case where Bob works for a bank, and she receives a mes-
sage that claims to be from Alice, and it says to pay you $1 million. How does
Figure 5.15
Dual-key encryption. Alice sends a message that only Bob can read. With a dual-key
system, one key encrypts the message, the other decrypts it. Once Bobs public key is
applied to the message, only Alices private key will retrieve the message. Keys are
usually very large prime numbers.
Alice
Bob
Message
Public Keys
Alice 29
Bob 17
Message
Encrypted
Private Key
13
Private Key
37
Use
Bobs
Public key
Use
Bobs
Private key
320 Chapter 5: Computer Security
Bob know that the message is authentic and not forged by you? Consider the case
where Alice want to pay you some money (but only $100).
Figure 5.16 shows the answer. To make sure that only Bob can read the mes-
sage (and that no one else can modify it), Alice encrypts it with her public key. To
ensure that the message is authentic, Alice also encrypts it with her private key.
Remember that the keys always work in pairs. When Bob receives the message,
she uses Alices public key and her private key to decrypt it. If the message is de-
crypted correctly, then it was not modifed in transit, and it could only have come
from Alice. This process is used to create digital signatures. In 2000, the federal
government passed a law declaring digital signatures to carry the same legal au-
thority as a traditional signature for legal purposes.
Certifcate Authorities
The proper name for dual-key encryption is public key infrastructure (PKI). Why
is the word infrastructure so important? Think about how a hacker might attack
the system in Figure 5.16. What if Alice did not know much about technology and
encryption? So, posing as Alice, you create a private key and publish the public
key in a directory under Alices name. Then you send your e-mail message to the
bank pretending to be Alice, using her public key and asking the bank to pay
you $1 million. The message decrypts fne, and Bob believes the message is legiti-
mate. Similar problems can arise by impersonating the bank.
To make the PKI system work, it is critical that the directory of public keys
accurately represent the people indicated. So, some organization needs to be in
charge of the public directory, and people who wish to use it need to verify their
identity before registering a public key. At the moment, several commercial com-
panies operate as certifcateauthorities and sell digital encryption certifcates to
anyone. Almost no oversight or regulation exists in the industry. At one level, the
browser developers (Microsoft) control which companies get listed as trusted root
providers in the browser, but there is no governmental regulation. The U.S. mili-
Figure 5.16
Dual-key encryption for message authentication. Alice sends a message to Bob at
the bank. Using her private key ensures that the message must have come from her.
Using Bobs public key prevents anyone else from reading or changing the message.
Alice
Bob
Public Keys
Alice 29
Bob 17
Private Key
13
Private Key
37
Message
Message
Encrypt+B Encrypt+A
Transmission
Use
Alices
Private key Use
Alices
Public key
Use
Bobs
Public key
Use
Bobs
Private key
Encrypt+B+A
321 Chapter 5: Computer Security
tary (and probably others) does run its own certifcate servers but those are used
only within the military networks.
These public companies, including Verisign and GoDaddy sell digitalcertif-
cates that verify the identity of the person and generate the public/private key
pairs. Companies and individuals can purchase these certifcates, and you are sup-
posed to verify your identity before receiving the certifcate. However, in 2001,
Verisign announced that it accidentally issued a digital certifcate to an imposter
who claimed to be from Microsoft. Eventually Verisign caught the mistake and
invalidated the certifcate, but the incident points out that the process is far from
foolproof. The troubling point is that for the PKI system to work, the certifcates
and keys must be controlled by a trusted organization.
A handful of public CA frms exist todayleading to some competition in
price, but there is still no oversight. In fact, you can easily install a server and
generate your own security certifcates. These certifcates are useful for your own
employees. Companies can install them on employee computers and use the cer-
tifcate to identify a user instead of relying on passwords. Generating your own
certifcates reduces your costs. However, they are not useful for e-commerce, be-
cause your company will not be recognized by the customers browser. You can
look at your Web browser options to see the list of Trusted Root Certifcation
Authorities. This list represents CAs that are automatically recognized by your
browser. A certifcate issued by anyone else creates a warning message.
Encryption is used in many areas in computer security, but it is not the only
factor in security. It is important to protect data during transmission, and it is use-
ful to encrypt sensitive data on disk drives. But, decryption keys need to be stored
someplace, so attackers often target those storage locations. So, the security threat
simply shifts to a different level. Any security system needs to incorporate mul-
tiple levels of protection. Encryption is one level of security that is designed to
solve specifc problems.
Encryption also presents issues to societywhich are covered in more detail
in Chapter 14. For now, note that encryption is available to everyone: individu-
als, businesses, criminals, spies, and terrorists. Consequently, many government
Reality Bytes: Microsoft gets Binged
Just to show that insider theft can happen in any company, Microsoft sued a former
Bing toolbar promotions director for allegedly stealing $460,000 from the company
and trying to walk away with another $1.5 million. Microsoft claims that Robert
D. Curry set up a fake company (Blu Games) and submitted fake invoices for ser-
vices it never performed. Microsoft claimed that Curry created false documents and
even forged his managers signature. As promotions director, his job was to convince
companies to encourage people to download the Bing toolbar to increase the use of
the Bing search engine. Microsoft spotted the problem only after Curry convinced
the fnance department to increase the amount of funds for the project to $3.7 mil-
lion. He was then going to transfer the $1.5 million to his company through a legiti-
mate vendor (Pentad). But, the size of the transaction apparently caught the eye of
internal auditors.
Adapted from Gregg Keizer, Microsoft Claims Employee Stole $460,000 from the
Company, Computerworld, January 27, 2011.
322 Chapter 5: Computer Security
agencies want methods to decrypt messages. The U.S. government has proposed
several encryption methods that contain back-door keys that would allow agents
to decrypt messages easily.
Additional Security Measures
What non-computer-based tools can be used to provide addi-
tional security? A fundamental issue in computer security is that logical
controls are never enough to protect the computer. For example, anyone who has
physical access to the computer can either circumvent the security controls or de-
stroy the data. Besides, many employees have extended access to the data and
applications. To be safe, you need to implement some standard business policies.
You also need to train users periodically to warn them about new attacks and re-
mind them to never give their passwords to anyone else.
Audits
Accountants have long known that to maintain security over data, it is necessary
to perform audits. There are too many ways for unscrupulous people to make
changes to stored information. Audits are used to locate mistakes and to prevent
fraud. Existing criminology practice states that in many cases, the threat of getting
caught (by an audit) will convince most people to be more careful and to avoid
fraudulent behavior. The same principles extend to security audits. By monitor-
ing computer activity, auditing fnancial records, and periodically checking to see
whether everyone is obeying security regulations, users are encouraged to follow
the security guidelines of the company.
Of course, audits cost money and they interfere with the daily operations of the
frm. As a result, it is important to schedule audits carefully and to keep an eye
on the costs as well as the potential benefts. Several professional organizations
(such as the EDP Auditors Association) can help security employees learn
more about the latest technologies and teach them what to look for in audits. The
Reality Bytes: Hacker Arrests
The hacker group Anonymous obtained huge publicity during the WikiLeaks
discussions of late 2010. The group encouraged people to download its software so
their computers could be used to attack business and governmental sites. In mid-
2011, the Spanish police arrested three individuals claimed to be senior members
of the Anonymous group within Spain. A computer found at the home of one of the
individuals was alleged to have been used to launch attacks against many Web sites.
Anonymous responded by initiating a denial of service attack against Spanish police
computers, and denying that the three arrested were part of the group; or that Anony-
mous was even a group. Earlier, Dutch police arrested two teenagers in December
2010; and the UK police arrest fve males in early 2011. In the U.S. the FBI searched
homes of several alleged members of Anonymous, but no arrests were made. Turkish
police arrested 32 people in early June 2011. In early June 2011, NATO declared that
Anonymous and similar groups were a threat to international security.
Adapted from Cassell Bryan-Low, Spain Arrests Three in Hacker Crackdown, The
Wall Street Journal, June 10, 2011; and Ben Rooney, Turkey Arrests 32 in Hacker
Swoop, The Wall Street Journal, June 13, 2011.
323 Chapter 5: Computer Security
American Institute of Certifed Public Accountants (AICPA) also pro-
vides standards and audit guidelines that are useful at combating fraud.
Physical Access
Because it is so diffcult to provide logical security to a computer, other mecha-
nisms have been developed. Many of them rely on controlling physical access to
the computer. For instance, computers and terminals should be kept in controlled
areas. They must certainly be kept away from visitors and delivery people. Many
types of locks and keys can be used to protect terminals and personal computers.
Similarly, all documents should be controlled. Paper copies of important reports
should be shredded. All fnancial data is routinely audited by both internal and
external auditors. Sometimes hidden control data is used to make sure procedures
are followed.
Monitoring
Another effective security provision is to monitor access to all of the data. Most
computers can track every change to every fle. They can keep a log of who ac-
cesses each fle. They track every time someone incorrectly enters a password. An
audit trail of every fle change can be provided to management. That means it is
possible to fnd out who changed the salary data, what time it was changed, and
from which terminal.
Remember that every device connected to the Internet is given a unique number
as an address. Every Web site that you visit can track this number. In some cases,
you can only be identifed down to the company you work for, but in many situ-
ations, companies can monitor exactly what each machine is doing at any time.
Additional software can be installed on computers to provide even more detail
including storing all keystrokes.
Reality Bytes: Find the Weakest Point
A common problem in security is that you can strongly protect one point, only to
lose because the system is vulnerable at a different location. Security certifcates are
strong protection for transmitting data on the Internet. The encrypted traffc is ex-
tremely diffcult to break. But, in 2011, someone, possibly in Iran, was able to obtain
server security certifcates from Comodo in the names of Google, Microsoft, Skype,
and Yahoo. Melih Abdulhayoglu, the CEO and founder of security company Co-
modo noted that One of the origins of the attack that we experienced is from Iran.
What is being obtained would enable the perpetrator to intercept Web-based email/
communication and the only way this could be done is if the perpetrator had access
to the countrys DNS infrastructure (and we believe it might be the case here). For-
tunately, Comodo identifed the attack and revoked the bogus certifcates. Browser
vendors (Google, Microsoft, and Mozilla) quickly followed by tagging the certif-
cates as invalid within their browsers. The ability to withdraw and fag certifcates
is an important Web security feature. But it still requires that certifcate authorities
identify problems and react quickly.
Adapted from Gregg Keizer, Firm Points Finger at Iran for SSL Certifcate Theft,
Computerworld, March 23, 2011.
324 Chapter 5: Computer Security
Technology Toolbox: Assigning Security Permissions
Problem: You need to share some fles with members of the marketing department.
Tools: Windows has the ability to set detailed security permissions on folders and
fles.
In a student lab, you might not
have permissions to create fold-
ers and set fle permissions. Some
versions of Vista might not support
detailed security options. Browse
to a location where you want to
put a shared folder. Create the new
folder.
In a business setting, the users
and groups have probably already
been created by the network ad-
ministrator. If you need to cre-
ate groups and users, use the Start
menu/All Programs/Administrative
Tools/Computer Management. If
you do not see the administrative
tools, you need to enable it by set-
ting the properties of the main task-
bar, or use Start: compmgmt.msc /s. Right-click the Users icon and select New User.
Make up a username and password for a user. Repeat this until you have three sam-
ple users. (If the users are already defned on the network, you can skip this step.)
Right-click the Groups icon and select New Group. Name it Marketing and provide
a description. Click the Add button and enter the usernames of the three users you
just created.
Return to your folder and right-click the folder icon and select the Sharing and
Security option. Click the option to share the folder and name it Marketing. Click the
Permissions button and Remove the Everyone group. Add the new Marketing group
and assign Read permission. Click the Apply button, then click the Security tab.
Click the Add button and enter the Marketing group so they have read access. Click
the Add button and enter the name of one of the users. Give this person Modify (and
Write) permissions. This user will be able to read and change fles stored in this
folderthe others will only be able to read them. Log on as one of the new users and
testing the fle permissions. Note, if you are familiar with command-line commands
(DOS), you can use the runas command without logging off. When you are fnished,
remove the Marketing group and users using the Computer Management tool.
Quick Quiz:
1. Why is it important to defne groups of users?
2. Why is it important to delete this test group and users when you are fnished?
325 Chapter 5: Computer Security
Hiring and Employee Evaluation
Because insiders raise the greatest security issues, it makes sense to be careful
when you hire employees. Employers should always check candidates referenc-
es. In more extreme situations, employers can check employee backgrounds for
criminal records. There are several instances of disgruntled employees causing se-
curity problems. In many cases, the best security solution is to establish close re-
lationships with your employees and encourage teamwork. Employees who work
closely together can defuse potential problems and informally monitor the work
of other employees. Figure 5.17 notes that several Web sites will search public re-
cords to perform basic background checks for small businesses. Validating social
security numbers is an important step for many U.S. businesses.
Computer Forensics
How do you prove the allegations in a computer crime? Some-
times, stopping computer attacks is not good enough. You want to catch the crooks
or attackers and have them charged with the appropriate crime. The problem is
that you have to be extremely careful when you collect evidence that will be used
in a criminal case. In particular, the investigator has to be able to guarantee the au-
thenticity of the evidence from the moment it is collected to when it is presented
in court. This process can be tricky with digital evidence. It is not a task for ama-
teurs. You have to bring in a professional investigator to handle the evidence cor-
rectly. Of course, few police departments have people trained in computer crime,
and they are probably busy chasing murderers and drug dealers.
Figure 5.17
Employee background checks are important. For a fee, several websites help small
businesses perform basic background checks to verify SSNs and check public
criminal records.
Audits
Monitoring
Background checks:
http://www.lexisnexis.com/risk
(bought ChoicePoint)
http://www.knowx.com/
(also lexis nexis)
http://www.casebreakers.com/
http://www.publicdata.com/
326 Chapter 5: Computer Security
Some private companies help with investigations, but make sure you contact
your lawyers and the prosecuting attorneys early in the process. Several techni-
cal companies exist to help examine computer evidence, such as recovering data
from hard drives and decrypting fles. Throughout the entire process, you have to
keep good records. Most actions have to be logged; and be sure to record the date,
time, and people involved. Also, remember that computer logs and backup tapes
often get recycled after a certain time, so be sure to maintain secure copies. Figure
5.18 shows some of the capabilities of commercially available forensic hardware
and software. Typically, a drive is cloned with a special device to prevent data
from being altered on the original drive. Copies of the cloned drive are then cre-
ated and used for searching. Special software recovers deleted fles and performs
keyword searches. Photos are often important and are organized by the software.
Some software can highlight time sequences based on fle dates, computer logs,
and the browser history. Increasingly, the challenge lies in the vast amount of data
stored on computers. Computerized searches are required to cover the amount of
data, but a human investigator is needed to identify keywords and look through
potential matches. Even if the computer can fnd photo and movie fles, the com-
puter is not very good at fnding objects or classifying images in photos or video.
The task of examining computer fles is time consuming and highly detailed. But,
several job openings are available for specialists trained in computer forensics.
E-Commerce and Cloud Computing Security Issues
What special security problems arise in e-commerce? E-commerce
and cloud computing use the same security technologies available to any busi-
ness. However, some aspects of online businesses are more sensitive and require
more careful security planning. These issues are highlighted in this section, with
Figure 5.18
Computer forensics. Careful steps must be followed to protect the integrity of the
evidence and the chain back to the alleged criminal. Once the data is copied, special
software is used to recover deleted fles and search for keywords, images, and
activity sequences. A human investigator is still needed to interpret the results and
direct the search.
Original
drive
Exact
copy
Write blocker:
Physically prevent
data from being
altered on the
original drive.
Software:
Verify copy.
Tag/identify files.
Scan for key words.
Recover deleted files.
Identify photos.
Attempt to decrypt files.
Time sequence
Browser history
File activity
Logs
327 Chapter 5: Computer Security
a discussion of the common solutions. The earlier sections already covered the
issues of data transmission and the importance of encryption. Most Web sites use
dual-key encryption through a system known as secure sockets layer (SSL). On-
line Web services should use SSL for all communications. Servers also need to be
protected against direct attacks. One layer of protection is provided by segmenting
the network holding the servers using frewalls. Additionally, intrusion detection
and prevention methods can be used to monitor for various attacks. One other
serious problem is denial of service attackswhich are diffcult to solve for an
individual company.
Teft of Data from Servers
Because of the powerful encryption systems available, interception of transmis-
sions is a relatively minor problemas long as you use the encryption techniques.
Instead, the servers connected to the Internet have become tempting targets. Sev-
eral incidents have been reported of hackers stealing millions of records of cus-
tomer credit card data from e-commerce frms. While credit laws protect consum-
ers, the loss of a credit card is still painful and time consuming. In addition, the
e-commerce frm faces liability issues if it did not adequately secure the data.
Securing servers uses the same technologies as any computer system: (1) make
sure the latest operating system patches have been applied, (2) set access control
rights to the smallest number of people possible, (3) encrypt the sensitive data, (4)
hire trusted employees, and (5) monitor access to the sensitive data. A sixth step
(frewalls) is explained in a later section. Figure 5.19 shows the primary categories
that are required by the major credit card companies. Merchant banks and the card
companies require vendors to agree to these conditions or they will not allow you
to handle credit card data. They also require you to pay for periodic tests by an
outside approved company. No support or negotiation is provided for any of the
terms. The card companies have effectively become a monopoly in their attempts
to push security (and blame) onto the merchants. Consequently, it is increasingly
diffcult for small merchants to handle their own credit-card processing. Instead,
anything less than huge frms should use payment mechanisms through a third-
Figure 5.19
Payment card industry security rules. Any merchant or business that handles
credit card data must agree to abide by these rules. Source: https://www.
pcisecuritystandards.org
1. Install and maintain a frewall confguration to protect cardholder data.
2. Do not use vendor-supplied defaults for passwords.
3. Protect stored cardholder data.
4. Encrypt transmission of cardholder data across open, public networks.
5. Use and regularly update anti-virus software.
6. Develop and maintain secure systems and applications.
7. Restrict access to cardholder data by business need to know.
8. Assign a unique id to each person with computer access.
9. Restrict physical access to cardholder data.
10. Track and monitor all access to network resources and cardholder data.
11. Regularly test security systems and processes.
12. Maintain a policy that addresses information security.
328 Chapter 5: Computer Security
party, such as PayPal, Google, FirstData, or even Amazon. These frms all charge
fees for handling the credit cards, but you avoid most of the risk and the costs of
maintaining detailed security systems.
Firewalls
The Internet and e-commerce add some complications to protecting company
data. You need to give customers access to some important company data to pro-
vide the best e-commerce site. For example, customers like to know if an item is
in stock before they place an order. To offer this service, you need to connect your
Web server to your company inventory system. But any time you open a connec-
tion from the Internet to your company data, you have to be extremely careful to
control that interaction. Security access controls and database security controls are
two important provisions.
Beyond access control, simply connecting your company computers to the In-
ternet could cause problems within the network itself. You do not want company
network traffc being sent to the Internet, and you do not want outsiders to be able
to see your internal computersgiving them the chance to try and break into your
servers. Figure 5.20 shows how frewalls are used to isolate sections of the net-
work. Firewalls are essentially routers that examine each packet of network data
passing through them and block certain types to limit the interaction of the compa-
ny network with the Internet. The Internet protocols were designed as an open net-
work to transport many types of data and to enable computers to connect in many
different ways. For example, servers have logical ports on which they listen for re-
Figure 5.20
Firewalls. Firewalls are packet analyzers that are used to keep local data from
moving to the Internet and to limit the actions allowed in from the Internet. Firewalls
examine each packet of data on the network and block certain types to limit the
interaction of the company network with the Internet.
Company PCs
Internal company data servers
Internet
Firewall router
Firewall router
Keeps local data
from going to
Web servers
Examines each
packet and
discards some
types of requests.
329 Chapter 5: Computer Security
quests. Since only a few of these ports are used for common Internet activities, the
frewall is confgured to block all of the other ports to prevent outsiders from fnd-
ing a back way into one of your servers.
Firewalls are also used to segment your network. Internet traffc can be con-
trolled based on a set of rules. These rules can include the IP source and des-
tination address, the incoming and outgoing ports, and the protocol or primary
purpose of the packet. By adjusting the rules, security experts can force Internet
traffc to specifc servers and prevent that traffc from going anywhere else on the
network. It is common practice to put Web servers in a special section of the net-
work that only allows certain traffc into and from the servers.
Intrusion Detection and Prevention
Monitoring the networks and servers is an important step in providing a secure
system. If nothing else, you need to know if someone has broken into your serv-
erspreferably before the police knock on the door and tell you. As shown in Fig-
ure 5.21, an intrusion detection system (IDS) is a combination of hardware and
software that continuously monitors the network traffc. The hardware is similar
to that used in a frewall, but instead of blocking the packets, it performs a more
complex analysis. The systems use a set of rules to monitor all Internet traffc and
search for patterns. For instance, a common attack often begins with a sweep of a
targets network to look for open ports. The IDS observes this repeated scanning,
blocks the requests, identifes the source, and sends a warning to the security man-
ager. An IDS is an effective monitoring tool, but the cheaper ones tend to generate
too many false warnings.
Figure 5.21
Intrusion detection and prevention. The IDS monitors packets and logs from routers,
servers, and special network devices. It has rules to recognize certain attacks and can
monitor for changes in traffc patterns. An IPS can shut off a network connection if it
detects a threat.
IDS/IPS
Company PCs
Collect packet
info from
everywhere
Analyze packet data in real time.
Rules to evaluate potential threats.
IPS: Reconfigure firewalls to block IP
addresses evaluated as threats.
330 Chapter 5: Computer Security
An intrusion prevention system (IPS) begins with an IDS but adds the abil-
ity to shut down a network connection that has been identifed as a threat. For
instance, if the system detects a repeated scan from a specifc IP address, it will
set a rule in the main Internet router and tell it to discard any incoming packets
from that IP address. Typically these blocking rules are set in place for a specifc
amount of time and then released after the immediate danger has passed.
The main problem with and IDS and an IPS is that servers today are constantly
under attack. An IDS will identify almost continuous scans of various types from
around the world. An IDS that triggers alerts for every one of these attacks would
constantly be sending out warnings. Humans would be overloaded and ignore the
warnings. Using an IPS to block out some of the obvious scans is a partial answer.
But, remember that many organizations use network address translationwhich
means IP addresses are shared and reused. So, if a crazed lunatic from a large uni-
versity uses a PC to scan outside servers, the IPS on that server could respond by
blocking the server for a large chunk of users at that university. The problem with
an IDS and IPS is that it is diffcult to draw this line between identifying attacks
and allowing people to use the servers.
Denial of Service
Denial-of-service attacks have gained importance in the last few years. The es-
sence of an e-business site is the ability to reach customers 24 hours a day. If
someone foods the site with meaningless traffc, then no one can use the service
and the company may go out of business. Several variations of DoS have been
used in the past couple of years, sometimes dragging down large chunks of the
Internet at one time. Most of the techniques take advantage of faws in the Internet
protocols or in their implementation on a particular type of server. Figure 5.22 il-
lustrates the process. A hacker breaks into some weakly protected computers and
loads a special program that is hidden. On a signal, the machines all send requests
to the targeted server. With some known Internet design faws, these messages can
Reality Bytes: RSA Hack from the Top
RSA Security, a subsidiary of EMC, is one of the big players in computer security.
The company was one of the frst to develop and sell dual-key encryption and SSL
certifcates. When the original patents expired and competitors undercut its prices,
the company turned to other technologies and services. In particular, the company is
known for its SecurID, which is a small device that generates a new password key
every minute. The keys are synchronized to the server, so the passwords are only
good for one-time use and change constantly. The process makes it relatively dif-
fcult for anyone to attack a login to a protected server. So, instead of attacking the
protected computers, in 2011, hackers went after RSA itself. Apparently, someone
was able to breach the security and obtain access to the underlying keys. These at-
tackers then used the data to break into computers at defense contractor Lockheed
Martin. Not long after, RSA issued millions of replacement security tokens for virtu-
ally every customer.
Adapted from Siobhan Gorman and Shara Tibken, Security Tokens Take Hit, The
Wall Street Journal, June 7, 2011.
331 Chapter 5: Computer Security
be multiplied so that a few thousand messages become millions and bog down
the server. This type of attack is hard to trace to the original source unless inves-
tigators fnd monitor logs on the zombie machines. Several Internet sites provide
simplifed instructions on how to perform these attacks, so even weak hackers or
script kiddies can create havoc.
In many cases, a hacker has to break into thousands of computers to turn them
into zombies that can be used for DoS attacks. Some attackers use scanning tools
to search for PCs that lack critical updates and then attack individual comput-
ers. These attackers then install their software and link the computers to a central
server that sends control messages to the zombies. The attackers can then lease
these botnets to other hackers. An interesting twist to this process arose in 2010
and 2011 during the release of war data and an investigation of Julian Assange,
the founder of Wikileaks. A hacking group (Anonymous) decided to use their bot-
net to attack Web sites of people and organizations that were critical of Wikileaks.
They also decided to expand the size of their botnet by letting people volunteer to
have their computers become zombies. Of course, they did not use those terms,
but apparently, some people did volunteer. Voluntarily adding your computer to a
botnet conducting illegal activity is a really bad idea.
Stopping a DoS attack on your servers can be exceedingly diffcult. Most com-
panies will not have the resources to deal with the attack. The goal of DoS is to
food the network and servers with activity. One answer would be to add servers
or network capacity to handle the load. One possible solution is to pay for cloud
services such as Amazons EC2 which spreads the processing across multiple
servers in many locations and has multiple Internet connections around the globe.
But, servers and bandwidth cost money, and the food attacks could dramatically
increase these costs.
Figure 5.22
Denial of service attack. A bored hacker frst breaks into weakly protected home and
school systems and loads a hidden program on thousands of machines. At a signal, all
of the zombie machines send messages to the server, preventing everyone else from
using it.
Zombie PCs at homes,
schools, and businesses.
Weak security.
Break in.
Flood program.
Coordinated flood attack.
Targeted server.
332 Chapter 5: Computer Security
Occasionally, researchers and Internet-based companies will call on people to
fnd a way to reduce the threat from DoS attacks. For a while, it was suggested that
ISPs should be responsible for their clients. In a way, the imposition of data caps
by ISPs is a response to this threat. If a client computer is spewing huge amounts
of datait is likely that this data is bad, either as spam or DoS attacks. The ISP
should be able to recognize these offenders and shut them down. Of course, ISPs
are reluctant to shut down paying customers; however, they are fnding it easier to
bill them more money for excessive use. In effect, these actions push the responsi-
bility back to the owner of the computers. Microsoft helps users a little by embed-
ding tools into Windows to monitor from some known highly-active spyware and
botnet tools. In the end, it makes sense to use economics to encourage people to
monitor their own computers.
Privacy
If you have to track everyones computer use to improve secu-
rity, what happens to privacy? Computer security is a complex topic.
One of its most challenging aspects is that many of the tools available to improve
security can also reduce individual privacy. For example, a single sign-on system
used across the country could be used to track people through their purchases,
when and where they used a computer, when they passed through toll booths or
boarded planes, or almost anything else. Even without single sign-on, the security
systems enable companies to track detailed usage by employees and customers.
These issues are explored in detail in Chapter 14. For now, you need to remem-
ber that many proposed security controls scare even honest peoplebecause of
the loss of privacy. As a businessperson, you must be aware of these problems and
establish policies to minimize the effects and keep customers happy.
Reality Bytes: Anything on a Network has Security Risks
In April 2011, Sony realized that someone had hacked its game network and taken
complete control over the server. The network was used to run the PlayStation video-
game service for more than 75 million customers. Sony had to take the entire system
offine and rebuild many of the components. It took almost two months to restart the
network. Later, Sony found attacks on a second network. Nintendo also found at-
tacks against its game network. Many early networks were built without security as
a primary component. Taking security on as an afterthought often causes problems.
In June, Sega confrmed that its gaming network had also been attacked and that al-
most 1.3 million people lost their personal information. However, the Sega personal
information was mostly limited to name, birthday, and e-mail addresses. The com-
pany uses external credit card processors to handle payments and does not store any
fnancial data on its own servers.
Adapted from Ian Sherr, Sony Shuts Down PlayStation Network Indefnitely, The
Wall Street Journal, April 25, 2011; and Daisuke Wakabayashi, Sega Confrms Cy-
berattack, The Wall Street Journal, June 19, 2011.
333 Chapter 5: Computer Security
Summary
Companies have to trust employees, consultants, and business partners, but this
group presents the greatest security threats. To maintain secure systems, compa-
nies often perform background checks on employees, separate tasks so multiple
people can observe the work of others, and monitor fnancial transactions. Natu-
ral disasters are a threat to the physical assets, but their business damage can be
minimized by having continuous backups in different locations. Cloud computing
makes these facilities available even to small companies. The Internet provides
more avenues of attack for outsidersparticularly through phishing schemes and
attacks on unpatched systems. The best defenses are to install all current operat-
ing system patches, to assign access rights carefully, and to monitor the computer
usage with an intrusion detection system. However, denial-of-service attacks are
particularly hard to prevent.
Encryption protects data during transmission. It is particularly useful for send-
ing credit card data over the Internet. It can also be used to provide digital sig-
natures that authenticate users to validate the source of messages. If computer
crimes are detected, the law requires careful collection and analysis of the data us-
ing validated computer forensic tools. Experienced experts are generally required
to conduct these investigations.
A Managers View
Computer security is a critical issue for any company. For Web-based busi-
nesses, careful controls and continual vigilance are mandatory. Information
systems have many potential weaknesses and threats. But overall, electronic
security can be stronger than any other formif it is maintained by experts.
Encryption is a key component in securing systems, communications, and
protecting privacy. The drawback to security is that it imposes limits on em-
ployees and customers. Some tasks become more diffcult and some loss of
privacy occurs. To protect corporate and personal data, we have to be able to
trust the people who collect the data.
334 Chapter 5: Computer Security
Key Words
Web Site References
Computer Crime
CERT www.cert.org
Computer Crime Research Center www.crime-research.org
Computer Security Institute www.gocsi.com
FBI: Internet Crime Complaint www.ic3.gov
Interpol www.interpol.int/Public/
TechnologyCrime
US CERT www.us-cert.gov
National Security Agency www.nsa.gov
Department of Justice/cyber crime www.cybercrime.gov
Review Questions
1. What are the primary threats to information processed by computers?
2. How do viruses spread over the Internet? How do you stop them?
3. Why is data backup the most important aspect of security?
4. How do you protect yourself from false Web sites?
5. Why is it important to ensure updates and patches are installed soon after
they are released?
6. What methods are available to identify computer users?
7. What are access controls and how are they used to protect information?
8. What are the advantages and disadvantages of dual-key encryption compared
to single-key encryption?
Advanced Encryption Standard (AES)
Application service providers (ASPs)
Authentication
Biometrics
brute force
certifcate authorities
cold site
denial of service (DoS)
digital certifcates
digital signatures
Firewalls
hot site
intrusion detection system (IDS)
intrusion prevention system (IPS)
Kerberos
malware
phishing
Pretty Good Privacy (PGP)
private key
public key
replay attacks
script kiddie
secure sockets layer (SSL)
single sign-on
social engineering
spyware
two-factor authentication
virtual private network (VPN)
virus
zero-day attacks
335 Chapter 5: Computer Security
9. How can dual-key encryption be used to authenticate a message?
10. Why are certifcate authorities so important in a public key infrastructure?
11. Why do we not have a better system to identify users of Web sites?
12. What threat are audits trying to protect against?
13. If you wish to investigate a computer attack, what is the most important rule
you need to follow?
14. What are the main issues in protecting e-commerce Web sites?
15. Why are wireless transmissions more of a security problem than wired
systems?
16. What is a denial-of-service attack? Why is it so important in e-commerce?
Why is it so diffcult to prevent?
17. What is a frewall and how does it protect a company from Internet attacks?
18. How does an intrusion detection system work?
Exercises
1. Run Windows update on your computer and select the custom option. How
many updates are available? List them. Do the same for Offce update.
2. Review newspapers, magazines, and Web sites and fnd one case of an actual
security problem, such as theft of data. If possible, identify the value of any
losses and whether the criminal was caught. Summarize steps that could have
been taken to prevent the incident.
3. Find at least two biometric login devices and their prices.
4. Research the current access control methods provided by your favorite social
network site. Briefy describe how you would assign permissions to two sets
of data to two groups of people. Group A can see the frst set of items but not
the second, and group B can see the second set but not the frst.
5. Research the status of password-crackers. What length of password can be
broken in a reasonable time (say less than a month)?
6. Assume you are running a small business that needs to hire employees. Find
a site that you can use to do a simple background check on the applicants.
Explain why you chose this site.
7. The hacker group Anonymous uses software to stage denial-of-service
attacks against various targetsoften political. Unlike most attackers, the
group sometimes publicly invites people to sign up and add your computer
to its group of attackers. Explain why it would be a bad idea to join this
organization.
8. Talk to a friend or relative who works for a large company and ask about the
types of monitoring that the company performs on its employees.
336 Chapter 5: Computer Security
9. Use the Windows Task Manager to list all of the active processes on your
computer. Search the Internet to identify the purpose of at least ten of the
processes.
10. Assume you have a server with about 500 gigabytes of data. Identify the
hardware and software you could use to make backups. Be sure to specify the
price and estimate the amount of time it will take to back up the data.
Technology Toolbox
11. Write a short paragraph or spreadsheet. Encrypt and save it and e-mail it to a
teammate. Identify a relatively secure way to exchange the password.
12. Find out if your computer has a Trusted Platform Module (TPM) that could
be used with BitLocker drive encryption.
13. Most computer systems have administrator accounts that provide complete
access to the computer for at least one person. Briefy explain what security
issues this might cause.
14. Use the Web to fnd the best price on a security certifcate that you can install
on a business Web server. Assume that you will need the server for at least
fve years. To be safe, check your Web browser to ensure that the certifcate
authority is listed in the Trusted Root certifcates.
15. If you have the appropriate network permissions, or using your own
computer, create a Marketing group and three users on your computer. Create
a folder and set the permissions so that the Marketing group can access the
fles in the folder. Add your instructor to the group and include a test fle that
he or she can read.
16. Check the security permissions on your computerparticularly the My
Documents folder (or wherever you store most of your fles). Is the folder
secure or should you set different permissions?
Teamwork
17. Create a subdirectory on a computer that enables you to set access rights.
Select a user or group and set permissions so members of that group can read
the data but cannot change it. All other users (except yourself) cannot read
the data.
18. Conduct a small survey of students (not in your MIS class). Find out how
often they back up their data, the last time they updated their operating
systems, and how many of them have been infected by a virus in the last 6,
12, and 24 months.
19. Create a simple chart in a spreadsheet and encrypt it. Send a version to each
person on your team using a different password/key so that they can add a
couple rows of data and return it. Combine the results into one spreadsheet.
Comment on any problems you encountered.
337 Chapter 5: Computer Security
20. As a group, create a list of questions that you would ask a potential employee
who is interviewing for a job as a computer security expert at your company.
21. Each person should describe a movie scene or TV show episode that involve
some type of computer security or attack. Explain whether the event is
realistic. Swap the descriptions with team members and have each person add
a list of actions that could be taken to prevent the attack.
Rolling Thunder Database
22. What privacy problems might exist at Rolling Thunder? What rules or
procedures should you enact to avoid problems? Write a privacy statement
for the company.
23. If Rolling Thunder Bicycles adds an Internet site to order bicycles and deal
with customers, what security procedures should be implemented to protect
the data?
24. Research the costs and steps involved in setting up a secure Web server for
Rolling Thunder that can be used to sell bicycles over the Internet.
25. Write a disaster plan for Rolling Thunder. Identify how the backup tapes will
be handled and the type of system you will need if a natural disaster hits.
26. Identify and briefy describe the top security threats that would be faced by
Rolling Thunder. Outline the primary steps you would take to reduce the
risks.
27. Particularly in terms of security, would Rolling Thunder be better off just
hiring a company to build and run an e-commerce site?
Additional Reading
Bequai, August. Technocrimes, Lexington, MA: Lexington Books, 1989.
[Security Pacifc and other cases.]
Harriss, H. 1999. Computer Virus Attacks Have Cost Businesses $7.6 Billion
in 1999. Computer Economics Report dated June 18, 1999. (http://www.
info- ec.com/viruses/99/viruses_062299a_j.shtml) [Increased costs of virus
attacks.]
Faltermayer, Charlotte. Cyberveillance, Time, August 14, 2000, p. B22.
[Worker monitoring statistics.]
Forno, Richard and William Feinbloom. PKI: A question of trust and value,
Communications of the ACM, June 2001, vol. 44, no. 6. [A good summary of
the diffculties of trusting public key certifcate authorities.]
Feig, Christy. Medical privacy rules to take effect, CNN, April 12, 2001.
http://www.cnn.com/2001/HEALTH/04/12/medical.privacy/index.
html?s=2 [Notice of new federal medical privacy rules.]
338 Chapter 5: Computer Security
Ashley Fantz and Atika Shubert, WikiLeaks Anonymous Hackers: We Will
Fight, CNN Online, December 9, 2010. http://articles.cnn.com/2010-12-09/
us/hackers.wikileaks_1_julian-assange-arbor-networks-websites?_s=PM:US
[Anyone can join a botnetbut that is not a good idea.]
Government Technology, Ex-San Francisco Network Engineer Convicted of
Network Tampering, April 28, 2010. http://www.govtech.com/security/Ex-
San-Francisco-Network-Engineer-Convicted-of.html. [Conviction of Terry
Childs for refusing to give up the administrative username/password to the
citys network.]
Gregg Keizer, New Firefox Add-on Hijacks Facebook, Twitter Sessions,
Computerworld, October 25, 2010. [Announcement of Eric Butlers
Firesheep add-on that captures all unencrypted wireless traffc.]
Oakes, Chris. Privacy Laws Aim to Protect the Hunters as Well as the Hunted,
International Herald Tribune, March 23, 2001. [Good analysis of European
Union privacy controls.]
Post, Gerald, Improving Operating System Security, Computers & Security,
6(5), 1987, 417-425.
Thurman, Mathias (pseudonym). What to do when the Feds come knocking,
Computerworld, June 4, 2001, 62. [Situation where hacker used a stolen
laptop to attack other systems, and computer logs helped show the employee
was innocent.]
Whiteside, Thomas. Computer Capers: Tales of Electronic Thievery,
Embezzlement and Fraud, New York: Crowell, 1978. [Early cases of
computer fraud and abuse.]
http://csrc.nist.gov/encryption/aes/ [Reference source for AES algorithm.]
http://www.visabrc.com/doc.phtml?2,64,932,932a_cisp.html [Reference
to Visa CISP security.]
339 Chapter 5: Computer Security
Cases: Professional Sports
Te Industry
Professional sports raise billions of dollars a year in the United States and around
the world. Actually, European professional soccer teams usually top the lists in
terms of revenue. In the United States, baseball teams brought in $3.6 billion in
revenue in 2001 (MLB 2002), basketball teams $2.7 billion in 2003 (NBA
2004), and football teams almost $5 billion in 2002 (Ozanian 2003). In 2010,
baseball brought in $6.1 billion, basketball $3.8 billion, football $8 billion, hock-
ey $3 billion, NASCAR $0.9 billion, soccer (top 20 teams worldwide) $5.2 billion
(Forbes 2011).
These numbers include gate receipts as well as other revenue sources such as
television payments. Of course, the teams also have enormous costs in the form
of player (and coach) salaries. In total, sports franchises are the most popular seg-
ment of the entertainment industry. If you add in the amount spent on gambling
(where it is legal, of course), sports are incredibly popular.
Information systems play several roles in sports management. Coaches, play-
ers, and scouts use information systems to track performance and opponents, store
game fles, diagram plays, and communicate information. IT is also used in the
front offce to sell tickets and merchandise. Like any other business, administra-
tors have to derive fnancial information and evaluate customers and suppliers.
Because of the popularity of the Internet and the role of television, sports teams
have also begun to implement sophisticated networks within the stadiums for use
by high-end customers.
Since the teams generally use networks to share information during games, se-
curity is critical. Any public networks have to be built separately from the team
networks. Fans might be frustrated if a public network crashes or is hacked, but
a team could be severely crippled if its main coaching system goes down or is
compromised.
Additional Reading
Badenhausen, Kurt, Yankees Soar, Mets Plunge on List of Baseballs Most
Valuable Teams, Forbes, March 23, 2011.
Baseball: http://www.forbes.com/lists/2011/33/baseball-valuations-11_land.html
Basketball: http://www.forbes.com/lists/2011/32/basketball-valuations-11_land.
html
Football: http://www.forbes.com/2010/08/25/most-valuable-nf-teams-business-
sports-football-valuations-10_land.html
Hockey: http://www.forbes.com/lists/2010/31/hockey-valuations-10_land.html
Forbes, MLB, April 15, 2002.
Forbes, NBA Valuations, February 9, 2004.
Ozanian, Michael K., Showing You the Money, Forbes, September 15, 2003.
340 Chapter 5: Computer Security
Case: Professional Football
Football requires a large number of players, and that means a team needs a large
number of coaches. The information technology system becomes relatively more
complex to handle the increased number of users and machines. Brian Wright, IT
director for the Chicago Bears, notes that the NFL in general is looking closely at
security and how best to protect the information in our business. One of the things
we identifed was the need for better user authentication (Vijayan 2004). The
team installed a USB authentication key that staff members use to log onto the
network. They must also enter a PIN. The strength of the dual-factor authentica-
tion is that the PIN is relatively easy to remember, but outsiders cannot hack into
the network because they would need the physical USB key.
The Denver Broncos focused on providing more information for fansparticu-
larly the fans who watch the game from the luxury box seats. The IT department
installed fat panel touch screens and a high-speed network into every box. Using
the GamePlus system, fans can touch the screen and bring up the view from any
camera in the stadium. Rick Schoenhals, IT director for the Broncos, notes that
I just know technology is gaining a bigger place in sports venues and sporting
events. Were opening a new venue and we dont want to fnd out someone who
opened next week is doing these great things with technology and were not doing
it. We cant be complacent in any area, including technology (George 2002). The
GamePlus system consists of 135 screens. The Broncos are trying to offset some
of the costs by selling corporate sponsorships that display logos throughout the
game. Because Denver was the frst team to implement this type of system, the
costs were relatively high.
Local area and wide area networks are important to improve communication
within football teams, and many teams were early adopters. The Carolina Pan-
thers installed a 100-mbps network in 1997. Roger Goss, MIS manager for the
Panthers, comments on the speed by noting: We needed that because the coaches
create complex graphics, like playbook diagrams and game plans, and download
them from servers to workstations (Wallace 1997). The team also uses frame-
relay links to other teams and to the NFL offce. The connection is used to share
statistics and to notify the league about trades and waivers. With 83 users, the sys-
tem is heavily used on Monday to Wednesday when the coaches are creating and
distributing game plans, and scouting reports arrive for the next opponent.
Sports teams are increasingly aware that fans want up-to-the-minute informa-
tion on many aspects of the game. In 2000, the Washington Redskins created a
Mobile Flash application to offer team news via Web-enabled cell phones and
PDAs. Fans can sign up to receive daily e-mail messages about trades, statistics,
and player injuries. The Redskins were the frst NFL team to implement the wire-
less systemalthough others provide e-mail newsletters.
When the New England Patriots built a new 68,000-seat stadium in 2002, the
network was a critical element. The voice and data networks alone cost about $1
million. The network uses Nortel Passport switches with a gigabit Ethernet back-
bone. It links 80 luxury suites and provides more than 2,000 ports at 100 mbps.
The network is important to the teams and the fans. It is also important for renting
the stadium to businesses during the week. Pat Curley, the IT director, notes that
no other stadium has this setup. It makes it very exciting, and very challenging
(Cummings 2002). The network supports the various coaching and scouting sys-
tems used by teams. The Patriots scouts use notebook computers with comments
and data uploaded to the central servers for the coaching staff. The coaching sys-
341 Chapter 5: Computer Security
tem also stores digitized video so coaches can watch specifc plays. Pat notes that
the coaching system runs on a separate LAN. She says weve designed every-
thing to be separate so that people who need Internet bandwidth, such as the suite
users and press, will have access but it wont confict with or steal our bandwidth.
Plus, its more secure (Cummings 2002).
After observing some of the problems that arose in New Orleans with Hurricane
Katrina, Bill Jankowski, senior director of IT for the Baltimore Ravens decided it
was time to establish a formal backup system for his teams data. Signing a con-
tract with AmeriValut Corp., he transferred 200 GB of data to their servers, and
every night ships update changes to their secure systems. For $3,000 per month,
AmeriVault stores all of the teams video clips, injury data, and purchase data
from the teams SQL-Server based transaction processing system (Fisher 2006).
Data security often extends beyond the digital world. Minnesota Vikings player
Michael Bennet learned that the hard way in 2003. He received credit card state-
ments with bills from various convenience stores. But the card did not really be-
long to him. Instead, an off-duty police offcer working as a security guard for the
team had stolen various documents from players and applied for credit cards in
their names. The identity thief was caught in part from video surveillance tapes
taken at one of the stores where he used the card. Several other well-known ath-
letes have had problems with identity theft as well (ESPN 2003).
The high visibility of American football and television seems to attract atten-
tion. Just prior to the 2007 Super Bowl, the Web sites of the Miami Dolphin Sta-
dium and the Miami Dolphins team were hacked and loaded with malicious code
that attempted to infect any computer visiting those sites. The infection was frst
identifed by customers who had the Websense security software installed on their
PCsit would not allow them to visit those sites because it detected the mali-
cious code. Eventually, the owners of the sites were notifed and they cleaned up
the attack. Dolphins spokesman George Torres said that we are working on the
technology side to review all the code and do whatever we need to, on a security
basis, to prevent this from happening again (McMillan 2007). The code had links
to servers in China that attempted to download Trojan programs on the visiting
PCs. The code took advantage of a known exploit in the browser with patches is-
sued by Microsoft.
The Dallas Cowboys were one of the earliest adopters of information technol-
ogy and analytical tools. Much of the technology and data is now available to all
teams, but the Cowboys are still leading the way at storing and handling data. In
2006, the team installed Isilon Systems servers to handle 19 terabytes of video
dataenough to hold two entire seasons worth of game video online. Video tapes
of the games arrive from the NFL on Monday, Tuesday, and Wednesday. Robert
Blackwell, director of coaching video for the Cowboys noted that by the end of
the day on Thursday, every game is converted to digital format and stored in the
system. By the end of the year, the system holds video for 263 games. Mr. Black-
well plans to continue adding storage so all video can be kept online and instantly
available to coaches. The team also has a backup Isilon system that it carries to
training camp (Fisher 2006). In the meantime, the NFL might want to talk with the
Big-12 college football teams, including the Texas Longhorns. Instead of fying
video tapes around the country, in 2006, the organization selected XOS Technolo-
gies to transfer digital copies of the videos to each team via the Internet. Each uni-
versity in the Big 12 Conference can download entire games in about two minutes
per gigabyte of data, or approximately two hours for one game flm. Raymond
342 Chapter 5: Computer Security
Thompson, VP of product marketing at XOX Technologies said that you wont
fnd anyone in the Big 12 who doesnt love Internet Exchange because of the time
saved and the ease of getting it done (Rosencrance 2006).
The Dallas Cowboys built one of the newest football stadiums in 2010-2011.
The stadium hosted the 2011 Super Bowl and the giant scoreboard /replay screen
above the feld is only one of the most noticeable technology features in the sta-
dium. In addition to the scoreboards, clocks, retractable roof, and lighting, the IT
system runs point-of-sale terminals, ticket sales and so on. The stadium has 3,100
fat-screen televisions to show game scenes throughout the stadium, plus Wi-Fi,
IP phones, and 300 IP security cameras. Housed in the stadium is a HP-based data
center with 127 HP blade servers, 100 terabyte SAN, and high-speed network.
OK, the data center runs team and stadium operations plus operations for team
owner Jerry Jones 35 other companies. But, the system has a dedicated staff of
13 IT workers (Taft 2011). Other stadiums are adding information features. The
Meadowlands installed Wi-Fi capacity to support fans uploading photos and vid-
eo. For Jets games, fans can access a FanVision device that feeds game stats and
customized replays (Patterson 2011).
Questions
1. How can well-known stars protect themselves from identity theft?
2. What threats exist for portable computers used for scouting and how can
those risks be minimized?
3. Would fans pay for mobile access to games? How much? What type of
network would be needed to handle the data?
Additional Reading
Copeland, Lee, Redskins Tackle Wireless Access, Computerworld, October 31,
2000.
Cummings, Joanne, Network of Champions, Network World, July 22, 2002.
ESPN, Vikings QB Culpepper, four Others Were Victims, August 20, 2003.
Fisher, Sharon, Football Tackles Disaster Recovery, Computerworld,
November 10, 2006.
George, Tischelle, Football Fans See Games From A New Angle, Information
Week, January 30, 2002.
McMillan, Robert, Sites Scoured of Malware after Offsides Hit,
Computerworld, February 2, 2007.
Rosencrance, Linda, Texas Longhorns, Other Big 12 Teams, Now Swapping
Game Films Digitally, Computerworld, September 18, 2006.
Taft, Darryl K., IT & Network Infrastructure: HP Technologies Drive the Dallas
Cowboys Stadium, eWeek, January 14, 2011.
Patterson, Thom, Super Stadiums of the NFL, CNN Online, February 7,
2011.
Vijayan, Jaikumar, Chicago Bears Boost Network Defenses, Computerworld,
May 28, 2004.
343 Chapter 5: Computer Security
Wallace, Bob, LAN Blitz Sharpens Panthers Claws, Computerworld,
September 29, 1997.
Case: Basketball
The summer of 2003 was not a good year for the electricity grid in the northeast-
ern United States. A combination of errors caused the international loop around
Lake Erie to overload and shut down the power grid for the entire Northeast. Jay
Wessel, the IT director for the Boston Celtics, was attending a picnic at 4:30 P.M.,
and he notes that when the grid crashed, every cell phone and pager in the place
went off (Kontzer 2003). Because most of the blackout was focused in New
York, he lost only some e-mail servers. Other teams had entire systems shut down.
But, it convinced Wessel to look into ways to provide backup in case his facility
lost power. The problem he encountered is that most backup facilities were also
located in the same areas. He notes that it doesnt really do me any good to back
up my data 10 miles away (Kontzer 2003). Like many other businesses, Wes-
sel is also looking for solutions to the problems with virus and worm attacks. By
keeping systems patched, his losses have been minimal, but he is frustrated with
the frequency of patches required.
The Womens NBA teams have added a new twist to marketing basketball.
When the Portland Trail Blazers acquired a new team in 2000, management
turned to a CRM system to target sales to season ticket holders. They also merged
demographic data from external marketing lists and Ticketmaster. Tony Cesarano,
database marketing manager, notes that the system signifcantly improved the ef-
fciency of the sales team and was able to sell 6,400 season tickets in four months.
He notes that in the past, we would have manually keyed the WNBA sales infor-
mation into a Microsoft Excel spreadsheet, which would have been time-consum-
ing and could have introduced inaccuracies into the database (Baron 2000). The
Trail Blazers are using customer relationship management (CRM) tools to boost
sales of season tickets for the mens team. The system has consolidated the data
that used to be scattered on spreadsheets of the 50 sales and marketing employ-
ees. It tracks individual ticket holders as well as corporate customers. One of the
big gains was to minimize overlap, where multiple salespeople often called on
the same prospects. The system has proved useful in managing requests by ticket
holders to change their seat locations. It can quickly bring up unsold or released
seats as well as track priority values of important customers. The organization
ultimately expanded the system to their Web site. Cesarano notes that the process
is complicated: Well have to manage a much larger volume of data coming off
the Web. Well also have to fgure out how to clean up the data, to make sure that
were using only useful, legitimate, and accurate data (Baron 2000).
The NBA in total boasts a fan base of over 50 million people for the 29 teams.
In an attempt to boost the level higher, the NBA installed a customer relation-
ship management system from E.piphany. Bernie Mullin, senor vice president of
marketing, notes that were going to have a 360-degree view of the fans and
customers of the NBA. Weve never had that before at the league or team level
(Songini 2001). The system pulls data from all of the customer-interaction points:
ticket sales, All-Star nomination ballots, the NBA store Web site, individual team
databases, and the NBA store in New York. The main focus is to place the data
into a data warehouse and provide analytical tools to sell more tickets. The plan is
344 Chapter 5: Computer Security
to track sales by various events to answer questions such as whether certain teams
provide bigger draws, or if some months or days draw bigger crowds. The main
NBA offce in Secaucus, New Jersey, has about 1,000 employees. The NBA has
several data collection and online systems to maintain. Two staffers attend each
game with touch screen laptops to collect data. The data is transferred back to the
main system at headquarters in real time. It can be used by fans to create custom
highlight reels.
In 2007, the NBA created a site for fans in the Second Life Web site with games,
interactivity, and community features. Visitors can gather in an arena to watch a
3D diagram of a game as it is being played in real life. The site also has a copy of
the NBA Manhattan store to sell virtual merchandise for players avatars. Through
their avatars, fans can also play games, such as HORSE and a slam-dunk contest.
The Orlando Magic also implemented CRM software to help boost ticket sales.
A primary focus of their system is to identify and track customer complaints. If
customers have problems, the system can direct them to the appropriate vendor
and monitor vendor compliance with contracts. Julie Gory, fan relations and retail
manager, notes that we are a watchdog department that looks at things from a
fans perspective. Whatever happens from when the fan leaves their driveway
everything from parking, the cleanliness of the restroomswhen we hear of is-
sues, we make notes and input them to GoldMine and can review them on what-
ever basis we want (Songini 2002). Gory decided not to use the NBA CRM soft-
ware because it was too expensivethe NBA was going to charge them about
$100,000. The system was also more complex and harder to use.
Video is critical to coaches and players. Digital video provides enormous ben-
efts over tape because it can be edited and indexed quickly. The New Jersey
Nets were the frst team to implement a comprehensive system from Ark Digital
Technologies. The system lets coaches quickly grab the clips they want based on
various statistics. Ark CEO Alan Kidd notes that during halftime, coaches could
show clips of the frst half by type, for example, jump shots or post positioning
(Kreiser 2002). Ark has also created a digital video coaching system. The system
can show basic drills. Ultimately, it can be coupled with the game-day videos so
players can go to a Web site and compare their performance with the drills (www.
arkdigitalsystems.com).
In 2006, the Celtics began actively using analytical software from SratBridge
to analyze ticket sales and prices. Daryl Morey, senior VP of operations for the
Celtics uses the tool to fll the 18,600 seats by changing prices and offering pack-
age deals. He said that until we had this tool, it was very diffcult to create dy-
namic packages, because our ticke providers didnt have a rapid way to see which
seats were open. Now we can actually see in real time every single seat and how
much it is sold for. The analytical tool has also revealed that in certain sections
fans prefer aisle seating, so the organization has learned to focus on marketing the
interior seats for sales promotions (Havenstein 2006).
In 2007, the Atlanta Hawks and Thrashers implemented a new payment sys-
tem for season ticket holders. Those who signed up for a Chase credit card can
use their cell phones to pay for food or merchandise at 200 POS terminals in the
arena. Additionally, their phones Web browsers can read RFID tags embedded in
posters in the concourses, directing them to a site where fans can view and down-
load game information, videos, and promotions (Mitchell 2007).
By 2010, the NBA had its own 85-person IT department with a CIO. The team
is responsible for game-time issues handling networks and computers, as well as
345 Chapter 5: Computer Security
maintaining the NBA Web site and New Jersey tech center on a daily basis. For
the fnals games, video and stat loggers tag video clips with metadata so any-
one can quickly fnd video clips based on various criteria. CIO Michael Gliedman
noted that We come up with a whole set of metadata that can be used in lots of
ways, including by video game developers (Brown 2010).
The NBA produces and distributes an enormous amount of video, with 1.9 bil-
lion videos viewed from the NBA.com Web site in the 2010/2011 season. (Los
Angeles Times 2011). NBA Digital supports season passes to watch games online
and also provides the NBA Game Time app for Android and Apple phones which
displays game statistics and scores.
Questions
1. What privacy issues arise from the NBA using a CRM system to track
customer purchases?
2. How can the CIO of a basketball team provide backup facilities for a small-
to-medium-sized network?
3. How long will it take for digital video coaching technology to be
implemented at the college level?
Additional Reading
Baron, Talila, Team Scores With Apps That Net Ticket-Buyers, Information
Week, February 21, 2000.
Brown, Bob, NBA Finals Showcasing Technology as Well as Basketball Skills,
Network World, March 11, 2010.
Goff, Leslie, NBAs IT Team Makes Play With Web, CRM Initiatives,
Computerworld, June 11, 2001.
Havenstein, Heather, Celtics Turn to Data Analytics Tool for Help Pricing
Tickets, Computerworld, January 9, 2006.
Kontzer, Tony, Data Backup: Rethinking The Unthinkable(s), Information
Week, August 18, 2003.
Kreiser, John, Virtual Coaching, Information Week, July 22, 2002.
Los Angeles Times, NBA, a Hit in Online Video, is Looking to Grow in Social
Media, April 15, 2011.
Songini, Marc L., NBA Shoots For Data Analysis, Computerworld, May 28,
2001.
Songini, Marc L., Orlando Magic Shoot for Customer Satisfaction,
Computerworld, December 5, 2002.
Wagner, Mitch, The NBA Builds A Second Life Virtual Playground with
Potential For Real Fun, Information Week, May 5, 2007.
346 Chapter 5: Computer Security
Case: Baseball
Sports fans, particularly in baseball, are often crazy about souvenirs. They will
collect almost anything. So, it is not surprising that outdated copies of baseball
contracts found their way to an e-Bay auction set up by Scott Gaynor, a sports
memorabilia dealer. Bob Tufts, who played for the San Francisco Giants and the
Kansas City Royals in the early 1980s, found that his contracts were among those
offered for sale. While there is nothing illegal per se about the sale, there was
an important twist: As employee contracts, most of the documents contained the
social security numbers of the players. With some big-name players in the group
(read money), the risks were quite high. Bob Tufts observed Im shocked to
fnd out how easy it is for people to get their hands on fles like these (Rovell
2003). With a home address, the social security number, and a guess at a mothers
maiden name, criminals could have created fake bank accounts. The commission-
ers offce requested that the auction be stopped and the contracts returned. Some
of the bids had reached $200 before the items were pulled.
The Internet is increasingly important for attracting fans to all sports. Since
baseball has been number-intensive for years, Web sites are an important source
of data on games and players. In 2001, all major league baseball teams agreed to
consolidate and standardize their Web sites. All of the sites are now run from the
MLB servers. All sites were given a common look. An interesting aspect to the
change is that revenue from sales on the site is split across all of the teams. Bud
Selig, the commissioner, observed that the most signifcant part of our whole
Internet activity was the unanimous vote to share the revenue. That was a very
dramatic change in thinking, because disparity is the biggest problem we have
[Wilder 2001]. Bob DuPuy, chief legal offcer in the commissioners offce adds
that Of course, we agreed to share revenues that dont currently exist. I dont
think we could do it at a later date when there was revenue disparity (Wilder
2001). The site is operated by a separate company created by the team owners
and run in New York City. The new organization was initially funded with $1
million a year for three years from each of the 30 teams ($30 million a year). In a
somewhat risky move, the MLB site sells video access to games. The risk is that it
could alienate traditional television broadcasterswho provide a substantial part
of baseball revenues. But the site is still subject to local blackout rules, and the
picture quality is not even close to television standards. So, its market would most
likely consist of out-of-area fans.
Season tickets present interesting problems for clubs and fans. About 80 percent
of them are owned by corporationsparticularly the luxury suites. Robert McAu-
liff, CEO of Season Ticket Solutions, notes that season ticket holders miss 25
to 50 percent of games every year (Rosencrance 2001). The challenge for teams
is that flling seats increases revenue through sales of food and souvenirs. The
challenge for fans is that they want to effciently use their investments. The Phoe-
nix Diamondbacks, as well as other teams, have purchased software that enables
season ticket holders to manage their seats. The Web site allows ticket holders to
check on who is using the tickets, and which dates still have seats available.
Web casting ball games is an interesting legal and marketing area. Are people
willing to pay for Web broadcasts? Do they want to select specifc games? (Cur-
rently, MLB offers a subscription but only to specifc games.) Would such a sys-
tem encroach on television broadcasts? Is there a proft? Many of these questions
remain unanswered, and it is not clear that anyone is seriously addressing them
yet. In 2000, William Craig and George Simons created a company and the iCra-
347 Chapter 5: Computer Security
veTV Web site in Canada. The company picked up signals from 17 broadcast sta-
tions in the United States and Canada, digitized the signals and offered them for
free on its server. Rebroadcasting signals is legal in Canada. But it is a violation of
U.S. copyright laws. The company was quickly sued by several U.S. sports agen-
cies as well as the Motion Picture Association of America, because the company
did not block the signals to U.S. customers. The company quickly made an out-of-
court settlement and shut down the site (McGeever 2000). So, many questions re-
main about whether fans want to see Internet, or even cell phone video of games.
And, if so, how much they might be willing to pay and whether those fees would
offset any lost television advertising revenue.
With its experience and in-house staff, MLB has become the leader in Web
casting large events. In 2006, more than 5 million people watched March Mad-
ness college basketball games on the Webthanks to MLB technology. MLB
sells the services to at least 25 clients, providing a proftable stream of revenue for
MLB. Bob Bowman, CEO of MLB.com, observed that content publishers were
being underserved. A lot of companies are having a hard time picking out a digital
strategyMusic has iTunes, but that is not a total solution. So it was obvious that
we had something if we used it right. (White 2006). Mr. Bowman and others are
concerned that the ISPs might make life more diffcult for themthe phone com-
panies have stated that they want to charge fees for carrying bandwidth-intensive
programs like streaming video. Mr. Bowman notes that Just receiving a live feed
and sending a compressed version over the Web is diffcult. We didnt anticipate
how in-depth it all was. The 30 MLB teams fnanced MLB.com with an infusion
of $60 million and jointly own the organization. The site relies heavily on Akamai
Technologies to distributed the content to its 18,000 servers worldwidereducing
the bandwidth demands on any one server.
MLB.com charges $80 a season for fans to watch almost any live game they
choose. The site also uses software from Open Text to store and tag all of the con-
tentproviding customers with access to video clips, statistics, and other data in
a non-linear format. That is, fans can search for and select events to see, including
highlight clips and summaries of games. Justin Shaffer, VP and chief architect
for MLB.com noted that we wanted to take advantage of new media in order to
provide a better experience for baseball fans worldwide via MLB.comAs we
continue to catalog and distribute exciting game footage for our fans, our partner-
ship with Open Text ensures that we can easily provide those fans with the types
of products that match their needs, whether its game summaries, highlights or
other specialized cuts of video (Rosencrance 2005). In 2009, MLB launched its
own network on cable TV. Video from every major league game is routed to the
Secaucus NJ studios, compressed into HD and standard defnition video and then
routed to satellites for transmission by cable companies (Mark 2009).
Once fans are at the stadium, they need to pay for things like souvenirs, food,
and beer. And no one wants to stand around fshing for change and signing credit-
card slips. The San Francisco Giants were an early adopter of contactless payment
readers. Newer credit cards have RFID chips embedded in them and customers
simply hold the card a couple of inches from the reader to activate the payment.
Not many customers have the RFID cards yet, but it simplifes payments for those
who do have them. Ken Logan, IT director, also plans to issue season ticket hold-
ers with a special card that gets them into the stadium and handles payments at the
concessions by linking through a database back to the holders credit card. So far,
348 Chapter 5: Computer Security
Logan said the only drawback is just keeping people from spilling a beer on it.
They get pretty dirty and sticky (Mitchell 2007).
Any business wants to track its customers, and baseball is no exception. Teams
routinely send out e-mails and promotional information to ticket holders. In 2011,
a staffer for the New York Yankees sent a standard newsletter to several hundred
season ticket holders. The only problem is that a spreadsheet was attached to the
message that contained personal data for 18,000 season ticket holders. The spread-
sheet did not contain credit card data but it did have phone numbers, addresses,
names, seat numbers, and Yankee account numbers (McMillan 2011).
One of the more amazing technologies to be introduced to baseball was tested
in 2009 by Sportvision, a Bay Area company that developed the yellow frst-down
marker for football. The new camera and software system is designed to automati-
cally track the location of every ball and every player on the feld. It will have the
ability to generate data on how fast felders respond to hits, how hard they throw
the ball, and other statistics that have never existed before. The data could intro-
duce big changes in how defense is evaluated in baseball (Schwarz 2009). The
system was frst tested in San Francisco and uses four high-resolution cameras to
capture three-dimensional data. Sportvision tested the FIELDf/x system in the San
Francisco stadium in 2010 and was preparing to deploy it to other stadiums.
Umpires play a key role in any baseball game. As much as fans like to com-
plain about some of the calls, the talent and knowledge of the umpires is amazing.
It takes training and practice to stay up-to-date as a major league umpire. So MLB
and IBM teamed up to install special Web-based software to help umpires. Um-
pires use WebSphere technology to build mashups of the game, calls, and players.
They can leave notes for umpires at the next game. The portal lets them view
videos of certain plays, help analyze controversial calls, and provide detailed ex-
planations of rulings (Boulton 2008).
Questions
1. How are player privacy rights different from average citizens?
2. What procedures can be implemented to help protect players from identity
theft?
3. What are the benefts and drawbacks to centralizing the team Web sites for
MLB?
4. How could a team provide individual customized access to baseball games
via the Internet?
Additional Reading
Boulton, Clint, IBM, MLB Connect on WebSphere Web 2.0 Deal, eWeek, July
18, 2008.
Mark, Roy, MLB Network Launch Powered by Motorola, eWeek, January 9,
2009.
McGeever, Christine, Webcaster Under Fire, Computerworld, January 21,
2000.
McMillan, Robert, NY Yankees Staffer Accidentally e-Mails Customer List,
Computerworld, April 28, 2011.
349 Chapter 5: Computer Security
Mitchell, Robert, No Contact: Could Smart Phones Spur Contactless Payment
Card Adoption? Computerworld, June 11, 2007.
Rosencrance, Linda, Watching the Bottom Line From Box Seats,
Computerworld, August 6, 2001.
Rosencrance, Linda, MLB.com Scores with Open Text, Computerworld, April
26, 2005.
Rovell, Darren, Confdential Information Pulled From Online Auction, ESPN,
June 17, 2003.
Schwarz, Alan, Digital Eyes Will Chart Baseballs Unseen Skills, The New
York Times, July 10, 2009
White, Bobby, Major League Baseball Steps Out As Coach in the Game of Web
Video, The Wall Street Journal, March 27, 2006.
Wilder, Clinton, Redefning Business: A New Game Plan, Information Week,
April 9, 2001.
Summary Industry Questions
1. What information technologies have helped this industry?
2. Did the technologies provide a competitive advantage or were they quickly
adopted by rivals?
3. Which technologies could this industry use that were developed in other
sectors?
4. Is the level of competition increasing or decreasing in this industry? Is it
dominated by a few frms, or are they fairly balanced?
5. What problems have been created from the use of information technology
and how did the frms solve the problems?
350
Chapter Outline
Transactions and Enterprise
Resource Planning
6
Chapter
Introduction, 352
Data Capture, 353
Point of Sale, 354
POS Advantages, 358
Process Control, 359
Electronic Data Interchange (EDI), 360
Extensible Business Reporting Language
(XBRL), 364
Elements of a Transaction, 366
Vendor Perspective, 366
Customer Perspective, 366
Transaction Fees, 367
Government Perspective, 368
International Issues, 369
The Role of Accounting, 370
Input and Output: Financial Data and
Reports, 371
Purchases, Sales, Loans, and
Investments, 372
Inventory, 372
The Accounting Cycle, 373
Process: Controls, Checks, and
Balances, 375
Human Resources and Transaction
Processing, 375
Input: Data Collection, 376
Output: Reports, 377
Process: Automation, 377
Production Management, 378
Production Issues, 379
Distribution and Inventory Control, 380
Integration in Business, 382
Enterprise Resource Planning, 385
International Environment, 387
Financial Accounting, 387
Logistics, 388
Human Resource Management, 388
Integration, 389
Supply Chain Management, 390
SCM Changes the Focus, 391
SCM Challenges, 392
Integration across Systems, 394
Customer Relationship Management, 395
Multiple Contact Points, 395
Feedback, Individual Needs, and Cross
Selling, 396
CRM Packages, 397
Summarizing ERP Data, 398
Digital Dashboard and EIS, 399
How Does an EIS Work?, 400
Advantages of an EIS, 401
Transaction Accuracy: Sarbanes-Oxley, 402
Cloud Computing, 403
Summary, 404
Key Words, 406
Web Site References, 406
Review Questions, 407
Exercises, 407
Additional Reading, 410
Cases: Automobile Industry, 411
351 Chapter 6: Transactions and ERP
Ford Motor Company
How do you manage a huge organization? How can you integrate data from hun-
dreds of divisions scattered around the world? Bill Ford, great-grandson of Henry,
turned around the struggling manufacturer in the early 2000s. Along the way, he
made an amazing discovery: it is more important to sell vehicles at a proft, instead
of trying to just sell more at any cost. With hundreds of facilities, Ford, like the other
automobile manufacturers, has an immense job of ordering parts, keeping factories
scheduled, identifying cars and features that customers actually want, tracking pro-
duction, monitoring sales, and designing for the future. Having pioneered the mass-
production systems of the 1900s, Ford is only now learning to build a more fexible
manufacturing systemwhere one plant can produce different car makes. Informa-
tion technology plays a key role in making the factories and the entire operation
more effcient.
Although the company is publicly held, the family exerts signifcant infuence on
it. After former chairman and CEO Donald Petersen rubbed the family the wrong
way, he retired prematurely. Alex Trotman took the position in 1995 and hoped to
retain the Ford family support. On January 1, 1999, the disappointed Ford family
replaced Trotman as CEO with Jacques Nasser. Nasser came from the international
side of Ford, which was experiencing strong sales. In 2001, a series of crises, capped
by the Firestone tire recall on the Explorer led to high tensions in Ford and in the
industry. On October 29, 2001, Bill Ford, Jr., fred Jacques Nasser and installed him-
self as CEO. On September 5, 2006, the company replaced Bill Ford with Alan Mu-
lally from Boeing.
What You Will Learn in This Chapter
How do you process the data from transactions and integrate the operations of the
organization?
How do you effciently collect transaction data?
What are the major elements and risks of a transaction?
Why are transactions more diffcult in an international environment?
How do you track and compare the fnancial information of a frm?
What are the transaction elements in the human resources management system?
Can a company become more effcient and productive?
How do businesses combine data from operations?
How do you combine data across functional areas, including production, purchasing,
marketing, and accounting?
How do you make production more effcient?
How do you keep track of all customer interactions? Who are your best customers?
How can a manager handle all of the data in an ERP system?
How does the CEO know that fnancial records are correct?
Why do most companies avoid cloud computing for ERP systems?
352 Chapter 6: Transactions and ERP
Introduction
How do you process the data from transactions and integrate
the operations of the organization? This question has been asked re-
peatedly for centuries. In fact, it has driven the organizational structure of com-
panies. What were frms like in the 1800s or earlier? Most were small propri-
etorships. As frms became larger, how could they handle the thousands of daily
transactions? Hierarchical structures evolved to collect data at the point of sale,
summarize it, and move it up the chain of command to the CEO. Figure 6.1 shows
how transactional data is exchanged with customers, suppliers, manufacturing,
and banks, and summarized for higher-level decisions. Think about the problems
that arise if groups within the company (accounting, production, marketing, and
so on) all have different databases. When you have computers today that can cap-
ture all of the operations data automatically, do you still need a hierarchical struc-
ture? Instead, an integrated system running on a database can be used to share data
with everyone.
Whenever two people make an exchange, it is called a transaction. Transac-
tions are important events for a company, and collecting data about them is called
transaction processing. Examples of transactions include making a purchase at a
store, withdrawing money from a checking account, making a payment to a credi-
tor, or paying an employee.
Because of the importance of transactions, companies built systems to track the
various aspects, including accounting, human resources, and production. As com-
puter hardware, software, and database technology improved, it because clear that
companies needed integrated systems that held all of the data or enterprise-level
systems. These tools are complex, but can collect data on all aspects of the organi-
zation, including access for employees, managers, customers, and suppliers. The
Figure 6.1
Transactions and Enterprise Resource Planning Integration. The goal is to collect all
operations data and share it throughout the organization. Links to suppliers and banks
improve integration and provide more options for the frm.
Central Computer
Sales Reports
POS
Cash
Registers
Customers
EDI
Supplier
Bank
Process Control
Additional
Stores
Strategy
Tactics
Operations
Warehouse
Inventory
Management
CEO Information
353 Chapter 6: Transactions and ERP
integration of data from all areas of the organization from marketing, production,
human resources, and accounting leads to new methods of doing business.
Data Capture
How do you effciently collect transaction data? The basic compo-
nents of a transaction-processing system are illustrated in Figure 6.2. The focus is
twofold: accomplishing the transaction and capturing data. Data capture consists
of gathering or acquiring data from the frms operations and storing data in the
computer system. Entering data into the computer can be time consuming and dif-
fcult. For instance, banks have invested heavily in automating the collection and
recording of transaction data. Yet because many transactions are based on paper,
clerks still spend considerable time entering data. First, tellers enter the data into
their terminals. Then a bank staff reads the dollar value written on checks and
deposit slips. The bank staff works through the night, typing the amount into a
machine that codes the number on the bottom of the check so it can be read by
other computers.
As the volume of transactions increased, businesses looked for faster and more
accurate ways to get data into the computer. Four basic methods are used to col-
lect data, depending on its source. The data-collection method consumers are most
Trends
Because of legal ramifcations, businesses have always collected data about
transactions. Accounting systems play an important role in collecting and
analyzing transaction data. Through the 1960s, most business computers
were primarily producing basic accounting reports. Raw data was punched
into the computer by hand, and the computer produced totals and updated
the general ledger. In effect, the computer was used as a giant calculator to
automate the production of printed reports similar to those used before the
advent of computers. The primary reason for using the computer was speed
and accuracy. It was justifed because it was cheaper and less error-prone
than hiring thousands of people to produce the reports.
As computer capabilities increased in the 1970s, the most important
change was to use the computer to collect the raw data. In retail sales, the
cash register was replaced with a computer terminal and a bar code scanner.
Whenever a customer purchased an item, the transaction data was immedi-
ately sent to the main computer. This automation eliminated the need to hire
a person to enter the data at the end of the day.
The 1980s and 1990s resulted in more integration. Transaction data was
made available to managers throughout the company. One goal was to com-
bine the systems across the company into an enterprise system that enabled
managers to examine all aspects of the business.
By the late 1990s, integrated systems could support data for the entire
organization. Accounting packages handle all accounting information tasks,
HRM systems handle employee-related chores, and manufacturing systems
deal with production. These enterprise-level systems were designed from the
ground up to handle all of the major information tasks of a company. Be-
yond simple access to data, integrated systems make it possible to change
the way the company operate.
354 Chapter 6: Transactions and ERP
familiar with is point of sale (POS), where the sales register is actually a com-
puter terminal that sends all data to a central computer. On assembly lines, robots
and manufacturing equipment can collect data, such as quality control measures,
and return it to a computer. Typically the computer also can send control instruc-
tions to these machines. This exchange of data between manufacturing machines
and computers is known as process control. The third way to collect data au-
tomatically involves the exchange of information with organizations outside the
frm, especially suppliers and customers. Instead of dealing with paper records
such as purchase orders, it is possible to send orders electronically through a pro-
cess called electronic data interchange (EDI). The fourth method is to have the
customers select products and enter data directly into the electronic commerce
Web site. This fourth method offers the potential of reducing errors and costsif
the Web sites are built carefully and if the customers are motivated and capable of
selecting the products themselves.
Point of Sale
Several devices have been created to capture data at the point of the sale. Some
companies rely on keyboards to enter data, but high-volume areas have switched
to bar code scanners. All consumers are familiar with bar code scanners that read
the universal product codes (UPCs). The scanner reads the code and sends it to the
computer, which looks up the corresponding name and price. The computer prints
the receipt, stores the sale information, and automatically decreases the inventory
count.
Figure 6.2
Data should be captured as soon as it is generated. The operations level generates
data from many sources. Modern systems collect the data in a central database and
make it immediately accessible to managers.
Sales
Process Control
Banking and Finance
Workers
355 Chapter 6: Transactions and ERP
Another type of scanner is used by the U.S. Postal Systemoptical character
recognition (OCR)to read handwritten zip codes, allowing mail to be processed
and sorted faster. Even so, the post offce hires thousands of workers to type in data
that the scanners cannot read. Banks use a process called magnetic ink character
recognition (MICR) to process checks and deposit slips. MICR readers are more
accurate than straight OCR because they pick up a stronger signal from magnetic
particles in the ink. A few companies are using speech recognition technology
to enable workers to enter data by speaking to the computer. Speech recognition
enables the users to enter data while leaving their hands free to do something else.
The newest data-acquisition technology is radio frequency identifcation
(RFID). Bar codes have two major limitations: (1) they hold a limited
amount of data, and (2) even the best scanners have trouble reading
them. Basic bar codes can hold 10 digits, but 5 of those are used to
identify the manufacturing company, which leaves only 5 digits for
the actual product. As a consumer, you have certainly encountered bar
codes that are diffcult to read. RFIDs are small chips about the size of
a grain of rice that consist of an antenna and some transistors. When
the scanner sends a radio signal to the chip, the antenna receives
it and uses the radio waves to power the transistors and return the
stored data by modifying the scanner wave. For several years, people
have implanted the chips in their dogs in case the pet becomes lost and
loses his or her collar. The capacity and range of RFID chips depend on
the frequency (low, high, or ultra-high). The ultra-high frequency chips
can be read from the greatest distance (12 feet with a maximum of 40)
Reality Bytes: Pay By Phone
In 2011, several companies began a push to fnd a mechanism to use cell phones to
make everyday payments. The catch is that several technologies are available, but
no one can agree on which method to use. As Omar Green from Intuit points out,
Theres a lot of money at stake if its done right. Some examples include Star-
bucks, which has an application to display a pre-loaded Starbucks card on a smart
phone that the cashier can scan. The Bump application can transfer PayPal cash from
one phone to another. Laura Champers of PayPal noted that the company processed
$700 million in mobile payments in 2010a tiny fraction of the $70 billion it han-
dles in total. FourSquare also offers methods to transfer money to other phones. But,
none of them are likely to be adopted by typical retail vendors. Instead, the credit
card companies are trying to extend their reach through Near Field Communication
(NFC) which uses a chip similar to RFID with a shorter range. Put the credit card
number on a chip and put the NFC chip into a cell phone and customers can wave
the phone in front of a scanner. It is really just a credit card in a different format and
could be handled by taping a card to the back of a phone. The main wireless carriers
(Verizon Wireless, AT&T, and T-Mobile) also are trying to get into the game by cre-
ating the Isis network to work with Discover Financial. Some of the largest banking
companies have also been working on alternatives. But, without the support of the
credit card companies, it is likely to be diffcult to gain any traction with retail stores.
Adapted from Laurie Segall, Your Mobile Phone is Becoming Your Wallet, CNN
Online, January 19, 2011.
356 Chapter 6: Transactions and ERP
but hold only 12 bytes of data. The high-frequency chips are typically
scanned at less than a foot (with a maximum of 10 feet), but can hold
from 8 to 10,000 bytes of data. The ability to read the tags from a dis-
tance provides a substantial advantage in supply chain or warehouse
environments. Figure 6.3 shows that you no longer have to scan each
item from a few inches. You can walk down the aisles with a reader
and quickly pick up and distinguish the RFID tags from hundreds of
products at a time. The main drawback to RFID at the moment is that
the tags are relatively expensivearound $0.20 each. But if you have
to count inventory in a store or warehouse several times a year, the
RFID tags could save you substantial time and money, plus provide
improved accuracy. The scanners also have limitations on the number
of items they can recognize at one time. For example, it is doubtful that
a single scanner could read the RFID tags from an entire truckload of
products at one time.
Wal-Mart and the U.S. Department of Defense are pressing suppli-
ers to put the tags on all items shipped to Wal-Mart. Using their domi-
nant market position, Wal-Mart is asking suppliers to bear the cost of
the tags. However, at this point in time, it is probably not economically
feasible to include the tags on small, low-price items. Instead, the tags
are typically placed on pallets or boxed shipments. RFID tags at this
level will probably not be useful in the store itself, but it will help to
identify items received and track them through the supply chain deliv-
ery system.
C
B
E
antenna
Capacitor:
Collected energy
Transistors:
Data
RFID tag
RFID reader
Radio/microwaves
Data:
Alter the waves
Figure 6.3
RFID capture. The antenna on the tag captures the power from the radio signal to
release the data in the transistors and modify the wave signal so that the stored ID
can be retrieved.
357 Chapter 6: Transactions and ERP
Ultimately, if tags become cheap enough to place on all items, re-
tail stores might be able to radically alter their format. For instance,
scanners could be embedded in shopping carts or doorways. Customers
would simply select the items, and get an immediate price and running
total. Payment could be virtually automatic as well, so customers could
skip the checkout lanes. Cart-based systems could also suggest related
products or direct customers to aisles with similar products. Sound far-
fetched? Albertsons (a grocery chain) began experimenting with these
tools in some of its stores in 2003. Most customers were reluctant to
use hand scanners and scan everything themselves, but if RFID tags
could be used to simplify the process, it might be more useful.
Some privacy advocates have argued against RFID tags on the
grounds that if all of your clothes contained these tags (as originally
proposed by Benetton), it would be possible to track individual people.
However, the limited range of the scanners, coupled with the ability to
deactivate or remove the tags, can reduce or eliminate this problem.
Two-dimensional codes (squares) are used in some operations. UPS
was one of the frst to use them to route and track packages. Today, the
QR code standard developed by Denso Wave Incorporated in Japan is
available for many purposes. Figure 6.4 shows a sample QR code that
was generated from an online Web site. Increasingly, cell phones with
cameras can be used to take a picture of a QR code and the encoded
data provides a link to a Web site with detailed information. Several
Web sites will generate QR codes for free based on the data or Web site
you enter. Although the extra data capacity can be useful for packages,
the power of smart phones makes the QR codes appealing to market-
ers. Products, displays, even billboards now carry QR codes to encour-
age people to obtain background information. Cities, such as New York,
are adding the codes to various places, such as bus stops, parks, and
public documents. Museums and public art displays are adding them
to provide background information about various pieces.
The QR code examples point out some important features of transac-
tion data. Primarily, the format has to be standardizedand it helps
RealityBytes:NewJob:ChiefDigitalOffcerofNYC
With the increased sales of smart phones, more people are carrying around devices
that be used to obtain and share information. The QR code is a useful method to tag
items so people with smart phones can quickly receive information about objects
carrying the code simply by taking a picture of the code. New York City hired Ra-
chel Sterne as a chief digital offcer to help fgure out where to put the codes. The
City uses the codes on building permits to enable people to link to the underlying
blueprints and construction records. Residents also suggested putting the odes on
mass-transit locations, such as bus stops so riders can use them to get up-to-date
schedules. Other suggestions included parks and art workto provide detailed data
to interested viewers.
Adapted from Zachary M. Seward, Where Should New York Place QR Codes?
The Wall Street Journal, February 24, 2010.
358 Chapter 6: Transactions and ERP
if the standard is free of royalty payments. Also, the codes need to con-
tain enough data to be useful. The old bar codes, and even RFID chips
do not contain much data. Larger capacity also improves the capability
of the code to handle error correctionwhere the data can be recovered
even if some of the code is destroyed or covered. The presence of low-
cost readerssuch as cameras on cell phonesensures the adoption
and spread of the code.
POS Advantages
Several advantages arise from using automated data entry. Directly capturing data
means fewer errors occur because the machines make fewer mistakes. However,
sometimes it is not easy to collect data at the source. POS systems also have built-
in error detection methods to make certain the numbers are read correctly. By
collecting the data immediately, it is easier to fnd and correct mistakes. If a clerk
using a POS system enters an incorrect product number (or the scanner reads it
incorrectly), the error can be caught immediately.
With POS data collection, the computer performs all necessary computations
immediately. Hence, the job is easier for clerks and fewer errors will occur. For
example, a retail store might give discounts to certain customers. With a POS
system, the employees do not have to keep track of the customers or discounts,
because the computer can look up the discounts and apply them automatically.
Similarly, prices are maintained and changed by the computer. To hold a sale, you
simply change the price in the computer (one place) and put up a new sign. Of
course, when there are thousands of items and prices, there are still plenty of op-
portunities for errors.
POS systems also can provide better service to customers. Because the sales
data is captured immediately, the managers and clerks always know the inventory
levels. If a customer calls to learn whether a product is in stock, the clerk can in-
stantly determine the answer. With most systems, it is possible to tell the computer
to hold that item until the customer picks it up. Some companies even connect
their store computers together. If you fnd that one store has run out of a particular
item, the clerk can quickly check the other stores in the area and tell one to hold
the item for you.
Figure 6.4
QR codes. A two-dimensional bar code that can contain thousands of characters, the
QR code was initially created to track auto parts by Denso Wave, Inc. in Japan. Most
cell-phone cameras can read the codes so it is often used to link viewers to Web sites
containing marketing or background information.
359 Chapter 6: Transactions and ERP
Process Control
Manufacturing frms often deal with a different type of data. Most factories use
machines that can be connected to each other and to computers. The computers
can exchange data with the production machines. If you want to alter your prod-
uct, you would need to change the manufacturing settings on several different
machines. If the production line has 10 machines, each with 5 control items that
need to be set, it could take several hours to reset the entire production line. And
then you have to test and verify every setting. Even a minor change in the product
means that someone has to set each of the machines correctly. By connecting the
machines to a computer, the computer can store the appropriate settings. When
you make a change in the product, the computer sends the correct settings to all
the machines. Computers are often used to monitor the progress of the produc-
tion line. The data is used to identify problem spots and to help the frm meet
production goals. Figure 6.5 illustrates the basic concept of individual machines
controlled from one location.
Technology also can be used to collect data from manufacturing machines.
With this communication, the computer can constantly monitor production levels.
Managers can keep track of hourly and daily production, and even track individ-
ual products. If a customer wants to check on the progress of a special order, the
manager can determine how much of the product has been produced and when it
is likely to be completed.
Process control computers can also be used to monitor quality in the manufac-
turing process. Sensors can automatically measure almost any characteristic. They
can check for items such as thickness, weight, strength, color, and size. These
Figure 6.5
Process control is the control of production machines from centralized computers.
The computers monitor data from the machines and make continual adjustments. The
central control enables designers to specify all production settings from one location.
Various Production machines: lathe, press, dryer, . ..
Control Terminal
Production data:
Quantity
Quality
Time
Machine states
Control settings
and commands
360 Chapter 6: Transactions and ERP
measurements can then be passed to a computer. If the computer notices a trend or
a major problem, it can notify the operators. In some operations, the computer can
send messages to the machine causing the problem and reset its controls to correct
the problem automatically.
Two basic diffculties exist with process control. First, the large number of ma-
chines makes it diffcult to establish standards, making it harder to connect the
various machines together. Second, production machines can produce an enor-
mous amount of data. Some machines can generate billions of bytes of data per
hour. This large amount of data requires effcient communication lines, high-speed
computers, and a large storage capacity. Despite these complications, process con-
trol can provide enormous advantages. It enables companies to change production
processes and alter products faster and more often. It provides better information
and control over quality. It enables manufacturers to create products that match
the needs of individual customers: mass customization.
Electronic Data Interchange (EDI)
EDI is a form of automated data entry that supports operations by transferring
documents between frms electronically. The essence of EDI is the ability to
transfer data among computers from different companies. The goal is to connect
to suppliers so that production orders can be sent automatically at substantially
lower cost than traditional paper-based systems. Two basic methods are used to
accomplish the transfer: (1) send the data directly from one computer to the other
or (2) send the data to a third party that consolidates the data and sends it to the
proper location. Early EDI implementations were based on direct connections as
individual frms experimented with the technology. In both methods, two impor-
tant considerations exist: establishing the physical links and transferring data in
a format compatible to all users. The frst issue has largely been solved with the
Internet. Today, EDI connections can be established through e-mail or Web site
links.
For EDI to work, each company must translate its data into a form that can be
used by the other companies. If one company like Wal-Mart or GM takes the lead
Reality Bytes: Mobile Payments a Tough Sell Without Credit Card Companies
Wireless carriers announced the intention to scale back plans for payments by phone
only a couple of months after the joint venture Isis was formed. The goal was to
create a new payment method involving cell phones, where carriers would take a
percentage of transaction revenue. The main problem was that the system would
compete directly against credit-card companies, notably Visa Inc. and MasterCard
Inc. Retail merchants and customers are unlikely to use a system that does not in-
clude the two biggest players in payments. Drew Sievers, CEO of mFoundry which
provides mobile banking technology, noted Not including the 800 pound gorillas of
the industry will make it very hard to succeed. But, the card companies do not need
the carriers, so they no longer have a way to take a cut of the revenue. A Nilson Re-
port notes that in 2010, 57.2 percent of debit or credit card purchases were handled
through Vias, and another 25 percent by MasterCard.
Adapted from Robin Sidel and Shayndi Raice, Pay-by-Phone Dialed Back, The
Wall Street Journal, May 4, 2011.
361 Chapter 6: Transactions and ERP
and requires suppliers to send data via EDI, then they are free to defne the base
transaction objects. Suppliers must translate their objects into the appropriate EDI
structure. Yet a supplier might need links to several customers. If each customer
used different EDI defnitions, the supplier must have a conversion system for
each link. Someday it might be possible to create standards for EDI connections,
forcing everyone to conform to one type of data defnition. Although there is some
progress in this area, frms with existing EDI systems will be reluctant to spend
the money to convert their data.
Data conversion might sound like an easy task, but it is complicated when the
transaction systems were created over long periods of time and were poorly docu-
mented. In many cases, the programmer might have to search major portions of
the corporate systems to fnd the appropriate data defnitions. Once the appropri-
ate data is found, it can be hard to modify. Existing programs might expect the
data to maintain specifc formats. Making changes to the data can require rewrit-
ing other programs.
The concept of EDI is closely tied to Supply chain management (SCM) which
revolves around purchasing, but also incorporates just-in-time delivery, searching
for competitive pricing, and controlling and monitoring quality.
Proprietary EDI
As displayed in Figure 6.6, most of the early EDI systems were created indepen-
dently: one large company required suppliers to provide data and accept orders
electronically. The goal was to cut the costs of transactions and speed up the or-
dering process. EDI arrangements also enabled manufacturers to improve quality
control and to implement just-in-time inventory systems. Suppliers were encour-
aged to adopt the EDI systems by threatening a loss of sales if the vendors did
not comply.
Reality Bytes: QR Codes from Ethical Bean Coffee Co. Connect to Customers
Ethical Bean Coffee Co. is a small three-store chain of coffee shops in Vancouver,
British Columbia. Similar in some ways to Seattle, Vancouver has a surplus of coffee
shops on every corner. Seeking a way to stand out, in 2010, Ethical Bean started put-
ting QR codes in its train ads. When customers use their smart phones to scan the QR
Code, a menu appears on their screens. Customers can order a cup of coffee while
riding the train and pick it up when they arrive at the Ethical Bean shop. CEO Lloyd
Bernhardt notes that business has doubled since adding the QR codes and that We
catch people who are on the go and dont have a lot of time. QR codes are easy to
generateseveral Web sites make it easy to enter a URL or e-mail address and will
generate the square bar code free. Scanbuy, Inc., a New York company that develops
QR code advertising estimates that 30 million U.S. people have a code reader on
their phone. Companies still have to print and distribute the codes in their advertis-
ing. Ryan Goff, director of social-media marketing at MGH, Inc. cautions that QR
codes are not the end-all, be-all. They may not exist in two years. But theyre a tem-
porary solution to the problem of How do you connect people to online things in the
real world?
Adapted from Emily Glazer, Target: Customers on the Go, The Wall Street Jour-
nal, May 16, 2011.
362 Chapter 6: Transactions and ERP
With proprietary systems, the lead frm establishes the standards in terms of the
hardware and the types and format of data to be exchanged. From the standpoint
of the lead frm, these controls ensure that they are able to connect to each supplier
with one standard technique.
To a supplier, proprietary systems created by one company can lead to prob-
lems. Imagine what happens when the supplier sells to several frms, and each frm
requires the use of a different EDI system. In addition to the hassles of providing
data in the proper format for each customer, the suppliers employees would have
to learn how to use several different systems. Purchasers face similar problems
unless all of their suppliers follow a standard.
EDI Standards and Te Internet
Multiple proprietary systems lead to confusion and higher costs. Consequently,
several companies have tried to push for standards that make it easier to share
data. Two primary standards exist for EDI messages. The UN sponsors the Edifact
standard; the United States defned the ANSI (American National Standards In-
stitute) X12 defnition. Figure 6.7 shows the overall structure of an EDI message.
A signifcant difference between the standards is in the numbering system used to
represent the types of messages, segments, and data elements. Figure 6.8 presents
a partial list of the segment types available in the X12 standard. The standards
also specify the exact format of the data required in each segment type.
Web sites are used to advertise and display information about products and
their availability. Search engines enable companies to fnd components and poten-
tial suppliers quickly. EDI transactions such as orders and request-for-prices can
Figure 6.6
EDI can be built from individual pair-wise links over proprietary connections. If the
majority of transactions are between two companies, this method will work fne. If
companies deal with many different suppliers or large customers, this method can
cause problems when each link requires conversion to a different format.
Supplier
Customer 1
Queries &
Orders
Invoices &
confirmation
Order
Database
& Accounts
Customer 2
Production
Database
& Accounts
Convert
Convert
363 Chapter 6: Transactions and ERP
Figure 6.7
EDI standards. UN Edifact and U.S. ANSI X12 standards are similar in format; each
message consists of segments and detailed data lists. Each message, segment and data
element are defned by numbers from a predefned list of possible transactions. There
are substantial differences in the numbering system used for the segments and data.
Message
Segment
Composite Data Element
Data Element
Code Lists
Figure 6.8
Sample segment codes for ANSI X12. A partial list of the codes used within X12 EDI
messages. Only the number is transmitted. Each segment specifes the format of the
additional data.
104 - Air Shipment Information
110 - Air Freight Details and Invoice
125 - Multilevel Railcar Load Details
126 - Vehicle Application Advice
127 - Vehicle Buying Order
128 - Dealer Information
129 - Vehicle Carrier Rate Update
130 - Student Educational Record (Transcript)
131 - Student Educational Record (Transcript) Acknowledgment
135 - Student Loan Application
139 - Student Loan Guarantee Result
140 - Product Registration
141 - Product Service Claim Response
142 - Product Service Claim
143 - Product Service Notifcation
144 - Student Loan Transfer and Status Verifcation
146-RequestforStudentEducationalRecord(Transcript)
147-ResponsetoRequestforStudentEd.Record(Transcript)
148 - Report of Injury or Illness
364 Chapter 6: Transactions and ERP
be handled over the Internet as e-mail messages. The Internet can also host secure
communication channels between two partners. These links can be used for high-
volume exchanges of data.
Extensible markup language (XML) was developed in the last couple of
years to provide better Internet support for EDI. At its foundations, XML is a tag-
based document that contains data. As shown in Figure 6.9, the tags indicate the
type of data contained within the document. The document can have a hierarchical
structure similar to the EDI standards, such as Order OrderItem Product. Vari-
ous industry groups have been establishing standard document formats (data type
defnition or DTD) for common documents within their industries. Many software
packages can read and write XML documents, so companies can use diverse hard-
ware and software and still communicate easily.
Figure 6.10 shows the sample XML document using a browser. XML is the
means to exchange data in a form that all computers can read. At least, that is the
promise and hope. XML is still evolving and is still relatively expensive to imple-
ment because it often requires customized programming on both ends to handle
the data. Software vendors are developing tools that incorporate XML automati-
cally, and suppliers will be able to purchase the software needed to handle the
multiple connections to customers.
Extensible Business Reporting Language (XBRL)
The Securities and Exchange Commission (SEC) is responsible for monitoring
fnancial aspects of businesses in the U.S. to protect investors and maintain fair,
orderly, and effcient markets. The SEC collects and publishes fnancial data by
<?xmlversion="1.0"?>
<!DOCTYPEOrderListSYSTEM"orderlist.dtd">
<OrderList>
<Order>
<OrderID>1</OrderID>
<OrderDate>3/6/2004</OrderDate>
<ShippingCost>$33.54</ShippingCost>
<Comment>Needimmediately.</Comment>
<Items>
<ItemID>30</ItemID>
<Description>Flea Collar-Dog-Medium</Description>
<Quantity>208</Quantity>
<Cost>$4.42</Cost>
<ItemID>27</ItemID>
<Description>AquariumFilter&Pump</Description>
<Quantity>8</Quantity>
<Cost>$24.65</Cost>
</Items>
</Order>
</OrderList>
Figure 6.9
XML for EDI. Data is sent in a standard format that is easy for computers to parse
and read. Industry groups have been establishing standard formats and tags for
exchanging EDI data within their industries.
365 Chapter 6: Transactions and ERP
frms, including annual reports, balance sheets, and income statements. The com-
mission has required frms to submit data electronically for several years. In 2011,
the commission moved to require most companies to submit data using a new
standard: extensible business reporting language (XBRL). XBRL is largely an
XML-based system for tagging specifc fnancial data. Background information is
available at www.xbrl.org, and www.sec.gov/xbrl.
The accounting discipline has been around much longer than computers have.
Although one goal of accounting is to create standardized views of company per-
formance, accountants and companies have evolved different terms over time. For
example, revenue, earnings, and income are all terms that have been used to rep-
resent the same concept, and any fnancial document might use different varia-
tions of these terms. These differences make it diffcult for computers to read and
extract data from fnancial statementseven if they are in HTML or other digital
format. XBRL is designed to encourage accountants to tag all of the data in a
statement with a standardized name so that it can be retrieved electronically.
Of course, fnancial reports are more complex than just lists of numbers. For
example, they include footnotes and descriptions. And even the data contains oth-
er attributes such as the time period and currency. XBRL has tags and options to
handle most of these issues. Figure 6.11 shows a simple example of a tag that is
used to display the Revenue for a specifed year. This tag can be embedded in a
typical XHTML document which can handle the overall layout and formatting.
The attributes on the <ix > tag provide the type of data (name=ifrs:Revenue),
the units or currency EUR, and the actual data to display (6,863,545).
Figure 6.10
XML document. XML is designed to transfer data between companies and
computers. You can defne any type of tag to describe the data.
366 Chapter 6: Transactions and ERP
Unlike typical XML, XBRL is not designed for transferring transaction or EDI
data. Instead, the tags are defned specifcally for reporting summary data. Yet,
this data is increasingly used by many people: investors, banks, fraud investiga-
tors, and so on.
Elements of a Transaction
What are the major elements and risks of a transaction? Transac-
tions are a critical foundation of modern economic societies. In many ways, trans-
actions defne and enable different types of societies and cultures. A transaction
consists of an exchange of a product or service for money. Consequently, there is
always a risk that something might go wrong in the exchange. Figure 6.12 sum-
marizes the transaction risks that are borne by the vendor, the customer, and the
government. The laws and culture determine how these risks are minimized.
Vendor Perspective
At heart, a vendor cares only about one fundamental aspect of transactions: re-
ceiving the money. This simple statement has several complicating factors: (1) the
payment might never arrive, (2) the payment might be fraudulent, (3) the custom-
er might repudiate the transaction and withhold the money, or (4) the government
might invalidate the transaction.
In older times, these risks were minimized through personal reputation of the
customer and money based on precious metals. More recently, in our mobile,
anonymous society, credit card companies have stepped in to assume much of this
vendor riskfor a price. The credit card companies and credit bureaus provide
identifcation and personal reference services. Under the proper conditions, the
card companies effectively guarantee payment to the merchant. The conditions
primarily consist of (1) keeping good transaction records and (2) identifying the
customer through either a magnetic swipe of the card or a signature.
Customer Perspective
In some ways, customers face a more complex set of risks. Their primary concern
lies in receiving the identifed value for their money. Specifcally, they want to
be sure that (1) they receive the product or service that they ordered, (2) they are
charged only the amount they agreed to pay, (3) the seller does not repudiate the
Figure 6.11
XBRL document element. Note that all of the data elements are tagged with
standardized identifers and with attributes that specify the time frame and currency.
Source: http://media.ifrs.org/ixbrl_example1_2011-03-25.xhtml
<ix:nonFraction
contextRef="y2012"
format="ixt:numcommadot"
name="ifrs:Revenue" unitRef="EUR"
decimals="0" scale="0"
id="XWAND00000326">
6,863,545
</ix:nonFraction>
367 Chapter 6: Transactions and ERP
transaction such as by claiming the product was stolen, and (4) the transaction is
legalfor example, not stolen goods that could be confscated.
In older times, these risks were small when customers shopped at local stores,
could physically examine the goods, paid in cash, and received a written receipt.
Identifcation and reputation of the merchant were critical. Even so, fraud was
a problem. Again, credit card companies stepped in to reduce much of this risk.
Today, credit card companies warranty products, ensure delivery, and validate the
merchants.
Transaction Fees
While often invisible to consumers, the fee for using a credit card consists of a
percentage of the transaction cost paid by the merchant. Of course, economics
shows that the price of the product refects a portion of this fee, so the consumer
and merchant both bear the cost. The cost depends on the size of the merchant, the
card company, and the size of the transaction. Typical fees are 1.5 to 5 percent,
with minimum costs of about ffty cents per transaction.
What about payments by check instead of credit card? In this case, the vendor
bears a relatively high risk that the check is invalid or will be refused for insuff-
cient funds. While there are laws against check fraud, the merchant would experi-
ence high costs to recover the money. Consequently, vendors generally contract
with specialist frms to validate and process checks. Again, the merchant pays a
fee to transfer this risk to another company.
Vendor
Customer
Government
1. Receive payment.
2. Legitimate payment.
3. Customer not repudiate sale.
4. Government not invalidate sale.
1. Receive product.
2. Charged only as agreed.
3. Seller not repudiate sale.
4. Legal transaction.
1. Transaction record.
2. Tax records.
3. Identify fraud.
4. Track money for other cases
(drugs and terrorism)
Credit card company
accepts risks for a fee.
Figure 6.12
Transaction risk factors. Risk elements and causes vary depending on the transaction
method. Laws and business procedures are created to minimize these risks, so new
laws are needed when transaction methods change.
368 Chapter 6: Transactions and ERP
Government Perspective
When discussing transactions, many people forget about the perspective of the
government or society. Yet several government organizations have a strong inter-
est in transactions to protect various members of society. The primary interests
include (1) an auditable record of transactions and fnancial statements for the
protection of investors, (2) a record of taxable transactions for the collection of
sales tax, (3) identifcation and tracking of fraudulent transactions, and (4) general
tracking of money used in transactions to monitor other types of crimes, such as
drugs and terrorism.
Most government interests are established by laws and administrative rules that
are enforced through manual audits of fnancial documents. Some data is collected
from transaction partners, such as the $10,000 cash reporting rule in the United
States. On the other hand, governments are rapidly becoming aware of the juris-
dictional problems inherent in electronic commerce. The most prominent issue is
the inability of states to force out-of-state frms to collect sales taxes for them.
After a few embarrassingly huge fraud cases in the upper echelons of compa-
nies in the early 2000s, Congress got tired of hearing CEOs trying to avoid crimi-
nal charges by saying they did not know anything about the problems created by
their underlings. So, Congress passed the Sarbanes-Oxley Act that requires exec-
Reality Bytes: You Cannot Buy That
Most people are comfortable buying just about anything using credit and debit cards.
But, many people are not aware that the card companies prohibit them from buying
certain items. Currently, the list is relatively short, but the point is that the card com-
panies do have this power and no oversight or appeal process exists. What items are
banned? The basic list is gambling chips (in casinos), online gambling, online por-
nography, donations to at least one non-proft organization (WikiLeaks), and medi-
cal marijuana. The online gambling case is understandable, because online gambling
has been declared illegal by the U.S. government. Medical marijuana falls into the
same category. Although some states have made it legal to buy small amounts of
marijuana, the federal government still outlaws the purchase of marijuana, so card
companies are concerned about their liability. Still, some customers want the option
to use their cards for all purchases. The issue of gambling chips is much harder to de-
fendand the card companies have not even tried to explain. Note that they do allow
gamblers to withdraw cash using their cards at casino ATMswith exorbitant fees
and interest charges. The online pornography issue is defended by noting that the
number of chargeback claims on those transactions is huge, so the card companies
are trying to reduce fraud costs. Still, it should be possible to institute more secure
methods for people who want to use their cards. Blocking donations to WikiLeaks is
far more disconcerting. Yes, the U.S. government leaned on banks and card compa-
nies to block transfers to the site. But, it was not a U.S. organization, and WikiLeaks
has never been tried in a court for any legal violations. As John M. Simpson from
the non-proft Consumer Watchdog put it You ought to be able to use a credit card
for any legal purchase. It seems to me that credit card companies are imposing their
moral values on the world.
Adapted from Quentin Fottrell, What Your Credit Card Won't Let You Buy, The
Wall Street Journal, May 31, 2011.
369 Chapter 6: Transactions and ERP
utives to take responsibility for all fnancial reports. The top executives have to
certify that the accounting reports accurately represent the status of the frm. The
act has scared many executivesnot enough to give up their huge salaries and
pensionsbut they are beginning to search for ways to validate the transaction
and fnancial systems. It is no longer suffcient to just record transaction data
now frms have to institute processes and ensure that people follow them to guar-
antee that the correct data is being recorded.
International Issues
Why are transactions more diffcult in an international envi-
ronment? In the early stages of e-commerce, several people suggested that the
Internets global reach would make it easy even for small businesses to sell prod-
ucts internationally. However, several factors interfere with international sales.
Figure 6.13 summarizes some of the major points involving sales into other na-
tions. Jurisdiction for dispute resolution is a major issue. Nations have many dif-
ferent laws and cultures. Tactics (and content) that might be commonplace in one
country could be illegal in another nation. Gambling is a classic example. The
United States might ban gambling on the Internet, but how can it enforce that law?
On the other hand, if a U.S. citizen has a dispute with an overseas casino, there
would be few options to protect the consumer. Similarly, fraud and Web attacks
can easily originate from several different nations. Varying laws and lack of coor-
dination make it diffcult to identify and prosecute the perpetrators.
Privacy and payment methods present additional challenges. The European
Union has privacy rules that are substantially stricter than those of other nations,
and it does not want international companies transferring personal data to comput-
Figure 6.13
Some international issues with transactions. The basic issues of language, exchange
rates, and tariffs are straightforward. Processing shipments through customs can be
challenging. Bigger problems arise if something goes wrong because of the different
jurisdictions.
Shipping
Currencies
Languages
Customs and taris
Jurisdiction for disputes
Dierent laws and systems
Verify seller and purchaser
Payment methods
370 Chapter 6: Transactions and ERP
ers outside of the Union. Identifying vendors and customers is also problematic
when nations utilize different payment mechanisms. Although the major credit
cards are accepted in many nations, many people do not use them. For years,
transactions between international businesses were largely handled with special-
ized documents issued among large international banks. With the increasing im-
portance of the Internet, leading to international sales to individuals, these issues
become more diffcult to solve. Credit card companies and banks largely protect
consumers, but international crime makes the task more complex. More impor-
tantly, vendors are largely unprotected so many companies are reluctant to sell
directly to international customers.
Te Role of Accounting
How do you track and compare the fnancial information of a
frm? Accounting systems are important because they extend throughout the
company and because they focus on money. They are used to collect data and
evaluate performance. Accounting systems also enable managers to combine the
many divisions into an integrated picture of the entire company. Accounting sys-
tems also provide controls over the data to ensure accuracy and to prevent fraud.
The primary purpose of accounting is to collect the fnancial data of the frm, en-
sure that it is accurate, and create standard reports. It is hard to capture all of the
elements of an accounting system in one illustration, but Figure 6.14 summarizes
the essential components of an accounting system. The accounting transaction
system can be examined in terms of inputs, outputs, and processes.
If you are not going to be an accountant, why do you need to understand ac-
counting, and why review it in an information systems book? The short answer is
that the accounting information system provides the foundation data for the frm.
Reality Bytes: More Ways to Transfer Money Online
American consumers rarely use checks or cash. Credit and debit cards are still im-
portant in transactions, but online payment methodsparticularly PayPalcontinue
to grow in popularity. In May 2011, three of the largest banks in America announced
a new service to make electronic payments. The banks involved (Bank of America
Corp., Wells Fargo & Co., and J.P. Morgan Chase & Co.) are in a joint ventured
named clearXchange. Mike Kennedy from Wells Faro and chairman of the new ven-
ture, noted that Customers want to move payments from paper to electronic meth-
ods, so if we can meet our customers fnancial needs, they will be better customers
with us. The service will rely on the cell phone and is aimed at person-to-person
transfers. Money will be transferred directly from checking accounts to another ac-
count based on a linked e-mail address or phone number. Initially, the service was
released in Arizona and carried no transaction fees; but banks might eventually add
fees for the service. Small businesses could also use the technology to avoid paying
processing and merchant fees for credit and debit cards. A survey by consulting frm
Aite Group LLC noted that in 2010 U.S. households made $865 billion in payments
between individuals in 11 billion transactions. Dividing by the number of households
yields an average of $7,500 and 96 transactions per household.
Adapted from Robin Sidel and Amir Efrati, Big Banks Join Battle for Online Pay-
ments, The Wall Street Journal, May 25, 2011.
371 Chapter 6: Transactions and ERP
The longer answer revolves around the fact that the accounting process is increas-
ingly automated in companies. As a result, all managers have to understand and
analyze accounting data. You will have access to basic accounting data and reports
directly from the computer. It will be your responsibility to monitor the changes
and understand the effects.
Input and Output: Financial Data and Reports
Raw fnancial data is collected by the accounting department and stored in an ac-
counting journal. Modern accounting requires the use of a double-entry system
to ensure accurate data. In a double-entry system, at least two entries must occur
for every transaction. Generally, one entry records the effect of the money (e.g.,
cash, accounts payable, accounts receivable), and the other refers to a specifc
category (e.g., sales, offce expenses, commissions). Each entry includes the date,
amount of money, account number, the name of the person or frm involved, per-
haps a comment, and the name of the person making the entry. The journals pur-
pose is to record all the transactions.
Journal entries represent raw data. To be useful, this data must be transformed
into information. The frst step is to categorize the data by accounts or categories,
which is the purpose of the general ledger. The ledger is a collection of accounts
that break the data into specifc categories. Common categories include accounts
receivable, accounts payable, inventory, and cash. Although some standards
Suppliers
Customers
Management
Shareholders
Banks
and
Creditors
Departments
& Employees
Sales &
Accounts
Receivable
Produce
Management
Accounting
Reports
Produce
Shareholder
Reports
Sales & Receivables
Inventory Changes
Purchases &
Payables
Loans & Notes
Expenses
Equity
Shareholder
Reports
Management
Reports
Product
Inventory
Orders &
Accounts
Payable
Inventory
Management
& Fixed Asset
& Cost Acct.
Payroll &
Employee
Benets
Cash
Management,
Investments,
Foreign
Exchange
Supply &
in-process
inventory
Governments
Tax
Filing &
Planning
Strategic
& Tactical
Planning
Inventory Changes
Payables
Capital Acct
Sales Tax
Tax Filings
Tax data
Receivables
Inventory &
Assets
Payroll
Planning Reports
Planning
Data
Figure 6.14
Transaction processing is a major function of the accounting system. The accounting
system collects data throughout the company and produces consolidated (centralized)
reports that are used for planning and management.
372 Chapter 6: Transactions and ERP
exist, each company can defne its own chart of accounts, which allows owners
and managers to examine data on whatever categories are important to their frm.
Defning the chart of accounts is one of the important steps in managing a busi-
ness because it defnes the type of information you will examine on a daily basis.
For managers to make comparisons between divisions and other frms, ac-
counting systems produce standardized reports. Most companies produce balance
sheets, cash fow statements, and income statements every quarter. These reports
are produced following standard accounting rules to enable owners, managers,
and investors to compare the fnancial positions of various companies over time.
Purchases, Sales, Loans, and Investments
One of the primary purposes of accounting is to record the fnancial transactions
with external organizations. In addition to collecting the raw data, the accounting
system contains controls that minimize fraud by limiting access to the data. The
system also creates summary and detail reports to monitor key information.
Managers often build exception reports into the accounting system that are
triggered when some event occurs. If sales in some region suddenly drop, if there
is a major increase in the cash balance, or if inventories fall below a defned lev-
el, a message will be sent to the appropriate manager. The manager typically re-
sponds by searching the recent summary reports for a possible cause.
Inventory
Most organizations need to control inventory carefully. Retail stores fnd it hard to
sell items that are not in stock. Manufacturing frms need to receive and process
parts as cheaply as possible. Inventory control consists of knowing exactly what
Reality Bytes: Vending Machine Payments
Vending machines can be useful, but they typically have one big problem: They only
accept cash. Today, people buy most items with credit and debit cards. If people
could pay with cards or even their cell phones, it is possible that sales at vending
machines would increase. In 2009, U.S. sales fell 10 percent to about $20 billion
partly because of the recession. Operators would also gain data on specifc sales so
items would be less likely to run out and they could track the top- and weakest-
sellers. The technology exists, so the decision seems straightforward. The problem is
that the technology is relatively expensive. And most vending machines are run by
small frms who cannot afford the technology. John Mitchell Jr. runs one of larger
operations. Treat America Ltd. Of Merriam Kansas, runs about 12,000 vending ma-
chines. He notes that Youre catering to a population that might be as small as 30 or
40 people. The unique preferences of that population can drive sales signifcantly.
The company originally stocked machines based on average preferences of the re-
gion. In January 2010, Mr. Mitchell converted about 40 percent of his machines to
record real-time sales data; which showed that about 40 percent of the 45 slots were
dead spirals selling fewer than one item per week. Installing a wireless system
costs about $300 on a $3,000 machine, and vendor proft margins are typically only
one or two percent.
Adapted from Ilan Brat, Restocking the Snack Machine, The Wall Street Journal,
August 3, 2010.
373 Chapter 6: Transactions and ERP
items are available and where they are located. The system also needs to deter-
mine when to place new orders. It must then track the orders to make sure each
item is delivered to the appropriate location at the right time. With EDI, the inven-
tory control system can monitor current sales and automatically place orders with
the supplier.
Manufacturing frms use these systems to implement just-in-time inventory
control. The computer system monitors the current production requirements,
keeps track of deliveries, and electronically sends orders to the suppliers. The sup-
pliers then deliver the parts just as they are needed on the production line.
Automated inventory control systems also help identify and prevent theft. By
recording all movement of items from receipt to sales to shipping, management
knows exactly how many items exist. Consider a retail store like a bicycle shop.
The computerized inventory notes that there should be three Cateye computer
speedometers in stock. Yet when a customer asks to buy one, you notice there
are only two left. If there is no mistake in your inventory report, you conclude that
someone stole one of the items. Although the system did not prevent the speedom-
eter from disappearing, it does show which items are susceptible to theft. It also
helps control theft by employees, who will be less likely to steal if they know that
the items are carefully monitored.
Te Accounting Cycle
An important aspect of accounting systems is that they produce information in
specifc cycles. Firms are required to produce reports that refect the fnancial con-
dition of the frm at the end of every quarter. Accounting systems are based on
these requirements. For the most part, managers operate from quarterly reports,
with intermediate monthly reports for some items. Because of the volume of data
in the detail, most companies keep only current statistics and summary reports on
fle. Older data is shuffed off the system to make room for the current numbers.
As a result, managers may not have easy access to detailed data from prior years.
Reality Bytes: Chiquita ERP Problems
In 2006, Chiquita Brands, based in Cincinnati, began a multimillion-dollar upgrade
to consolidate its accounting systems and centralize budget planning and forecast-
ing. Operating worldwide with three semi-autonomous business units, the company
faced many challenges, including software bugs, staffng shortages, and resistance
from the business units. Even after four years, the company was struggling to get all
of the components to provide value. CIO Manjit Singh noted that The general per-
ception is, we got it to work. But it was painful, and the [managers] arent necessar-
ily looking at this as a successful implementation Once we start using it for fore-
casting, Im hoping the reaction to the project will turn more positive. The system
was based on Hyperion and is designed to consolidate data used for forecasting. The
goal is to remove e-mailed spreadsheets from the process and get fnancial planners
to use the centralized system so everyone sees the same data and same analyses at
the same time. Singh noted that Hyperion (now owned by Oracle) sold the project to
the fnance group and bypassed IT. IT was called in to support the project after the
contracts had been signed.
Adapted from Robert L. Mitchell, Inside Chiquita's 'Painful' Finance System Over-
haul, Computerworld, August 9, 2010.
374 Chapter 6: Transactions and ERP
Technology Toolbox: Selecting an ERP System
Problem: How do you select and evaluate ERP systems?
Tools: : Several ERP systems and even more ERP consulting frms exist to give you
choices and help you evaluate your options. Choosing a system is relatively diffcult
because of the costs. The cost of the hardware and software is high, but you face
larger costs in converting from your existing system and redesigning your business
processes. Once you have implemented a particular ERP system, it is diffcult to
switch to another vendor. So, you have to be careful to select a system that is going
to work for your particular organization. Today, most large companies already have
ERP systems, so the growth market lies with small and midsize businesses. Most
of the ERP vendors are actively targeting this SMB market. Businesses within this
category have to pay attention to the anticipated growth and scalability options of
the software systems. For example, even small businesses can gain the advantages
of ERP systems by leasing them from companies that host the software on Internet
serversyou pay only a monthly fee.
In terms of technical business features, most of the large ERP systems are somewhat
similaroffering the standard accounting, HRM, SCM, and CRM integration. How-
ever, you will fnd differences in ease of use, internationalization, and customization
options. For a smaller business, one of the more important areas to look at is the
quality of the predefned industry-specifc application. Most ERP vendors provide
shells that are customized for each industry, so it takes less time and money to set up
the system for your company.
Planning Stage Goals and Outputs
Initiation Estimate costs, establish objectives, select team
Initial planning Initial vendor list and basic features (hardware platform, fees,
internationalization,vendorsizeandstability,andsoon).
Requirementsgathering Identifybusinessrequirements.Detailedlistofspecifcations,unit
goals,andcriticalfeatures.Evaluationcriteria.
Demos and selection Productdemonstrations,ratings,andsitevisits.
Implementation Customize applications, convert data, restructure company
operations,defnenewprocesses,andtrainemployees.
Selecting an ERP system is a time-consuming task, and you have to carefully
evaluate the needs of the company. You will create lists of primary objectives and
generate detailed specifcations. You will endure hundreds of hours of vendor pre-
sentations and comparisons of databases, reports, and customization capabilities.
Then you have to implement the solution. Many companies work with a partner
consulting frm that specializes in one ERP system. This detailed knowledge simpli-
fes the conversion process because the consultant frm has experienced experts. But
even midsize frms take six months to a year; larger operations can require a year
or two. Most companies choose to implement ERP systems in stagesperhaps ac-
counting frst, followed by SCM and CRM. Even these packages can be split and
implemented in smaller pieces.
Quick Quiz:
1. Assume you work for a midsize construction frm that does about 30 percent of
its work internationally. Find at least three ERP vendors and outline the features
they provide.
2. Assume you work for a large retail clothing frm with stores in most U.S. states.
Identify the specifc accounting and fnancial features you would want in an ERP
system.
375 Chapter 6: Transactions and ERP
Process: Controls, Checks, and Balances
Double-Entry Systems
An important objective of accounting systems is to maintain the integrity of the
fnancial data. The goal is to prevent mistakes and discourage fraud. Double-entry
accounting provides a method to locate mistakes in data entry. If an amount is en-
tered incorrectly, the account totals will not balance.
Because many transactions involve outside organizations, mistakes can be
caught by sharing data. Every month frms receive a statement from the bank. The
totals can be compared to changes in the frms cash account. Similarly, compa-
nies typically send receipts when they receive payments from each other. Auditors
periodically send verifcation requests to suppliers and customers to make sure the
data was recorded correctly. EDI strengthens this approach, because transaction
data is transmitted in computer form among the companies.
Separation of Duties
Another type of control is the separation of duties. A manager in the purchas-
ing department might be responsible for choosing a supplier of parts. Only the
accounting department can authorize the transfer of money to the supplier. The
objective is to minimize fraud by requiring a potential thief to deal with multiple
employees.
Many banks take this concept a step further. They require employees (espe-
cially tellers) to take their vacations every year. Several instances of fraud have
been revealed when the employee was no longer at the job to keep the fraudulent
mechanism running.
Audit Trails
An audit trail is important to accounting systems. It enables investigators to track
backward through the data to the source. A cash fow statement might indicate that
the company has spent twice as much money this month as last. To fnd out why,
trace backward and fnd all of the raw entries that make up the number. Together
with dates and amounts, the raw journal entries can contain the identity of the per-
son responsible for the entry. By keeping this identifcation data, it is possible to
list every article that affects an item on a report.
Human Resources and Transaction Processing
What are the transaction elements in the human resources
management system? Every company has employees. Companies collect
hundreds of pieces of data for each employeesome for management purposes,
others because they are required by law. For years, the human resources (HR)
department focused on flling out and storing forms. The enormous amount of pa-
perwork alone begs for computerization just to cut down on storage space needed.
Computerized databases also enable managers to fnd specifc data on employees.
Early HR software emphasized these two benefts. Modern HR software is ex-
panding beyond simple forms to improving data collection and providing better
analyses. To illustrate the problems presented by large-scale transaction-process-
ing systems, consider the three areas of input, output, and processing.
376 Chapter 6: Transactions and ERP
Input: Data Collection
Figure 6.15 illustrates the basic components of a human resources management
(HRM) transaction-processing system. Note that the system is even more com-
plex because the data comes from all areas of the company. To understand how
the HRM systems became so complicated, begin with the obvious data that needs
to be collected: numbers related to the payroll. For hourly workers, the system
needs to collect and monitor hours worked. For many sales tasks, the system must
compute sales by employee to determine commissions. Professional service frms
often ask employees to track their time in terms of billable hours for work that
is charged back to clients. In all three situations, as the number of employees in-
creases, it becomes increasingly diffcult to collect all of these statistics and verify
their accuracy. It also becomes harder to fnd specifc pieces of data.
Think about paychecks you have received. In addition to the payment amount,
there could be 10 to 20 other numbers on the pay stub. Companies monitor and
report several types of payroll taxes, including federal, state, local, Social Secu-
rity, and health. Also, frms monitor employee benefts, such as health care and
retirement. Most frms also handle employee deductions for employee purchases,
savings plans, stock purchases, parking, meal plans, and other options. In some
situations, companies must garnishee wages and forward them to a third party.
Management
Managers
Employees
Customers
Government
Process
Payroll
Benets
Vacation
Compile
Merit
Evaluations
& Salary
Changes
Job
Applicants
Produce
Management
Employee
Reports
Screen
Jobs &
Applications
Produce
Government
Reports
Employee Data Files
Employee
Data
Evaluations
Salary
Merit &
Salary
Sales Data &
Commission
Employee
Data
Merit
Applicant
Data
Employee
Summaries
Job &
Applicant
Data
EEO Data
Government
Reports
Management
Reports
Figure 6.15
Most employees know that human resources management (HRM) deals with
payroll and benefts. But HRM also collects data and produces reports for a myriad
of government reports, oversees employee evaluations and job applications. The
department also handles training and education opportunities.
377 Chapter 6: Transactions and ERP
Human resource departments also track days taken for vacations, personal
time, and illness. In larger companies, HRM provides training courses and offers
testing of critical skills. Employee attendance and performance data is stored and
incorporated into evaluations.
With the increasing use of merit pay, the system must also track employee eval-
uations. Some performance measures are tied to productivity or output within the
employees department, so HR must relate employee work schedules to produc-
tion and quality measures. Most companies use a centralized HRM department to
advertise job openings and to screen the initial applicants, verify credentials, and
keep basic employment and hiring data.
Output: Reports
The human resources department also produces several reports related to payroll.
Along with printing checks, HRM must provide expense reports and forecasts to
the accounting system. Periodic reports are created for job vacancies and analyses
of employee performance and morale.
HRM departments also spend a great deal of time creating reports for vari-
ous government agencies. All companies must fle various economic reports deal-
ing with employment. Tax-withholding data must be fled regularly with federal,
state, and local agencies. HRM departments create equal employment opportunity
reports detailing characteristics of their workforce, job applicants, and hiring de-
cisions. Then there are various reports required by the Occupational Safety and
Health Administration (OSHA) regarding injuries and exposure to various haz-
ards. If employees need to be certifed, companies fle aggregate reports with the
various regulatory agencies. All of these reports have deadlines.
In addition to the standard reports, the human resources department is responsi-
ble for maintaining compliance with all relevant employment laws. Hence, HRM
staff must continually monitor the employment data and evaluate it for exceptions
and problems.
Process: Automation
The human resources department is a busy place. Keep in mind that the data and
reports apply to every branch of the company. Even standard items such as pay-
checks become complicated when the company is split into several divisions scat-
tered across the country. Also, remember that accuracy is crucial. Employees can
become upset if their paychecks are wrong. Errors with government reports can
lead to fnes and lawsuits. Equally important, companies with good HRM depart-
ments are able to offer additional benefts to employees. With a good information
system, they can offer cafeteria-style benefts where each employee selects a per-
sonal combination of benefts.
Small businesses have long complained about the burdens imposed by govern-
ment reports and data collection. To alleviate some of the hassles and expense,
several companies specialize in automating the data collection and report writing.
Consider payroll: Because of the constantly changing laws, many companies rely
on an outside agency to collect data and print the paychecks. One of the larg-
est providers is Automated Data Processing (ADP). Even if a company chooses
to maintain its own payroll records, it typically purchases the software from a
third party instead of trying to keep up with the annual changes using internal
programmers.
378 Chapter 6: Transactions and ERP
Several companies sell software that automates HRM data handling and pro-
duces government-required reports. From economics to equal employment to
OSHA reports, the basic HRM reports are being computerized. You still need to
collect the data in the proper format and convert it to the purchased software. In
addition to saving time in producing reports, the packages often contain the essen-
tial government rules and can analyze the data to spot potential problems.
Some newer technologies are being used to simplify data gathering. In particu-
lar, companies are searching for ways to make it easier for workers to deal with the
HRM department. A system created by PRC, Inc., uses touch-tone phones and a
voice-response system to enable workers to make changes directly to their base
information, like changing their address or tax withholding. Another approach is
to install PC-based kiosks and use the Internet, so that employees can look up
information, sign up for training classes, or modify their personal data whenever
they wish. Other companies are using similar software and the corporate network
to allow workers to perform basic HR tasks from their desks or from home using
the Internet.
Production Management
Can a company become more effcient and productive? Some-
times this question is easy to answerif you have been losing money. But per-
haps you are manager of an organization that has been successful and proftable.
Many companies have been successful for years and continue to operate the same
way they always have. This practice might not be bad in every case, but the con-
cept of continuous quality improvement dictates that you should always look
Figure 6.16
Production management. Production of goods and services generates considerable
information. Purchase orders are placed with suppliers, internal documents like
the bill of materials record production, shipping invoices record interactions with
customers. Quality control measures are recorded at several steps in the process.
Production
Information
System
Bill of Materials
Crank UL6500
Pedals LK3500
Stem UL6600
Saddle Selle
Purchase
Orders
Customer Order
Shipping
Receiving
Production
and Assembly
Quality
Quality
Quality
Suppliers
Customers
379 Chapter 6: Transactions and ERP
for improvementsno matter how successful you have been. New production and
information technologies are introduced continuously. Any one of these technolo-
gies might give you the ability to leapfrog your competition, or it might give your
competitors the ability to squeeze you out of the market.
As shown in Figure 6.16, information technology has several important uses in
production management. It is important to track orders, shipments, and all steps
in the production process. The bill of materials is an important concept in man-
ufacturing. It records the components that were used to manufacture a fnished
product. Data on it is used to trigger deductions in inventory of parts and signal
the addition of the fnal product to fnished inventory. These actions impact the ac-
counting ledgers, so recording the proper amounts and time is important. Similar-
ly, quality control measures are taken at several steps in the processparticularly
with the receipt of supplies and the shipment of fnished products. Detailed quality
measures during the production process are used to identify processes, machines,
and employees that need improvement.
Production Issues
Manufacturing in large scale presents several problems and issues to management.
As shown in Figure 6.17, consider the case of a clothing manufacturer with sever-
al factories. Each factory can produce multiple items and the company works with
many factories. The items are collected and shipped to hundreds or thousands of
customers and stores. How do you schedule effcient production? How do you
factories
Customers
or stores
Figure 6.17
Production challenges. Multiple factories produce many items that are shipped to
hundreds of customers. How do you schedule effcient production? How do you
ensure the right products go to the correct locations?
380 Chapter 6: Transactions and ERP
ensure that the right products are shipped to the correct stores? These questions
seem obvious, but they are critical. In the 1980s, the huge designer jean company
Gitano self-destructed because it was unable to answer these two questions.
Obviously, information systems are a key component to the answers. But you
need to make sure the processes are in place to collect the correct data in a timely
manner. This data has to be available throughout the company so managers can
monitor for problems and make the correct decisions. For instance, with only par-
tial data, it might appear that a factory is idle, while complete data might show
that it is scheduled to ramp up production as soon as supplies or new machines
arrive. Collecting data in a manufacturing environment can be a diffcult process.
Most workers are busy trying to build products and are not interested in taking
time to enter data into a computer. You need to defne the processes and jobs to
ensure that accurate data is also being recorded. You also need to automate as
much of the data collection as possible. Some machines can transfer data directly
into the information system, but often you need to assign the task to someone.
This step is particularly important when things go wrong. You also might have
to add bar-codes or RFID tags to products so they can be counted and recorded
automatically.
Once you have accurate data, you can usually purchase tools or hire experts to
analyze the production processes and fnd improvements. The feld of production
operations management has many tools and models to organize and optimize pro-
duction and scheduling.
Distribution and Inventory Control
A key mantra in todays business is that you do not want to hold inventory. Just-
in-time (JIT) production was designed to eliminate parts inventories held by
manufacturers. Instead, suppliers are asked to deliver parts exactly when they are
needed. In one sense, the process shifts the inventory onto the supplier, because
the supplier is penalized if it is late with shipments. But, ultimately, it reduces the
Reality Bytes: Controlling Enterprises with BPM
In the early 2000s, New York Attorney General Eliot Spitzer fled lawsuits against
several insurance companies for fraud and excessive fees. Politely stated, the entire
industry appeared to suffer from poor management with limited knowledge of how
fees were collected and disclosed. Integro Insurance Brokers was founded in New
York in 2005 with the idea of applying business process management principles and
software to the industry. Christophe Marcel, enterprise software architect stated that
there were a lot of questions about transparency and disclosure of where fees came
from. There has been an industrywide initiative for quality improvement processes
To do that effectively, you need BPM. Using tools form BEA Systems Inc, the com-
pany built client-services applications to provide up-to-date data on transactions, and
enable executives the ability to monitor all of the processes. Harcourt Assessment
Inc., a San Antonio-based developer of scholastic tests, is using BMP software from
Savvion Inc. to manage the process of developing test questions, using the system to
automate online processes for collecting and analyzing customer feedback.
Adapted from Heather Havenstein, BPM Is Helping Firms Control Critical Busi-
ness Processes, Computerworld, October 30, 2006.
381 Chapter 6: Transactions and ERP
Technology Toolbox: Designing an Executive Information System/Dashboard
Problem: How do you begin to understand the data collected by an ERP system?
Tools: Executive information systems or digital dashboards are designed to display
summary data in real time. The systems usually begin by presenting a graphical
overview using some primary measures of the organization. Executives and manag-
ers can quickly compare progress on key variables. They can then drill down and see
more detailed statistics and even original transaction data such as orders.
http://www.visualmining.com/ncs/projects/Examples/PerformanceDashboard/TransitMetrics.jsp
An EIS can be a powerful tool to follow the progress of the company. Most ERP
systems have some type of software that makes it relatively easy to extract data and
create an EIS. However, one of the most diffcult tasks is to identify the key items
that need to be displayed on the main form. Across industries, companies vary enor-
mously in the outcomes managers need to follow. Even within an industry, frms and
managers rarely agree on what items are the most important. Consequently, each
company needs to develop an EIS customized for its executives.
One approach to identifying the desired elements in an EIS is to follow the bal-
anced scorecard method proposed by Robert S. Kaplan and David P. Norton. They
recommend a complete analysis beginning from the top to identify the main strategic
goals and derive measures that ft into primary categories. For instance, you would
typically need measures on fnancial, customer, internal data, and learning and
change. The top managers cooperate to identify the main indicators of each variable.
Quick Quiz:
1. Assume you have been hired to help a regional law frm. What key elements
might go on the main EIS screen?
2. Assume you have been hired to help an airplane manufacturer; design the main
EIS screen.
3. To help design an EIS for a retail video store chain, briefy describe the screens
and steps needed to identify stores that are performing below par and fnd pos-
sible causes of the problems.
382 Chapter 6: Transactions and ERP
number of products held in inventory because everyone along the supply chain is
interested in minimizing the value of the stalled inventory. Instead, everyone fore-
casts production needs and delivers products by keeping them moving through the
supply chain.
As shown in Figure 6.18, the distribution center (DC) is an important part of
a modern supply system. Incoming bulk shipments are unloaded from the trucks
and placed on high-speed conveyor systems. Bar code readers in the center of the
DC read each box. Outgoing trucks are matched to a specifc customer and store.
The computer reads the customer order list and routes the specifed number of
boxes of each item to every truck. When the trucks are loaded, they deliver the
items to the designated customer and store. Additional savings are created by rout-
ing the same truck to the ship or rail yard freight docks to pick up an incoming
bulk shipment. These trucks then deliver the bulk shipments on the left side of the
DC in the diagram. Scheduling systems keep the trucks moving to maximize their
capacity and to reduce deadhead or empty loads.
Distribution centers might be run by manufacturers, customers, or third-party
transportation specialists. Wal-Mart is a leader in using the centers to reduce costs
and deliver exactly the needed products to every store. Ultimately, you also need
to match your shipment data against the customer receipts to ensure that your sys-
tem is accurate and to compensate for shipping losses.
Integration in Business
How do businesses combine data from operations? The easiest way
to understand the power of todays computer systems is to look at how integra-
tion has changed over time. Almost any organization has issues with integration.
Consider a basic manufacturing company that has several production plants and
sells into multiple markets. The managers need to track production data, costs,
and quality from each plant. Figure 6.19 shows that they also track sales by region
Factories
Customer
or stores
Figure 6.18
Distribution center. Factories deliver products in bulk to the DC. High-speed
conveyors read bar codes on the incoming boxes to split the products into smaller
shipments and route them to trucks headed for individual stores.
383 Chapter 6: Transactions and ERP
and use average costing to estimate net profts. ERP systems support considerably
more complex analysis and integration across suppliers and customers as well as
fnancial institutions. But the basic ideas are the same.
Assume that you are a manager responsible for producing the integrated report.
You need to collect the basic data, perform some simple computations, create the
report, and write a report for management discussing the results. The process of
creating this report has changed considerably over time. Figure 6.20 shows the
various methods by decade. It is important to understand all of the methods be-
cause it helps you appreciate the amount of work and steps processed by a modern
ERP system. Also, companies are at different levels of development, so you could
end up working for a company that uses any of these technologies.
In the 1960s and 1970s, computer systems were built for individual depart-
ments and areas within the company. In many companies, these systems became
islands. They were focused on one task and did not share data with each other.
For instance, the accounting department collected the basic transaction data and
produced the necessary accounting reports. Anyone in the company who wanted
to use this data relied on paper printouts of the standard reports. When spread-
sheets arrived in the 1980s, the basic accounting numbers were often rekeyed into
spreadsheets in other departments. Besides wasting employee time in retyping
numbers that were already stored on a computer, this practice caused more errors
from mistyping the data. Furthermore, consider that when the accounting depart-
ment changes the numbers, some users of the data might not get the updated ver-
sions, and people would attempt to make decisions on the basis of outdated data.
Producton
Plant Quantity Quality Costs Prior Month
Boise 260,721 9.6 $41,222,697 219,961
Decatur 171,371 8.75 $31,094,809 188,862
Yaounde 314,856 9.4 $29,119,967 406,859
746,948 9.25 $101,437,473 815,682
Wtd. Avg. 135.80
Sales
Region Quantity Avg.Price Sales Prior Sales Wtd. Cost Net
US East 225,091 $289.17 $65,965,373 $53,533,640 30,567,941 $35,397,432
US West 204,725 $273.20 $56,217,470 $42,018,759 27,802,185 $28,415,285
Canada 65,763 $192.00 $12,561,225 $12,327,456 8,930,786 $3,630,439
South America67,495 $133.50 $9,013,737 $11,281,515 9,165,996 ($152,259)
Other 47,313 $169.00 $7,991,533 $8,120,900 6,425,228 $1,566,305
610,387 $211.37 $151,749,338 $127,282,270 82,892,136 $68,857,202
$0
$5,000,000
$10,000,000
$15,000,000
$20,000,000
$25,000,000
$30,000,000
$35,000,000
$40,000,000
$0
$10,000,000
$20,000,000
$30,000,000
$40,000,000
$50,000,000
$60,000,000
$70,000,000
US East US
West
Canada South
America
Other
Sales
Sales
Prior Sales
Net
Figure 6.19
Integration with ERP. An ERP system can integrate almost all aspects of the company
into one huge database. Either directly or through an executive information system,
management can retrieve any report or piece of data by selecting options.
384 Chapter 6: Transactions and ERP
Notice that in the 1980s, the clerical support was replaced with PCs. As a man-
ager, you are expected to write your own documents and create your own charts.
In the 1990s, organizations began the steps toward integration. The basic trans-
action is stored in a DBMS, and networks provide access to the database. More
important, this integration makes it relatively easy to create automated tools that
extract the desired data, display results in charts, and enable managers to quickly
fnd the answers to basic questions. To some extent, this type of system means that
the company no longer needs you: the middle manager. You might be interested to
know that this trend was predicted in 1958 (Levitt and Whisler, Harvard Busi-
ness Review). It just took 20 years longer than they anticipated for technology to
be developed.
As shown in Figure 6.21, in the frst decade of 2000, even more powerful inte-
gration tools were adopted. The goal of these tools is to integrate all of the data in
the company, including ties to suppliers and customers. Again, the entire system
runs on a DBMS; the difference lies in its reach and its capabilities. Tracking cus-
tomers and working closely with suppliers are increasingly critical functions in
business. Just collecting the data and billing customers or paying suppliers is not
suffcient. You need to be able to analyze and compare the data. Who are your best
customers? Which ones cost you the most? Which suppliers provide the best qual-
Figure 6.20
Middle management over time. The methods used to create integrated reports have
changed over the past three decades. With simple transaction systems, managers
computed the totals, drew graphs, and had secretaries type the report. With the
adoption of personal computers, middle managers (or their secretaries) reentered the
data into spreadsheets and used a word processor to print the fnal report. With an
integrated system, top managers can use a personal computer to query the database,
draw the graphs, and produce the fnal report.
3 reports
(printed)
weekly reports
1970s
Sales
terminals
Sales
terminals
Sales
terminals
Sales
terminals
Sales
terminals
Sales
terminals
Central
computer:
create reports
Central
computer:
create reports
Manager:
Integrate, graph
analyze
Manager:
Integrate, graph
analyze
Secretary:
type & revise
Management
3 reports
(printed)
weekly reports
1980s
Management
personal computer
sales
data
sales
data
sales
data
1990s
DBMS:
On-line data
Personal Computer
Weekly reports &
ad hoc queries
(applications)
Management
query
data
385 Chapter 6: Transactions and ERP
ity and are the most reliable? Answers to these questions can mean the difference
between success and failure.
Enterprise Resource Planning
How do you combine data across functional areas, including
production, purchasing, marketing, and accounting? Enter-
prise resource planning (ERP) is the current state of the art in integrated
information in business systems. The systems incorporate data from fnancial ac-
counting, logistics, and human resource management. The feld is dominated by
large, expensive software packages from companies such as SAP, Oracle, Law-
son, and Microsoft Dynamics. The systems use databases, processes, and rules to
provide up-to-the-minute data on the major fnancial issues in a frm. One of the
key points of ERP systems is that they run on top of a DBMS; hence, all of the
data is centralized and accessible via DBMS queries and reports.
As shown in Figure 6.22, ERP systems handle all of the fnancial accounting
systems. They also emphasize purchasing, human resource management, and in-
vestment management. The systems are tailored for specifc businesses and can
focus on areas such as manufacturing, research and development, and retail sales.
One of the primary strengths of the ERP systems is that they were designed to
handle data for large companies operating in an international environment. In the
late 1990s, many companies chose to install commercial ERP systems, instead of
trying to modify their existing systems to handle the year 2000 problem.
Computer use in most companies began with transaction-processing systems.
Because transaction systems are structured and there is considerable experience at
Figure 6.21
Integration with ERP. An ERP system can integrate almost all aspects of the company
into one huge database. Either directly or through an executive information system,
management can retrieve any report or piece of data by selecting options.
sales
data
Sales
terminals
Sales
terminals
DBMS
Executive Information
System
Personal Computer
or PDA
or Browser
Management
query
data
Suppliers
Banks
Production/
Service
Enterprise Resource
Planning
386 Chapter 6: Transactions and ERP
this level, it is a logical place to begin. However, it is also tempting to treat each
transaction separately: (1) payroll services can be purchased from a specialized
data processing company, so the data will be handled separately from the other
corporate data; (2) a sales order-processing system might be constructed indepen-
dently of the inventory control system; (3) process control systems to handle man-
ufacturing tend to be isolated because the data (e.g., robotic control signals) are
different from the data used in the rest of the company; (4) similarly, the corporate
accounting system is often developed as a stand-alone product. Journal entries are
created by copying data in reports produced by other systems. Although each of
these transaction systems offers management advantages to their respective de-
partments, it is diffcult for managers to use data from other departments. Also,
independent systems make it diffcult for executives to share data and evaluate
interrelationships between the departments.
The amount of data integration needed in a company often depends on the man-
agement structure of the frm. Some frms are highly decentralized, so that each
business unit makes its own decisions and functions independently of the others.
Typically in these situations, only accounting data (proft/loss) are integrated and
reported to upper management.
On the other hand, some organizations are much more integrated. In your eco-
nomics courses you were shown the difference between vertically and horizon-
tally integrated frms. Consider a vertically integrated frm such as an oil company
that functions at different levels of production (including oil exploration, drilling,
transportation, storage, and retail sales). Although an oil exploration team may not
need access to daily fuel sales in New York State, they do need to forecast future
demand for oil. Likewise, the retail sales division does not need to know the daily
costs associated with drilling for oil, yet they might need to track deliveries and
communicate with the corporate offce.
Consider a horizontally integrated frm such as Wal-Mart with retail stores
in many different cities. It achieves lower costs by combining the buying power
of all its stores. By coordinating sales, warehouses, and distribution, Wal-Mart
can negotiate better prices with manufacturers. Moreover, Wal-Mart reduces op-
erating costs by standardizing management practices (and information systems)
Figure 6.22
Primary ERP functions. Each area has dozens of additional detailed functions. The
real key is that all of the components are integrated. For example, any data entered
into the HRM system is immediately refected in the fnancial reports.
Accounting
All transaction data and all fnancial reports in any currency
Finance
Portfolio management and fnancial projections
Human Resources Management
Employee tracking from application to release
Production Management
Product design and manufacturing life cycle
Supply Chain Management
Purchasing,qualitycontrol,andtracking
Customer Relationship Management
Contacts, orders, and shipments
387 Chapter 6: Transactions and ERP
across all the stores. By integrating information from all stores, it is easier for
Wal-Mart to forecast customer demands. Also, by networking the store infor-
mation systems, managers who experience higher sales of certain products can
request shipments from stores that are not selling the item as rapidly.
Manufacturing frms can gain additional benefts from integrating data. Benefts
like just-in-time inventory, total quality management, and mass customization can
exist only with the tight integration of data. The National Bicycle Industrial
Company of Japan illustrates how integrated data is used to provide customized
products to mass markets.
International Environment
Several ERP features are important to frms operating in an international environ-
ment. First, all menus and reports should be available in several languages, so
clerks and managers can use the language they prefer. Second, the system should
handle currency conversion automatically, so managers can view reports in any
currency. Similarly, conversions should be capable of being fxed at a point in
time, so that when items are transferred, they can be valued at the exchange rate in
effect at that time, even if the rate changes later.
A more complex feature for the international environment is the ability to pro-
duce reports following the rules of individual nations. For example, a company
with subsidiaries in many nations would need to produce reports that follow the
rules (e.g., depreciation) for each specifc nation, and then produce consolidated
reports following the rules of the home nation.
A third complicating factor arises from taxes. In addition to the rates, the rules
and procedures vary by nation. The rules are particularly important for payroll and
beneft applications. A good enterprise application automatically incorporates the
rules for each nation and state.
Financial Accounting
The accounting system is a core feature of an ERP. Eventually, all transactions
must be recorded in the general ledger accounts. The accounts fulfll the standards
required by each nation. They are used to create the standard accounting reports.
The systems provide fexibility by enabling managers to create their own subac-
counts and subledgers, which are used to create reports on additional topics. An
important feature of the accounting system is that standard accounting reports can
Reality Bytes: Paying for the Train
Long Island Rail Road trains do not accept credit cards. And the tiny train station
in Amagansett in the Hamptons does not have ticket vending machines. Conduc-
tors will accept cash, but most young riders do not carry much cash. So they get a
bill, which they might or might not pay. One rider, Renee Osgood, noted that You
dont always plan ahead to make sure that you have cash on you. I never really carry
around cash, anyway. In response, LIRR president Helena Williams noted that the
railroad is increasing the number of signs, asking riders to carry cash.
Adapted from Andrew Grossman, Cashless Hop Rides on the LIRR, The Wall
Street Journal, July 27, 2010.
388 Chapter 6: Transactions and ERP
be generated at any time for any section of the company. The ERP system auto-
matically uses the most up-to-date data.
In addition to standard fnancial accounting, the systems manage assets and
provide common treasury functions such as cash management. The systems also
provide basic audit trails and other accounting controls. To make them easier to
use, most ERP systems provide enterprise (or executive) information system (EIS)
capabilities. Managers can examine data at virtually any level of detail. From
summary values, they can drill down to more detail.
Logistics
Logistics consists of the operations required to purchase materials, deliver them to
the warehouses and factories, and sell and distribute products. It incorporates tra-
ditional MRP analysis, quality control, accounts payable, and accounts receivable.
In todays manufacturing companies, logistics is an important component of
just-in-time inventory and demand-driven production. Using an integrated sys-
tem, the marketing department gets up-to-the-minute data on customer demands.
Marketers can cooperate with designers and engineers to develop new products.
The specifcations can be transferred to the production machines and raw material
orders can be generated for vendors. Purchasing and payments can be tracked and
generated over EDI networksincluding the Internet. As orders are generated and
inventory levels change, the accounting data is automatically updatedproviding
instant analysis of proftability.
For service-oriented companies, logistics involves service management tasks.
The ERP systems can track customers, identify repeat customers, monitor service
contracts, help salespeople with call management, and handle automatic billing
and accounts receivable issues.
Human Resource Management
Payroll is a complicated function, particularly in a multinational environment in-
volving different rules and currencies. Even in a single state, the issues of benefts,
state and federal rules, and legal issues arising from child support make handling
payroll a complex task.
Reality Bytes: Marin County ERP
County governments perform many tasks that are similar to common businesses.
ERP software exists for government agencies, but it typically must be heavily cus-
tomized. In 2006, Marin County in California signed contracts with SAP and De-
loitte Consulting to build a new ERP system to replace the old legacy system. By
mid-2010, Marin executives were unhappy with the system and fled lawsuit against
Deloitte Consulting, claiming that only 50 percent of the functionality is available
and working. David Hill, director of the countys IT services department argued that
In order to make it happen with SAP, we would need to re-architect it, redesign it,
and that would be quite expensive. The budget analysis estimated fxing and sup-
porting the SAP system would cost at least $34.7 million over the next ten years;
which starting over with a new tool would cost $26.2 million.
Adapted from Chris Kanaracus, Marin County to Rip and Replace Ailing SAP Sys-
tem, Computerworld, August 24, 2010.
389 Chapter 6: Transactions and ERP
Todays HRM departments handle such additional tasks as recruitment, train-
ing, travel, and organizational planning. Each step must be documented and re-
quires a variety of federal and state reports. In addition to these basic tasks, most
of the major ERP systems enable HRM departments to offer Web access to basic
data. For example, employees can use the Web to check on their taxes, change
their withholding status, and sign up for beneft plans and training sessions.
Integration
Integration is probably the most important feature of the ERP systems. All the
data is stored in a central database; hence, data is entered only one time (but into
a double-entry accounting system). All reports are generated from the base data.
Custom queries and reports can be generated through the DBMS.
Consider a simple example. A manufacturing plant takes an item from inven-
tory. The system instantly adjusts the inventory quantity on hand. It also updates
the fnancial value of the inventory holdings on the general ledger and any sub-
ledgers that utilize that fgure. New orders can be triggered automatically with the
orders and payments sent through common EDI mechanisms. All of the changes
are made automatically. When managers request reports, the new data is automati-
cally incorporated and displayed using current currency conversions.
The key point to remember is that all of the transactions and accounts are in-
tegrated. Managers can request reports by using any combination of data at any
timeand each report will use the most up-to-date information.
Database
Headquarters
(England)
Database
Subsidiary
(Spain)
Financial data
General ledger
Payroll
(others)
Manufacturing
Product details
Inventory
(others)
Use inventory item.
Update inventory value.
Check for reorder point.
Order new item through EDI.
Update Accounts payable.
Project cost report.
Daily production reoprt.
Weekly nancial status.
Cash ow.
Budget versus actual cost.
Figure 6.23
ERP integration. Although data can be distributed, it is still integrated across the
organization. Changes in one item (inventory) cause changes in all related databases.
Reports are generated from current data.
390 Chapter 6: Transactions and ERP
Most of the major ERP systems also utilize distributed hardware and software.
Hence, the database can be split into many pieces stored in different locations. As
changes occur in one location, they are automatically distributed across the net-
work to the other locations. The company can add a subsidiary with its own pro-
cessing support. Yet, all of the new data is readily accessible to managers through-
out the company.
Figure 6.23 provides a simple example of data integration. When a factory uses
an inventory item, the system reduces the current inventory count. It also changes
the inventory valuation in the general ledger. The item usage might trigger a pur-
chase through the EDI system, which must also be recordedalong with the ac-
counts payable change. Since the databases are shared across the organization, all
changes are automatically included when new reports are generated.
Remember that all of the modules are integrated. So manufacturing schedules
developed in the production module automatically provide data to the payroll sys-
tem and personnel systems. Then the fnancial data (e.g., wages) is linked back to
the general ledger, which provides updated data for all fnancial reports.
One important catch with an ERP system is that it requires changes to the way
the company operates. In many cases, these changes can be goodfor example, it
forces everyone to follow the standard accounting procedures. In other cases, the
ERP is too infexible and interferes with the way the company operates. Managers
have to carefully evaluate the trad-eoffs of integration and fexibility.
Supply Chain Management
How do you make production more effcient? Supply chain manage-
ment (SCM) concentrates on the production side of ERP. It begins with logistics
(purchasing and receiving components), through manufacturing confguration,
and into distribution of the products. As shown in Figure 6.24, these factors in-
volve a signifcant portion of the company, requiring integration of a huge amount
of diverse data.
The key to understanding the value of SCM is to go back in time again to see
how manufacturing evolved. From the 1920s through the 1970s, companies in
many industries recognized the importance of economies of scale or mass produc-
tion. The automobile industry presents the classic example. Producing thousands
Reality Bytes: Applicant Tracking
About 61 percent of North American companies use applicant tracking software
to scan and sort job applications. According to a survey by HR research frm Bersin
and Associates, even small and mid-sized businesses have begun adopting them. The
frm notes about 55 different vendors sell applicant tracking system (ATS) software.
The largest vendors include Taleo, silkroad, Oracle, iCIMS, Lumesse, and Kenexa.
Job applicants use a Web site to upload a resume which is then scanned for key
words and routed to the appropriate location if it fnds enough matches. An interest-
ing aspect to the software is that many of them do not fully support PDF fles. So job
applicants should typically submit a resume in Word format.
Adapted from Kelly Eggers, Resume Debate: Word v. PDF, The Wall Street Jour-
nal, May 25, 2011.
391 Chapter 6: Transactions and ERP
of identical cars enables the company to spread the huge fxed costs across a large
baseleading to lower average costs. The huge scale enabled the car companies
to negotiate better prices with suppliers and dealers, reducing costs even further.
So, in the name of lower costs, the companies produced thousands to millions of
identical items. They relied on the marketing departments for two critical pur-
poses: (1) forecast consumer preferences in advance, and (2) convince consumers
they need the products that were built. So, the car salesperson says, Sure, we
could order a car for you, but it will cost more and take months. You would really
be happier with this car and you can drive it home today.
Of course, mass production has the potential for mass disaster. If you predict
incorrectly, or cannot convince customers to buy the existing product, you end up
dumping the products at sale prices. Remember that you have to clear the way for
next years models. More critically, mass production means that it is impossible to
please all of the consumersleaving a niche open for your competitors. A niche
in the small-car market enabled Toyota to become one of the largest producers in
the world.
SCM Changes the Focus
So how does SCM help? It can change the entire system. Mass production begins
at the supply side and builds products as cheaply as possible to eventually sell to
consumers. With a truly integrated supply chain, it is possible to start with the cus-
tomers. The marketing department identifes exactly what each customer wants.
The customized orders are entered into the system, and the engineering depart-
ment evaluates the order, makes design changes as needed, and schedules produc-
tion. Manufacturing knows each desired production date and organizes products
to minimize production costs. Component orders are placed with suppliers elec-
Vendors Customers
Design &
Engineering
Marketing
Distribution
Manufacturing
Purchasing
Administration & Management
HRM Accounting Finance MIS
Just-in-Time
Quality control
& Custom orders
Quick
response
Designs and Quality
Mass Customization Demand-pull
Design feasibility
& production costs
product planning
partnerships
& joint
development
partnerships
& joint
development
planning
& monitoring
planning
& monitoring
Figure 6.24
Total data integration begins with the vendors, tracks data through all operations of
the frm, and incorporates information from customers. Each area in the frm has
easy access to data from any other location. This integrated data is used to make
better decisions by enabling managers to focus on the big picture instead of on local
solutions.
392 Chapter 6: Transactions and ERP
tronically. On the day of production, as components arrive, they are scanned into
the system and routed to the appropriate location. At the same time, payments are
scheduled with the banks. As the parts arrive at each machine, the central process
controller confgures each machine correctly as the product moves through the as-
sembly line. At the end of the production line, the product is labeled and shipped
to the appropriate customer. The customer can be notifed electronically and billed
automatically.
Imagine how much easier it is to be in marketing now. Instead of convincing
customers to buy what you have produced, you frst fnd out exactly what they
want, and that is what you sell them. It is not quite that simple, but at heart, that is
the principle. Mass customization.is the process of manufacturing products de-
signed for specifc consumers but using mass-production techniques to keep costs
low. It can be done only if you have an integrated system. In many cases, it is not
possible to produce exactly what the customer wants (after all, most customers
want the world for free). And sometimes you have to produce for groups of simi-
lar customers instead of a single consumer, but the principle is the sameuse the
integrated technology to provide as much customization as possible. For example,
it might never be possible to produce a truly customized automobile economi-
cally, but customers might be satisfed with more choice of options.
JIT production is an example of how integrating information can change a pro-
duction process. Japanese manufacturers created this method with low-tech kan-
ban signals that conveyed information along the production line to the suppliers.
Today, ERP systems can provide immediate information from all stages of pro-
duction. This information can be made available to suppliers so they can schedule
deliveries. The overall goal is to reduce production costs and eliminate bottle-
necks by reducing the need for huge inventories.
SCM Challenges
SCM and integration are powerful tools. You might expect all frms to be using
them heavily. But SCM has two serious obstacles: (1) cost and (2) establishing
connections and agreements with outside frms. The issue of cost can be over-
comealthough the tools are expensive, if they can save enough money, the cost
is acceptable. But that explains why smaller frms with fewer purchases might not
be able to afford the technology. The second issue of building connections across
multiple frms is far more diffcult.
A key issue in SCM is connecting to suppliers electronically. It can also require
connections to distributors and transporters. Each of these hundreds of companies
could have different hardware and software. Plus, all companies involved have to
worry about security issues. Sharing data is a more diffcult problem than simply
blocking all access. B2B e-commerce is an interesting solution proposed to solve
some of these problems. In the late 1990s and early 2000s, several B2B auction
sites were set up to coordinate purchasing and tracking of products within an in-
dustry. For example, Covisint was established by several automobile manufac-
turers to handle transactions for automobile components. Few of these electronic
auction sites survived the dot-com crash. However, some are still supported and
used in major industries, such as automobiles and steel.
To a typical consumer, purchasing seems like an easy process: you fnd a prod-
uct and buy it. As shown in Figure 6.25, the reality is considerably more complex.
Consider the purchase of a new item. First the buyer has to identify the purpose
and individual features desired. Then the buyer identifes potential suppliers and
393 Chapter 6: Transactions and ERP
sends a request for proposal (RFP). The suppliers select products that match the
desired features and make proposals and bids for the sale. The buyer evaluates
each request, selects a supplier, and negotiates a contract. From this point, the
process is similar, even for repeat orders. The buyer generates a list of specifc
products, prices, and quantities, along with a desired delivery date. This purchase
order is sent to the supplier, who verifes the orders and checks to make sure prod-
ucts are in stock and available for delivery. Any problems with prices or delivery
times require notifying the buyer and negotiating changes. Eventually, the prod-
ucts are shipped to the buyer along with an invoice detailing the items delivered.
Of course, the buyer has to verify the quantity and quality of the items received.
Any discrepancies are recorded and the seller is notifed. Some items are returned.
Ultimately, the seller sends a bill to the buyer detailing the amounts owed. On
the accounting side, the appropriate accounts payable entries have to be made.
Finally, the supplier has to be paid, and needs to monitor receipt of payments and
match them against the bills.
One goal of an ERP system is to automate as many of these tasks as possible.
Figure 6.26 shows a version of an ERP screen for a buyer or product planner. Oth-
er screens enable suppliers to connect and electronically pick up purchase orders
or check on the status of deliveries and payments. All data is entered into a shared
database. From the buyers perspective, notice the scorecard that quickly indicates
the status of several key variables. Additional tools on the page enable the buyer
to check on the current inventory status of individual products. For example, he
Figure 6.25
SCM Purchasing. Purchasing is considerably more complicated than it appears.
It often requires several interaction steps with supplierseven for existing
relationships. Monitoring prices, quality, and timeliness is critical to both sides.
Identify product features
Request for Proposal
Evaluate suppliers
Negotiate contract
Identify exact items and costs
Correct errors
Receive products
Match receipts against order
Return items
Pay supplier
Provide product details
Negotiate contracts
Verify orders and times
Correct errors
Schedule delivery
Monitor shipments
Handle returns
Monitor payments
Buyer
Suppliers
394 Chapter 6: Transactions and ERP
can quickly see if the company has too many items in stock for a particular prod-
uct. Additional tools provide the ability to examine payments, shipments, prob-
lems or exceptions, and perform analyses on vendors and products.
Integration across Systems
The buyer-seller relationship points out a major challenge that remains to be
solved: how do you exchange data electronically between buyers and sellers? To-
day, both the buyer and seller probably have ERP systems, but they might be from
different vendors. Even if they are from the same vendor, they might not format
data the same way. So, the buyer will ask the seller for a person to log in and
check on the supplier data. Similarly, the seller will ask the buyer to log in and use
its system.
The major work in the 2000s by the ERP vendors has related to connecting sys-
tems and sharing data electronically. XML is one tool that was established to help
companies exchange data. As shown in Figure 6.27, ideally, each company would
implement an interface that would accept and read XML documents sent from its
partners. The machines could quickly parse the documents and transfer them into
the required internal format. Internal functions could then schedule deliveries,
check on shipments, or transfer payments. All of the data within an XML docu-
ment is in a specifed format and tagged so that a computer program can quickly
read the fle and identify the data and its purpose. Several companies, including
IBM and Microsoft, are developing technologies to use XML to make it easier to
share data across companies.
Figure 6.26
Purchasing manager perspective. Notice the scorecard to indicate important
performance variables. This portal page includes links to tools that help manage day-
to-day tasks.
395 Chapter 6: Transactions and ERP
Customer Relationship Management
How do you keep track of all customer interactions? Who are
your best customers? Although customers are important to all businesses,
the Internet and wireless applications add new dimensions to managing customer
relationships. One problem is the expanding number of customer contact points,
from sales representatives, to call centers, to Web sites, and wireless connections.
Customers expect merchants and suppliers to remember actions and decisions that
were made earlierregardless of the method of contact. Consequently, companies
need integrated systems that instantly provide all details of customer contacts. The
new technologies also provide innovative methods to keep in touch with custom-
ers and identify their specifc needs to sell additional products and services. Sev-
eral software tools have been developed to improve customer relationship man-
agement (CRM). Most ERP systems have added (or purchased) CRM systems to
provide an integrated contact and sales management system.
Multiple Contact Points
One of the greatest challenges facing a company today is the multiple sources of
contact points with customers. Most of the original systems designed to handle
these interactions are separate. Salespeople often keep their own records, Inter-
net support systems may not be totally connected to the sales fulfllment centers,
and faxes are rarely integrated into the online customer fles. But customers as-
sume that when they talk to one person, that person has records of all the prior
interactions.
Figure 6.27
The role of XML. XML is used the transfer messages to diverse systems. Each
system contains tools to read and write XML documents and convert the data into the
appropriate internal database tables.
Buyer
Supplier
ERP: Oracle ERP: SAP
Messages
and data
<xml>
<order>
</order>
</xml>
396 Chapter 6: Transactions and ERP
At frst glance, it appears that it would be straightforward to build an integrated
application to hold all customer interaction data. Of course, it would be a lot of
data and would take time to build the application. But the real challenge lies in
getting everyone to enter all of the data. Consider the situation of a salesperson
who has invested time and collected substantial data on product preferences and
customer work environments. That information gives an advantage to the sales-
person. Why would the salesperson be willing to share it?
Customers with multiple divisions and many different product tracks also add
complications to CRM. The system has to be able to track transactions, questions,
and issues by a variety of factors (date, product, company, person, and so on).
The system also needs a sophisticated search routine so users can fnd exactly the
pieces of data required.
Feedback, Individual Needs, and Cross Selling
The main purpose of CRM systems is to provide individual attention to each cus-
tomer to improve sales. By tracking prior purchases, you understand the status of
your customers. By providing new channels of communication, you improve the
ability of customers to provide feedback to comment on products and services and
to make suggestions for improvements. By identifying patterns in purchases, you
can develop new ideas for cross selling. If a group of customers tends to purchase
several products, you can search the CRM database to fnd customers with only
part of the solution and have your salespeople demonstrate the advantages of the
entire suiteusing the other customers as examples and references.
The fip side to CRM is that collecting and coordinating substantial data about
the customer can lead to privacy problems. As long as the data is secured and used
internally, few problems arise. But frms still need to be sensitive to customer
wishes about unsolicited contacts. In fact, customer privacy requests need to be
part of the CRM system. The issues are more complex when the selling frm has
multiple divisions, and each one wants to push new products to existing custom-
Reality Bytes: Customer Relationship Management at Dow
Most people do not think about the mundane tasks that computers handlesuch as
sorting data. Computers have been doing it for so long, that it is taken for grant-
ed. And sorting is relatively standardfor small amounts of data. But sorting large
amounts of data is defnitely not trivial. In 2010, computer scientists at UC San Di-
ego set a world record for sorting when they were able to sort one terabyte of data in
60 seconds. A full minute seems like a long time to wait for a sort, but a terabyte is
a ton of data to move around. The task required 52 computers with dual quad-core
processors and 24 gigabytes of RAM, plus 16 500 GB disk drives. The team also set
a record for the fastest data sorting rate. The system sorted one trillion data records
in 172 minutes (almost three hours). Alex Rasmussen, the lead graduate student on
the team noted that Sorting puts a lot of stress on the entire input/output subsystem,
from the hard drives and the networking hardware to the operating system and appli-
cation software. Many business transactions and reports require sorted data, includ-
ing search results and product recommendations.
Adapted from Daniel Kane, Data World Record Falls as Computer Scientists Break
Terabyte Sort Barrier, UC San Diego News Center, July 27, 2010.
397 Chapter 6: Transactions and ERP
ers. The marketing staff needs to use the CRM system to coordinate and monitor
all contacts.
Wireless applications provide even more options for CRM. Your salespeople
can stay in constant contact with the corporate database. They can retrieve current
shipping status or detailed customer information during a sales call. They can for-
ward questions or comments, which can be analyzed and answered immediately.
CRM Packages
ERP systems often have a CRM component that provides a unifed view of cus-
tomer data. For example, as Figure 6.28 shows, sales managers can quickly check
on the status of customer purchases, returns, or any other transaction involving
customers. When salespeople call on customers, they need to be able to quickly
retrieve all of the recent transactions with that customer. Perhaps the customer
had problems with a recent shipment, or perhaps they just placed a new order. The
salesperson can review those activities before calling on each customer. Then the
salesperson can investigate any problems or check on current status and provide
immediate answers to customer questions. One of the biggest challenges with a
CRM system is collecting the necessary data. An ERP system will have all of the
basic transaction datafrom the perspective of the main company. But will sales-
people enter all of their personal data into the system?
Figure 6.28
Sales and CRM from a sales managers perspective. Keeping all the customer
interaction data in one location makes it straightforward for the salesperson to
understand all of the companys associations with each customer.
398 Chapter 6: Transactions and ERP
Another important aspect of CRM is the ability to provide direct customer
service. As shown in Figure 6.29, ERP systems have self-service portals that en-
able customers to check on order status, pay bills, order new products, contact
salespeople and account managers, check on company news and events, or ask
for additional help. Although the page does not directly support XML, it does
make it easy for customers to check on various transactions 24 hours a day. By
encouraging customers to connect directly to your system, you obtain more ac-
curate data and reduce costs. Of course, if your customer is the 800-pound gorilla
in the industry, it is more likely that your salespeople will be spending time on the
customers ERP site.
Summarizing ERP Data
How can a manager handle all of the data in an ERP system?
ERP systems result in huge databases containing an enormous amount of data.
Since the data represents all aspects of business transactions, it contains incredibly
valuable information needed to make key business decisions. But, as a manager
or executive, how do you fnd this information? Since it is stored in a relational
DBMS, you could write queries to retrieve data. But, after a little time, you will
see that you often need the same data every dayso you can compare the prog-
Figure 6.29
PeopleSoft CRM from a customers perspective. The portal into the ERP system
enables customers to check the status of various items, order new products, and
contact the company.
399 Chapter 6: Transactions and ERP
ress of common items. Consequently, many ERP systems have special tools to
retrieve this standard data and display it in a graphical format.
Digital Dashboard and EIS
One of the major challenges to any information system is to make it easy to use.
This process is complicated because the decisions need to be provided to upper-
level managers who have little time to learn complex applications, yet deal with
huge amounts of diverse data. One approach is to build a portal that displays key
data and graphs on one page. The page retrieves data from a data warehouse, the
Internet, or even machines within a factory and displays graphs and warnings.
Toolkits exist to help build this digital dashboard. The older term for this ap-
proach is an executive information system (EIS). Figure 6.30 shows a sample
digital dashboard that with various charts designed to provide a quick overview of
several key functions.
Figure 6.30
Digital dashboard example. Like the gauges on an automobile dashboard, the digital
dashboard presents a top-level graphical representation of the status of various
elements. Managers identify variables and choose from charts, gauges, icons, and
tickers to display the data. Each item should be selectable to drill-down and provide
more detail.
400 Chapter 6: Transactions and ERP
Much like the dashboard on a car, the purpose of the main screen is to pro-
vide an overall picture of the status of the frm or a division or production plant.
Managers can select the specifc division and make comparisons to yesterday, last
week, last month, or other locations. If there is a problem or a decision to be
made, the executive can drill down to get more detailed data by pointing to an-
other object. For example, if the main screen shows that current sales in the west
region are low, the executive can focus on the west region and bring up the last
few quarters of sales data. The EIS will graph the data to highlight trends. The
manager can then dig deeper and bring up sales by departments or check the sales
performance of each employee, highlighting unusually high or low sales fgures.
By pointing to customers, executives can get current profles on the main custom-
ers and examine their recent purchases.
How Does an EIS Work?
For an EIS to work, it must be connected to the transaction-processing system or
data warehouse, since it is the source of the data. Many of these systems are cre-
ated with special software that simply grabs data from the corporate databases.
In one sense, the EIS is a complex model of the frm. Figure 6.31 illustrates how
executives can visit different divisions on the computer and retrieve the data
immediately. For the EIS to be useful, the computer model must be a faithful rep-
resentation of the actual company.
As a model, the EIS display has inputs of raw materials and people. Outputs
are typically measured by traditional accounting standards of profts, costs, and
growth rates. The EIS maintains budgets and forecasts and can compare them to
actual values. The functions and processes are determined from the individual
departments. For instance, there could be a production model that describes the
manufacturing output. An EIS at McDonnell Douglas has a graphics screen that
displays portions of airplanes as they are being built. As a wing is completed, it is
drawn onto the computer model.
Reality Bytes: Cash is No Longer King
In the U.S. the Federal Reserve System is in charge of issuing and controlling cash.
A study on the stock of small-denomination bills in use indicates that the use of cash
reached a peak in the mid-1990s. Between 1995 and 2006, noncash transactions had
increased from 250 a person to more than 300. Much of the shift has been to debit
cards. But, it has been diffcult for small vendors (or friends) to accept payments
with cardsparticularly without a storefront. A few companies, including PayPal,
Intuit, and Square are trying to make it easier for people to make small payments
without cash. For example, Square has a small credit card reader that plugs into the
earphone jack of an iPhone or iPad. Processing costs for credit cards are relatively
high and sometimes require monthly contracts. Square relies on per-transaction costs
of 15 cents plus 2.75-3.5 percent of the transaction value. Apple and several other
companies are trying to fnd new ways to transfer money. But any mechanism must
be supported by both customers and vendors.
Adapted from Claire Cain Miller and Nick Bilton, Cellphone Payments Offer Alter-
native to Cash, The New York Times, April 28, 2010.
401 Chapter 6: Transactions and ERP
Advantages of an EIS
The primary goal of an EIS is to provide easy access to corporate data for the ex-
ecutives. Instead of waiting for a report, the top executives can retrieve the data
as soon as it is available. Also, because all the data is accessible from the same
system, it is easier to examine data from different departments to produce a better
view of the big picture. Another useful feature is that the executives use of the
data is nonintrusive.
Imagine that you are CEO of a company, and you do not have an EIS. The
monthly reports have just indicated that one of the warehouses is not running
smoothly. You want to fnd out what the problems are. You suspect the ware-
house manager is part of the problem, but you need to be sure. What do you do?
The most direct approach is to go visit the warehouse. But what happens when
you show up at the warehouse? It is likely that the manager and the workers will
change the way they work. Your attempts to collect data have altered the way the
system runs, so you will not get the information you wanted.
Other options include sending other people or asking for additional information
via the chain of command. Although useful, these methods will be slower and the
information you receive will be colored by the perceptions of the people collect-
ing the data. For example, many people will try to focus on what they think you
want to hear.
Production
Distribution
Sales
Central Management
Executives
Data
Data
Sales
Production costs
Distribution costs
Fixed costs
Production Costs
South
North
Overseas
0
500
1000
1500
2000
2500
3000
3500
4000
4500
5000
1993 1994 1995 1996
South
North
Overseas
Production: North
Item# 1995 1994
1234 542.1 442.3
2938 631.3 153.5
7319 753.1 623.8
Data
Data
Data for EIS
Figure 6.31
Executive information system. As industries become more competitive, managers
search for ways to evaluate and improve the overall operations. Enterprise systems
collect data from across the frm and make it available to managers and top
executives. Executives can start with an overview of the frm and drill down to
various levels and departments to get more detailed data.
402 Chapter 6: Transactions and ERP
The EIS minimizes these problems by providing instant access to the corporate
data. The executives can produce reports and examine departments without inter-
fering with the operations of the company. Graphs can be created automatically.
The executives can set up different scenarios or simulations. Most of these activi-
ties are accomplished simply by pointing to objects on the screen.
Transaction Accuracy: Sarbanes-Oxley
How does the CEO know that fnancial records are correct? Af-
ter several huge corporate scandals in 2001 and 2002 (Enron, Worldcom/MCI,
Tyco, and so on), Congress decided to try and stop some of the problems. In par-
ticular, high-level executives were pleading innocent claiming that they did not
know about the problems. So, they passed the Sarbanes-Oxley Act, which requires
top executives of public companies to sign a statement attesting to the validity of
the annual fnancial statements. So, how does the CEO know if the transaction
data and reports are correct?
The solution proposed by the accounting standards board (AICPA) is to require
more independent audits and reviews of the audits. Accounting audits examine all
aspects of the transaction-processing system: from data collection, to data storage
security, to accuracy of calculations and reports. Auditors also check physical as-
sets (particularly bank accounts) to ensure that the numbers listed on the fnancial
statements tie to real-world data. As shown in Figure 6.32, bank accounts are a
critical element of auditing because they are maintained by external companies.
Similarly, inventory and customer sales are at least sampled to ensure that they
match against the internal fnancial records. These external numbers help anchor
the internal statements. For example, it is hard to falsify the books if you have to
match the cash balance at the bank. But not impossible. Somehow the Italian dairy
company Parmalat managed to list $5 billion in cash in a Cayman Island account
from 2002 to 2004 that did not exist.
Reality Bytes: Debit-Card Fee Cut
Overall, banks are in charge of the debit card and credit card systems. Techni-
cally, MasterCard and Visa are now independent companies, but they were created as
agents of the largest banks to handle processing for credit and debit cards. Retailers
who accept the cards pay fees to use the cards. In the U.S., fees for debit cards aver-
aged from 1-2 percent of the transaction cost. These costs added up to an estimated
$20 billion a year for U.S. merchants. And they were about twice as high as in Eu-
rope and other nations that regulate the fees. In 2010, Congress passed a law to limit
the bank interchange fees charged for debit card purchases. The law took effect in
July 2011 and essentially cut the fees in half. Banks expressed concern about losing
a revenue stream and searched for ways to cut customer reward programs and in-
crease other fees. Merchants would gain through lower costs and could either reduce
prices or increase profts. Most economists were betting merchants would keep the
extra proft.
Adapted from Miguel Bustillo, Merchants Win Debit-Card Fee Battle, The Wall
Street Journal, June 20, 2010.
403 Chapter 6: Transactions and ERP
Auditors also focus on the transaction and reporting processes. Do standard
procedures encourage the timely and accurate recording of all data? Do people fol-
low the standard procedure? The generally accepted accounting practices (GAAP)
were created to establish standards and guidelines for accounting procedures. To-
day, one of the purposes of accounting software is to encode these practices into
the system. In one sense, corporate accountants and managers are given less fex-
ibility. Yet from managements perspective, the software encourages everyone in
the frm to follow the proper procedures. Of course, some companies and man-
agers will fnd these procedures too restrictive. Particularly if the company uses
highly individualized practices and nonstandard production techniques.
One of the strengths of an ERP is the ability to defne and enforce rules that
apply to transactions. Accountants and auditors build the rules to maintain data
integrityoften through separation of jobs. For instance, you can require a sales
manager to verify all sales data entered by salespeople. Expenses can be automati-
cally submitted to review by managers, and rules can be added to identify and fag
unusual activity or high values. Receipt of supplies can be automatically checked
against purchases Vendor identifcation and payments can be handled relatively
automatically. Todays auditors spend considerable time evaluating ERP rules and
procedures to ensure standard practices are followed to protect the integrity of the
fnancial data.
Cloud Computing
Why do most companies avoid cloud computing for ERP sys-
tems? It is tempting to think that cloud computing would be a natural ft for ERP
systems. The software is complex, and cloud systems could automatically main-
Financial
Statements
Cash
Inventory
Sales
Bank
Customer
Inventory
Some nancial numbers
are tied to the outside
world.
Validate these to anchor
the statements.
Figure 6.32
Financial audits. Verifying the quality of the data requires tying elements of the
fnancial statements to externally validated numbers. Inventory can be physically
counted. Customer sales can be sampled, and bank data must match the internal
records.
404 Chapter 6: Transactions and ERP
tain critical backup facilities for data and servers. Companies could access their
data using simple computers with Web browsers from anywhere in the world. Be-
cause all companies need basic accounting and HRM software, it should be pos-
sible for vendors to provide online systems. And, several companies do provide
these cloud-based services. NetSuite is one of the leading independent providers.
The main vendors, including Oracle, SAP, and Lawson also provide options for
hosting their software online. The primary beneft to online hosting is that compa-
nies need fewer initial resources and staff to maintain the hardware and software.
Most of the costs become variable costslargely based on the number of users.
However, many companies have avoided using cloud computing for their pri-
mary accounting ERP systems. Some of the reasons include concerns about secu-
rity, privacy, and reliability. Cost, and the perception of cost, is also an important
issue. Most ERP systems require customizationregardless of whether the sys-
tem is online or run internally. These costs can be a signifcant portion of ERP
design and implementation. Managers are also leery of variable costs based on the
number of users. Most managers expect (wish) their company to growso they
anticipate increases in the number of future users. With in-house, fxed systems,
this growth generally does not cost extra money for the ERP (until hardware has to
be scaled up with large increases). With cloud-based systems, managers anticipate
increased costs every year, so they perceive costs as lower with their own system.
Large companies generally built their own systems and hired personnel to
maintain them before the cloud-based systems became available. It would be dif-
fcult for them to justify switchingparticularly if switching requires recreating
the customized components. Consequently, most cloud systems target small and
mid-size businesses. Yet, small businesses are likely to have minimal account-
ing systems and rely on simple systems and probably a single accountant. They
are unlikely to see much beneft from an online system that requires continual
monthly payments.
Another factor in holding back online systems is that browser-based ERPs are
relatively new. Plus, mobile Internet connectionsparticularly in the U.S.have
been relatively slow and expensive. As ERP software, networks, and mobile tech-
nologies improve, more businesses might see a value in using online systems.
One area that has attracted companies is CRM. Salesforce.com has been rel-
atively popular and experienced high growth rates. However, many companies
treat their Salesforce data independently from their ERP data. It is largely used as
a contact-management system. Salespeople use the system to share contacts and
notes with others in their company. But, this data is probably not connected to in-
house data including production and shippingunless people manually transfer
the information. Still, these cloud-based CRM systems appear to provide benefts
to companies and salespeople so they continue to use them until more integrated
tools become available.
Summary
Every organization must perform certain basic operations: pay employees, manu-
facture products or services, pay bills, monitor revenue, and fle government re-
ports. Operations are relatively structured, short term, and easy to computerize.
They form the foundation of the company. MIS supports operations by collecting
data and helping to control the underlying processes. Transaction-processing sys-
tems are responsible for capturing, storing, and providing access to the basic data
of the organization. The goal is to capture the transaction data as soon as possible.
405 Chapter 6: Transactions and ERP
Common collection methods include point-of-sale devices, process control, elec-
tronic data interchange, and electronic commerce Web sites. Because data is the
foundation for all other decisions, transaction-processing systems must maintain
data integrity and minimize the threats to the data.
Even when the frm has production and sales in multiple nations, ERP soft-
ware makes it possible for managers and executives to get a complete up-to-date
picture of the entire company. Equally important, this level of integration makes
it possible to change the way the company operates. Instead of relying on mass
production to lower costs, companies can focus on the customer and the market.
Working from the customer perspective, the frm can produce the items and op-
tions desired by the market. This type of production is possible because the in-
formation is instantly available to production and to suppliers. Integrated data on
customers improves relationships with customers by enabling companies to iden-
tify client needs and respond to problems faster.
Integrating accounting, production, sales, and employee data makes it easier to
identify bottlenecks, identify and reward the best employees, and gain a competi-
tive advantage. Ultimately, the key to ERP systems is not the softwareit is the
integration and reengineering of the business operations that make your company
better. The tools provide the ability to change the way the frm operates, and to use
these capabilities to fnd a better overall solution. Whether the frm manufactures
products or is a service frm or governmental agency, you can fnd new ways to
operate when everything is integrated.
A Managers View
How do you keep up with the thousands or millions of transactions in a
modern organization? Information systems have been developed to handle
internal data from accounting, human resource management, and produc-
tion. Enterprise systems integrate the many pieces into data that is consistent
and accessible across the organization. Increasingly, it is possible to interact
electronically with other companies. These systems make it easier to iden-
tify and interact with your customers and suppliers. The integration makes it
possible to alter the way the company is structured and managed. Creating
agile frms that use mass customization to deliver exactly what the customer
wants at costs comparable to those experienced with mass production.
406 Chapter 6: Transactions and ERP
Key Words
Web Site References
General Travel Reservations
Expedia www.expedia.com
Kayak www.kayak.com
Orbitz www.orbitz.com
Sabre Travelocity www.travelocity.com
Discounts
Bestfares www.bestfares.com
Cheap Tickets www.cheaptickets.com
Priceline www.priceline.com
TravelHUB www.travelhub.com
IndividualAirlines(U.S.)
Alaska/Horizon www.alaskaair.com
American www.aa.com
Delta www.delta.com
Frontier www.frontierairlines.com
Jet Blue www.jetblue.com
Southwest www.southwest.com
United www.ual.com
US Airways www.usairways.com
accounting journal
audit trail
bill of materials
chart of accounts
continuous quality improvement
customer relationship man-
agement (CRM)
digital dashboard
distribution center (DC)
drill down
electronic data interchange (EDI)
enterprise resource planning (ERP)
exception reports
executive information system (EIS)
extensible markup language (XML)
extensible business report-
ing language (XBRL)
general ledger
just-in-time (JIT)
magnetic ink character rec-
ognition (MICR)
mass customization
optical character recognition (OCR)
point of sale (POS)
process control
radio frequency identifcation (RFID)
request for proposal (RFP)
supply chain management (SCM)
transaction processing
407 Chapter 6: Transactions and ERP
Review Questions
1. Describe four methods of data capture.
2. What is the role of XML in EDI transactions?
3. What is the purpose of XBRL?
4. Explain how to a vendor all payment methods have costs.
5. Why are customers unlikely to adopt a new payment mechanism?
6. How do accounting and fnancial systems form the backbone of ERP
systems?
7. Why are human resource management systems such an important component
of ERP systems?
8. How are distribution centers used to reduce inventory, and what information
is needed for them to operate effciently?
9. What is the role of a DBMS in an enterprise resource planning system?
10. What are the primary features and capabilities of an enterprise resource
planning system?
11. How does supply chain management enable a frm to change its structure and
focus?
12. Why is customer relationship management so important? Why does it require
an integrated system?
13. Why is an executive information system or digital dashboard so important to
an ERP system?
14. If you start a new company, would you use cloud computing to handle your
accounting system? Why or why not?
Exercises
1. Choose 10 Web sites that sell items or content. Create a table and identify the
payment methods that they support.
2. In 2010 and 2011, a few cell phone companies tried to create a new standard
to enable people to pay for items with their cell phones. Why did that project
fall apart? What alternative, but similar method is being pushed?
3. Identify the primary government laws and rules that are designed to protect
the governments interest in transactions.
4. Assume that you are running a small manufacturing business. To reduce
costs, you want to contract with an overseas manufacturer to build a key
component. How would you locate a company do to the work? What
transaction details and data sharing will you have to set up to make the
process work?
5. Find a balance sheet and income statement for a company (Try the EDGAR
system at www.sec.gov). Rebuild the two statements as separate pages in a
spreadsheet.
408 Chapter 6: Transactions and ERP
C06E06Base.mdb
6. Create the basic forms needed to use the database in a transaction system.
7. Create the spreadsheet in Figure 6.19 that shows the initial integration. The
database fle contains the basic data. You should build queries and import the
data into a spreadsheet to create the analysis and charts. It is best if you use
dynamic links.
8. If you have access to an ERP system, take a specifc role (salesperson,
production manager, customer, supplier, etc.) and use the system to enter data
and check on the current status variables for your role.
9. Choose an industry (for example, automobiles, bicycles, or spare parts).
Research the industry and identify what aspects follow mass production
versus what operations follow mass customization strategies. Identify
whether the industry sells predominantly to consumers or other businesses.
10. Find two cloud-based accounting systems that could be used by a business
with revenues of about $1 million a year and 50 employees. If possible,
estimate the costs of the systems. Pick one and explain why it is better than
the other.
Technology Toolbox
11. Find information on at least two accounting or ERP packages that could be
used for a business with 100 to 150 employees. Identify the strengths and
weaknesses of each package. Are the packages tailored to specifc industries?
12. You need to select an accounting or ERP package for a small service
business, such as a law frm or accounting frm. Identify the major features
that you want to see in the accounting system.
13. You have been hired as a consultant to a small graphics design frm with 20
employees. Design a digital dashboard for the owner-manager to monitor the
important variables of the company.
14. Compare the purchasing capabilities offered by two ERP vendors. Visit
their Web sites and view the demos. If possible, include copies of the
main purchasing forms from each vendor. Summarize the similarities and
differences.
15. Find an organization that uses a digital dashboard-executive information
system. Identify the major components on the main screen, and briefy
explain how the system is used to drill down to additional information.
Teamwork
16. As a team, fnd at least 10 Web sites that deal with international customers
and point out the features that they provide that might not exist or are
different on typical American Web sites.
17. Assume you want to create a customer relationship management system for
a company that sells supplies and products to hair salons. Each team member
409 Chapter 6: Transactions and ERP
should fnd one CRM product then identify the strengths and weaknesses
for this task. Combine the results and select one tool to recommend to
management.
18. Each team member should research one ERP system. Identify the
internationalization features available. Assume you are running a midsize
company with offces and operations in several European nations. Describe
the benefts provided by these international features. Make a recommendation
on which product to buy.
19. As a team, research the status of XBRL in fnancial reporting. Identify which
organizations require its use, which tools can generate XBRL reports, which
tools exist to retrieve and analyze XBRL data, and so on.
20. You have been hired as a consultant to a midsize agricultural company that
packs fruit and ships it to retail outlets. The fruit is grown under contract at
regional farms. About 65 percent is sold to grocery and chains and fruit stores
in the United States, while the rest is shipped overseas to high-end stores and
restaurants. Design an ERP system with a digital dashboard for this company.
Assign individual components to each team member. Be sure to identify
potential problems and risks that might arise.
Rolling Thunder Database
21. Identify the major transaction-processing components in the system.
22. What features are used in the database and the forms to ensure quality of
transaction data?
23. For each major transaction type, identify the sequence of steps that are
performed and determine which ones are time critical.
24. For each major transaction type, estimate the frequency of the transaction and
the volume of data involved.
25. Using the existing forms, perform the following tasks for Rolling Thunder:
a. Take a bicycle order.
b. Assemble a bicycle.
c. Create a new purchase order.
d. Record the receipt of purchases.
26. Extract sales and cost data by model type and create a spreadsheet to
analyze it. (Hint: Use the Extract Data form.) Write a short report discussing
proftability and any trends. Include graphs to illustrate your comments. Your
spreadsheet should look at monthly sales by model and monthly material
costs by model. Be sure to compute proft margins and examine percentages.
27. Assume that Rolling Thunder is experiencing problems with quality control.
Suddenly there are several complaints about the components. Write a report
describing all of the data and reports we would need to help us resolve these
problems.
410 Chapter 6: Transactions and ERP
28. Top management needs an analysis of purchases and deliveries from vendors.
Begin by using queries to extract the appropriate data to create a basic
spreadsheet. Write a report analyzing the data; include graphs to illustrate
your points.
Vendor
Purchases
Order total $
Percent of
vendor total Received $
Receipts %
of purchase
Avg. # days
to deliver
29. Describe how an ERP solution could improve operations at Rolling Thunder.
What operations would you implement frst?
30. Describe how Rolling Thunder Bicycles might use a supply chain
management system. In particular, how would it integrate with its suppliers?
31. Describe or create a subsystem that could be used by the head of sales
management to monitor and improve customer relationships and sales.
Additional Reading
Anthes, Gary H. When fve 9s arent enough, Computerworld, October 8,
2001. [Challenges of transaction processing at Visa.]
Bleakley, Fred. Electronic payments now supplant checks at more large frms,
The Wall Street Journal, April 13, 1994, p. A1, A9. [Costs of handling
checks.]
Disabatino, Jennifer. The technology behind the problem, Computerworld,
October 22, 2001. [Transaction processing diffculties in providing airline
passenger data to the FBI.]
Harreld, Heather, Extended ERP reborn in b-to-b, Infoworld, August 27, 2001.
[Updated perspective on ERP and new applications.]
Krill, Paul, Data analysis redraws CRM landscape, Infoworld, November 30,
2001. [CRM vendors and capabilities in sales analysis.]
Loshin, Pete. Transaction processing, Computerworld, October 1, 2001. [Basic
concepts of transactions.]
Songini, Marc L., PeopleSoft project ends in court, Computerworld, September
10, 2001. [Serious problems with an ERP installation at Connecticut
General.]
Trombley, M. Visa issues 10 commandments for online merchants,
Computerworld, August 11, 2000. [Visas attempt to get vendors to protect
credit-card databases, and Gartner Groups estimate of online fraud.]
Want, Roy, RFID: A Key To Automating Everything, Scientifc American,
January 2004. [The strengths and limitations of RFID with a good description
of how it works.]
411 Chapter 6: Transactions and ERP
Weston, Randy, ERP users fnd competitive advantages, Computerworld,
January 19, 1998, p. 9. [Summary of ERP benefts.]
Winslow, Ron. Four Hospital Suppliers Will Launch Common Electronic
Ordering System, The Wall Street Journal, April 12, 1994, p. B8. [EDI for
hospitals, including costs.]
Cases: Automobile Industry
Te Industry
Automobiles remain one of the most expensive, complex products sold to con-
sumers. Manufacturing requires thousands of steps with parts acquired from hun-
dreds of suppliers. And people buy cars for more than transportationthey are
purchased based on image and style. As Ralph Szygenda, legendary CIO of GM
puts it: GM is ultimately in the fashion business, and to win, the company needs
the best cars and trucks, which we have, with more to come (Szygenda 2003).
Perhaps he was a bit optimistic. North American sales for 2003 dropped to 16.6
million vehicles. GM had the largest market share at 28.3 percent, followed by
0
50
100
150
200
250
300
350
1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010
B
i
l
l
i
o
n
$
Annual Revenue
General Motors
Ford
DaimlerChrysler
Toyota
-0.30
-0.25
-0.20
-0.15
-0.10
-0.05
0.00
0.05
0.10
0.15
0.20
1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010
R
a
t
i
o
Net Income / Revenue
General Motors
Ford
DaimlerChrysler
Toyota
412 Chapter 6: Transactions and ERP
Ford (20.7), DaimlerChrysler (12.8), Toyota (11.1), and Honda (8.1) (Warner
2004). The astonishing number is found in the 1960s when GMs market share
was over 50 percent. However, the declining share is not all that it seems. Check
the Web sites of the big three companies and you will quickly see that they have
bought up several other brands over the past years. Dig a little deeper into GMs
annual report and you will fnd that the company at one time owned shares in
Subaru, Suzuki, Fiat, and Daewoo, among others. Ford has similar arrangements
with other companies. By 2010, the total U.S. market share for the big three man-
ufacturers (GM, Ford, Chrysler) was only 45 percent.
Company 2010 YTD/May Company 2010 YTD/May
GM 19.1 Hyundai 4.4
Ford 16.9 Mazda 2.1
Chrysler 9.4 Subaru 2.3
Toyota 15.2 Mercedes-Benz 1.9
Honda 10.5 BMW 1.8
Nissan 8.1
Market Share: http://online.wsj.com/mdc/public/page/2_3022-autosales.
html#autosalesE
Most of the frms in the industry also faced a huge problem they referred to as
legacy costs. Over the years, the heavily unionized American frms promised huge
pensions and health care benefts to their employees. Now, they face billions of
dollars in fxed cost payments to retireescosts that were never fully funded from
prior operations. So, a substantial percentage of current sales revenue went to pay-
ing these costs.
Competition
In general, the industry is highly competitive. It has been estimated that the De-
troit big three have an excess production capacity of 2.5 million vehicles (Plun-
kett Research). Total U.S. sales fell slightly in 2003 to 16.6 million new vehicles.
Compounding the problem is the fact that many of the sales have been driven by
deep discountseither in price or in fnancing deals. At one point, in 1993, Ford
pushed so hard to make the Taurus the number one selling car, that it was giving
discounts of $2,600a considerable sum at the time. Most observers believe Ford
was losing money on every car (White 2004).
At the same time that the American car companies appear to be suffering, it
should be noted that only 40 percent of Americans can actually afford to buy new
cars (National Independent Dealers Association). In 2001, the Bureau of Trans-
portation Statistics reported sales of 8.6 million new passenger cars (not trucks)
and 40.7 million used passenger cars (and 11 million new bicycles) (www.bts.
gov). Used truck numbers are not reported, but in terms of new vehicles, cars
make up about 50 percent of the total number of vehicles. In any case, sales of
new vehicles account for about 17 percent of automobile sales. Globally, about 60
million vehicles were sold in 2003 (GM annual report).
Sales of American vehicles have continued their decline. In 2007 Ford expe-
rienced an 8.1 percent drop in sales, Chrysler Group sales fell 1.4 percent, and
GM sales dropped by 21 percent. In contrast, most import manufacturers reported
double-digit increases in sales (Lam 2007). Ford and GM both reported that part
413 Chapter 6: Transactions and ERP
of the decline was due to a reduction in sales to car rental feets. The manufactur-
ers are trying to move away from these low-margin sales. Sales were also down
for most other months in early 2007. The domestic manufacturers announced
sales promotions for July. Also in 2007, Daimler, the German parent company an-
nounced the sale of Chrysler to a private equity frm. The U.S. auto industry also
faced huge pension-fund and health care costs that were promised to workers and
retirees decades ago.
Technology and Management
The ultimate question the automobile industry faces is: How do you manage such
a large, complex company? In 2003, GM had 326,000 employees worldwide, and
revenues of $185 billion (annual report). The company ran 32 plants in North
America alone (Garsten 2003). By 2010, the number of employees was down to
202,000 (2010 annual report). With multiple divisions, thousands of designers and
engineers, and a recalcitrant union, how can anyone possibly determine what is
going on, much less control it? As one of the largest companies in America for
over 60 years, GM is an interesting case in management and mismanagement. The
company was initially created by combining several independent brands. Alfred P.
Sloan, who organized and ran the company in the 1930s, knew that with the infor-
mation system available at the time, he could never control an organization that
big. His decision was to let the divisions run somewhat independently, but report
to a set of policy committees and central staffs in a system he called decentral-
ized operations and responsibilities with coordinated control (Taylor 2004). All
auto manufacturers have struggled in the last couple of decades with the question
of how to control the huge organizations. As technology has improved, new op-
tions have been created that provide for increased central control across the entire
organization. Tools such as global networks, CAD-CAM systems for engineers,
workgroup and collaboration systems for managers, and enterprise resource plan-
ning systems for operations and fnance make it possible to share data. Yet install-
ing these systems is only the frst step. It is also necessary to change the way the
company runs. And that can be diffcult in an organization used to fexibility and
defned ways of functioning that evolved over decades.
The automobile manufacturers have tested many variations of information
technology over the past decade. The industry spent billions of dollars on telemat-
ics (integrating information systems into the vehicle). It has spent billions more on
supply chain management and enterprise resource planning systems. Today, most
of the $3 billion a year that GM and Ford spend on IT goes to operationskeep-
ing the existing systems running (Piszczalski 2002). The companies have still not
achieved total integration of their systems, and might never reach that state. But
they are still interested in tools that can solve specifc problems and provide gains
in quality, cost reduction, and bringing new models to market faster.
In 2007, Ford announced a partnership with Microsoft to install an integrated
in-car communication and entertainment system. The system has USB and Blue-
tooth ports for establishing connections to most consumer electronic devices. It
also supports voice-activated callingincreasingly important as more states ban
hands-on cell phone use in cars (Rosencrance 2007).
Te Crash of 2008
The recession of 2008 was the last straw for GM, and the company fled for bank-
ruptcy on June 1, 2009. In the process, the U.S. and Canadian governments bailed
414 Chapter 6: Transactions and ERP
out GM (and Chrysler) with billion-dollar infusions of cash. In exchange, the two
governments gained partial ownership rights to the two companies. Ford had for-
tuitously refnanced several loans right before the crash and was able to avoid
the fnancial crunch and did not fle bankruptcy or require government subsidies.
In the cleanup process, GM shed most of its legacy costs, by creating a new
company that holds mostly newer assets and dropped the pension fund obliga-
tions. In exchange, the unions gained control over most of the new GM shares. In
November and December 2010, the new GM issued an IPO and became the new
GM (2010 Annual Report). Chrysler was sold to Fiat, the Italian car company.
Ford remains as an independent company. Both GM and Ford sold off or closed
several car divisions. For example, GM closed Hummer, Pontiac, and Saturn, and
discarded Saab; leaving the company with Chevrolet, Buick, Cadillac, and GMC
in the United States. Ford sold Jaguar and Land Rover to Tata Motors and closed
the Mercury division.
The other big changes in the industry stem from the rising price of gasoline
in 2010hitting over $4 per gallon in most states in 2010 and 2011. This price
level encouraged people to search for cars with better gas mileageparticularly
hybrid gas/electric cars. Although the American companies had some hybrid cars
available, the Toyota Prius was the industry leader by a long shot. In 2011, GM
began selling a hybrid car that could run 40 miles on electric power, and Nissan
introduced the Leafan all-electric car. Huge uncertainty remained over whether
customers would buy all-electric cars and whether it would be possible for the
cars to have a long enough range to be useful as a primary vehicle.
The third overall trend is that total sales outside the U.S. exceed the value of
sales within the U.S. By 2011, China had become the largest automobile market in
terms of the number of vehicles sold. For example, GM sold 8.4 million vehicles
worldwide in 2010 and 2.2 million in the U.S. The total industry sales in the U.S.
were 11.8 million, and total worldwide sales were 73.6 million (GM 2010 Annual
Report). Worldwide, Toyota was the largest automobile manufacturer in 2010.
Additional Reading
Boudette, Neal E. GM Revs Up Fuel-Cell Development, The Wall Street
Journal, June 15, 2007.
Garsten, Ed, UAW May Sacrifce Jobs For Benefts, The Detroit News,
September 8, 2003.
http://www.niada.com/Industry_Information/ind_10key.htm
Lam, Judy, Ford Sales Decline 8.1%; Chrysler Posts Slip in Sales, The Wall
Street Journal, July 3, 2007.
Piszczalski, Martin, Auto IT Moves Back to Basics, Automotive Design &
Production, October 2002.
Plunkett Research, U.S. Automakers Suffer Declining Market Share/Their
Response is to Restructure and Seek Greater Effciency including Cutting
Costs, http://www.plunkettresearch.com/automobile/automobile_trends.
htm#1, 2004.
Rosencrance, Linda, Ford, Microsoft in Sync with In-car Digital System,
Computerworld, January 9, 2007.
415 Chapter 6: Transactions and ERP
Szygenda, Ralph, Its a Great Time to Be In I.T., Information Week, January 27,
2003.
Taylor III, Alex, GM Gets Its Act Together. Finally, Fortune, March 21, 2004.
Warner, Fara, Show Floor News: Detroit to Focus on Tastes as Its Market Share
Decreases, The New York Times, January 5, 2004.
White, Joseph B and Norihiko Shirouzo, At Ford Motor, High Volume Takes
Backseat to Profts, The Wall Street Journal, May 7, 2004
Case: Ford
Ford (ticker: F) has presented several interesting cases in management over the
years. Driven initially by Henry Fords effcient adoption of mass production, the
company dominated the automobile industry. Through all of the changes in the in-
dustry, technology, and fnance, the company has largely remained under the con-
trol of the Ford family (40 percent of the voting stock). In October 2001, the fam-
ily ousted Jacques Nasser and Henrys great-grandson, Bill Ford became CEO.
The frm struggled for a year, trying to recover from its earlier problems. One of
the major changes implemented by Mr. Ford was an emphasis on proftsinstead
of raw sales numbers. Toyota is close to overtaking Ford and becoming the num-
ber two car company in the United States. Mr. Fords comment: I dont want to
be the biggest. I want to be the best. With lower sales, Ford surpassed GM in
profts for 2003 (White and Shiorouzo 2004).
Revenue Decisions
The automobile industry is a classic case of mass production. Building thousands
of identical cars and trucks reduces costs. But then you have to sell them. Does
everyone want the exact same car or truck? In 2001 and 2002, Ford began to re-
evaluate its strategy, with a focus on identifying the source of profts. Why build
300,000 Tauruses if the company loses money on each car? In the process, the
company found that it needed to track exactly which vehicles are selling, what
features are in demand, and the details of regional preferences. Bill Ford promot-
ed Lloyd Hansen to a corporate vice presidency in charge of overseeing revenue
managementidentifying exactly which products should be built. The company
began analyzing data from existing sales channels. More important, it combined
consumer Internet research data to identify regional choices. Mr. Hansen says
that the company was surprised to fnd consumers in sunny states were interest-
ed in four-wheel drive pickups. There was always this gut-feel paradigm that
people who live in Texas, Florida, and California dont need a 4-by-4 (White
and Shiorouzo 2004). By sharing the data with dealers, Ford increased shipments
of the more expensive trucks. Ford uses the same information analysis to target
discounts more precisely. With truck sales, Ford was able to increase revenue by
$934 per vehicle from 2003 to 2004 (Taylor June 2004).
Think about the decisions required for revenue management. The key is that
you have to decide exactly which products to produce tomorrow. You have dozens
of cars and trucks, each with several trim variations. You have dozens of plants.
You have some data on sales and profts. Should you produce 1,000 Ford Explor-
ers that might generate $4,000 per vehicle in profts, or should you run 1,000 Fo-
cuses with lower proft margins. If you do run the Explorers, how much discounts
416 Chapter 6: Transactions and ERP
should you give to get them sold? Keep in mind that this is a $25 million decision
that you have to make every day (White 2002).
Now, make the process even more complicated: what are your rivals going to
do? If Cadillac offers a rebate on the Escalade, how will that affect sales of the
Navigator? Should you match the discount, or accept the possibility of lower sales
at higher proft margins? What is the probability that Cadillac will offer that re-
bate? More importantly, if you respond, will they retaliate and offer even larger
discounts? Few models are actually this sophisticated today, but in reality, you
need to forecast a huge number of variables to make these decisions.
Production Management
The system of mass production makes it diffcult to respond to changes in de-
mand. Forecasts are helpful, but Ford has worked hard to add fexibility into its
production system. In particular, it is working to build different versions of cars
from the same plant. At one time, each plant was designed to produce only one
type of car. Today, plants need to be able to switch production so that when de-
mand for crossover wagons increases, the company can stop producing sedans and
build the high-demand cars instead. Toyota and Honda pioneered these practices,
and Ford is still trying to catch up, but the company is making progress. Many of
these changes are being implemented in the new Chinese plants. The goal is to put
in only enough capacity to meet current demand, but enable the plants to expand
quickly if demand takes off (White and Shirouzo 2004).
Of course, it always pays to improve effciency in production. Fords plant in
Cuautitlan, Mexico, produces 300,000 to 400,000 cars and trucks a year. It uses
a just-in-time production system, where suppliers deliver parts as they are need-
ed on the lineinstead of holding them in inventory. Until 2002, the partially
completed vehicles were tracked through manufacturing and painting using paper
identifcation sheets. But this manual system generated huge numbers of errors
from lost, damaged, or switched sheets. Ford called on Escort Memory Systems
from California and CAPTA from Mexico to convert the system using radio fre-
quency identifcation (RFID) tags. Dealing with the electronically dirty manufac-
turing foor and the 220 C paint oven temperatures was a problem. The com-
panies used high-temperature RFID tags with 48-byte memory and 1,200 bytes/
second transfer rate. The tags were attached to the pallets that carry the vehicle
bodies through the plant. Antennae were embedded in explosion-proof contain-
ers in the foor under the conveyor belts. As each skid passes over an antenna, the
system reads it and feeds the information to the central control system (Johnson
2002). In 2004, ford installed WhereNet Corp.s real-time parts-locating system in
its F-150 truck plant. The system changes production from a push-based inventory
supply to one that pulls products onto the line when an operator pushes a button.
The system knows which parts are needed and delivers them to the job site just as
they are needed (Rosencrance 2004).
In a fashion market, producing new models quickly is critical. Ford has reduced
its development time by 25 percent from the late 1990s and is getting better by 10
percent a year. Still slower than Toyota, but Ford was able to produce a third of its
new models in 30 months or less (Taylor February 2004).
Turnaround
Ford weathered the recession and liquidity crisis that took down GM and Chrys-
ler, but it faced many of the same pressures in terms of lost sales and restructuring.
417 Chapter 6: Transactions and ERP
CIO Nick Smither arrived at Ford before the 2008 crisis, but Ford had already
slashed costs and dropped models. Smither noted that I have always said a career
in IT is a career in change management. But no one could have anticipated this
level of change (Johnson 2010).
One of the changes at Ford was to simplify production and orderingby re-
ducing the number of confgurations. For example, up to 2008, a customer could
order a full-size SUV with one of 76,000 confgurations. By 2010, the list was cut
to 1,500. Not exactly simple, but easier to produce. Ford also reduced the number
of vehicle platforms, from 27 down to 15; and it wants to use those for all global
production. IT costs have also been slashed, and Smither focused on removing
excess capacity and duplication. It dropped from six data centers down to four and
cut the application portfolio by 40 percent. The company added new collaboration
tools and built standardized systems to support integrated design, procurement,
sales, marketing, and manufacturing processes. It also developed new in-vehicle
communication and entertainment systems. All while cutting IT staffng by 20
percent (Overby 2010). The CIO now reports to the CEO and meets weekly with
corporate executives to restructure the entire company into a single system. For
example, a new WebQuote system is used by all engineers in Ford to defne prod-
ucts and solicit quotesfrom any division around the world. Everyone sees the
same data and same suppliers.
In cooperation with Microsoft, IT also developed the in-vehicle Sync system
that integrates and controls everything from the radio, to seats, to the navigation
system. It is largely voice-controlled and is highly praised by most customers.
Questions
1. How does Fords information system help them reduce costs and add fexibility to
the production line?
2. What data is provided by the ERP system that can be used to make tactical and
strategic decisions?
3. What type of data does Ford need to know to build its forecasts and plan produc-
tion levels? How does the ERP system provide this data?
Additional Reading
Johnson, Dick, RFID Tags Improve Tracking, Quality on Ford Line in Mexico,
Control Engineering, November 2002.
Johnson, Maryfran, IT Fuels Fords Dramatic Turnaround, Computerworld,
August 31, 2010.
Overby, Stephanie, How a Global IT Revamp is Fueling Fords Turnaround,
CIO, August 30, 2010.
Rosencrance, Linda, Ford Deploys WhereNet Wireless System in New Truck
Plant, Computerworld, June 30, 2004.
Taylor III, Alex, Detroit Buffs Up, Fortune, February 9, 2004.
Taylor III, Alex, Bills Brand-New Ford, Fortune, June 28, 2004.
White, Joseph B. Automobile Industry Is Using Science Of Revenue
Management to Sell Cars, The Wall Street Journal, May 5, 2002.
White, Joseph B. and Norihiko Shirouzo, At Ford Motor, High Volume Takes
Backseat to Profts, The Wall Street Journal, May 7, 2004
418 Chapter 6: Transactions and ERP
Case: General Motors
General Motors (ticker: GM) began life as a diverse companya collection of
manufacturers loosely controlled through a central organization. It really has not
changed much over the years, but it keeps trying. Even the bankruptcy fling and
new GM did not actually change the management structurealthough it did
bring in a couple of outsiders as CEOs.
Product Management and Marketing
The old GM listed nine major brands on its home page (without Buick). And
that list does not include several European and Asian brands that are fully or
partly owned by GM, such as Opel, Vauxhall, Daewoo, Fiat, Isuzu, and Suzuki
(Plunkett Research 2004). Imagine trying to monitor the dozens of companies,
product lines, and markets. One step GM is taking is an attempt to build a central
European database encompassing clean data from Spain, the Netherlands, and the
UK. Most of the work is being done for its Daewoo division. The goal is to create
a consistent list of its 700,000 customers and prospects and make it available from
its Amsterdam headquarters. Daewoos UK direct marketing and e-commerce
manager, Matthew Young, notes: In Europe, it was apparent that we had no con-
tinuity or integration of style. This will also plug the hole in our cost effciency
(GM Daewoo 2004). The new GM was down to four domestic brands, plus
ownership in several international companies (2010 Annual Report).
Production and Collaboration
Production of automobiles is changingparticularly as the automotive technol-
ogy changes. For example, the gas pedal in the 2004 Corvette is not mechanically
connected to the engine. Instead, it is an electronic connectionmuch like the
fy-by-wire Boeing 777 jet. Many cars have 30 wireless sensors in them, with
plans for new models with over 50 devices in them. Tony Scott, chief technology
offcer at GM, notes that we spend more per vehicle on software than we do on
steel, and that software has to survive the 10-or-more-year life of the car (Sul-
livan 2003).
Implementing new technologies into automobiles is a complex task. Advances
have to be evaluated, tested, and priced to match the level of the automobile. To
handle the changing technologies and track which ones are being used in each ve-
hicle, GM adapted a technology road mapping process developed at Saab (at one
time a subsidiary of GM). The basic process places the model year on the X-axis
of a chart, and the Y-axis represents increasing performance. Individual projects
are drawn on the chart to show if they are funded or unfunded, and when they
started. Collecting the data for charts across the organization was not easy. Even-
tually, a database-driven Web site was created to hold the information about exist-
ing and planned projects, containing the description, budget, development stage,
key personnel, cost, and planned applications. Even then, most divisions were re-
luctant to enter the appropriate data. So, GM forced divisions to enter data by
explaining that if there was no data in the database, then the project must not be
important, and it would not be funded. The process was useful for some groups,
but avoided by others. The good news is that everyone could see how the various
projects scattered across the company were related. For example, electronic steer-
ing was going to rely on the 42-volt electrical system (older cars use a 12-volt
system), so the timing of the two projects had to match. The system also showed
several redundant projects, which caused conficts because everyone wanted the
419 Chapter 6: Transactions and ERP
other project to be canceled (Grossman 2004). A powerful extension of the road
mapping process was to extend it to suppliers. For example, by overlaying Mo-
torolas road map, engineers could plan for future capabilities.
Automobile manufacturers are really assemblers and integrators. Each plant
has thousands of suppliers who provide everything from individual bolts and glue
to fully assembled cockpits and seats. Each of these companies has additional sup-
pliers. How can anyone track the orders and solve problems if something goes
wrong several layers deep into the supply chain? Product life cycle management
(PLM) software presents one answer that is being used in the automotive world.
The system enables GM to track the source of all components used in a product
during its lifetime. It also provides information to the supply chain participants.
Terry S. Kline, GMs global product development process information offcer,
notes that in product development, IT projects like PLM have helped pare a bil-
lion dollars of cost over the past three years. But Kline also quickly notes that the
system has also helped reduce the time-to-market from idea to product from 48
months to 18 months (Teresko 2004). About 80 percent of a car and as much as 70
percent of the design content comes from outside the automobile company. PLM
integrates the business information with the engineering (computer integrated
manufacturing) data and shares it with other members of the supply chain.
Making the thousands of decisions and setting strategy is incredibly diffcult.
Rick Wagoner, the CEO, noted in 2004 that we didnt do everything right over
the last 12 years. About three times during that period you think youve got it,
and then something else comes up. We made huge progress in 92, 93, 94, but
then we started to pay the price because we had, out of necessity, underspent (on
new products) during that tight period and didnt do that well on the revenue side.
Then, in the last three or four years, weve run the business very well, but the pric-
ing has been tough. So my lessonthese arent complaints but an observation
is, Dont ever think youve got it licked, because you probably dont. This is not a
one-step game. This is a multiple[-year] thing, and its hard, and you learn as you
go along. The key thing is to remember what youve learned so you dont have to
relearn it (Taylor 2004).
In early 2007, GM signed a $1 billion fve-year contract with AT&T to provide
global IP services supporting voice, data, and video communications around the
world. The system provides a global virtual private network for GM based on
Multiprotocol Label Switching (MPLS) that supports routing packets by priority
values. Ralph Syzgenda, CIO at GM, stated that The real end goal is that every
employee has the same type of capabilities no matter where they are in the world,
and in fact, when they wake up, they dont need to know where they are in the
world. It just works. (Thibodeau 2007).
Technology in cars is also increasing. In 1990, a typical car ran software con-
sisting of one million lines of code. By 2010, the number is expected to increase to
100 million lines. Software and electronics in 2004 constituted one-third the cost
of the car. GM is concerned about managing the software development process
and the liability. Anthony Scott, chief technology offcer for GMs Information
Systems and Services organization said that People love to sue GM when they
get into an accident or have some sort of a problem. As more and more software
comes into the car GM is going to expect [software developers] to participate at
some level in that liability. (McMillan 2004).
420 Chapter 6: Transactions and ERP
Information Technology
Ralph Szygenda is already a legend at GM. As its frst CIO in 1996, he inher-
ited several problems. GM had tried to simplify its IT functions by outsourcing
computer management to EDSof course, the company wanted to keep the prof-
its, so it purchased EDS. But the IT departments were still not running smoothly.
Among other problems, it took the company 48 months to develop a new car. Szy-
genda went several steps further into outsourcingby moving to a multivendor
approach, forcing them to compete against each other, yet still cooperate to pro-
vide products that worked together. In the process, he slashed annual IT spending
from $4 billion to $3 billion, and installed 3-D virtual reality modeling software
along with a collaborative infrastructure. Model development time dropped to 24
months. The time it takes to deliver a special-ordered vehicle dropped from 70 to
30 days. To control the outsourced components, Szygenda kept 2,000 IT manag-
ers in house. He observes that when I frst started doing this, people said you
couldnt outsource critical aspects of the company, and I agree with that. Those
2,000 [managers] are the critical part, but the hands, arms, and legs of building IT
can be outsourced (Zarley 2003). Szygenda uses the 800-pound gorilla clout of
GM to keep suppliers in line and encourage them to adopt standard procedures.
A frustrating problem for customers arises when they take a vehicle to the deal-
er for a repair, but the dealer does not have the repair parts in stock. Dealers do
not like to carry large inventories because the carrying costs are too high. GM
maintains an inventory of 1.3 million parts and dealers typically stock from 5,000-
12,000 parts. In the past, GM relied on the judgment of individual dealer parts
managers, who waited until the end of the week to submit a batch parts order.
The practice also caused problems for GM distribution centers as workers rushed
to fll orders from hundreds of dealers arriving at the same time. To reduce the
problems, GM installed a Retail Inventory Management (RIM) system that tracks
daily parts usage at each dealer. The data is sent to the regional distribution center
and replacement parts are shipped to the dealer. A pilot test involving 350 dealers
in Florida resulted in a smoother work load with an order variance of 2 percent
compared to 21 percent before installing the system. The system also uses analyt-
ics to recommend which parts to stock at each dealership. GMs Saturn division
had used a similar system for years, but it was a challenge to build the new system
to integrate thousands of dealers using diverse systems (Thibodeau 2006)
Technology has not always been successful at GM. In the 1990s, it installed a
computerized system for dealers that required them to order cars 90 days in ad-
vance, and it made it diffcult to change orders. In the meantime, GM announced
that it wanted to take over 700 dealerships and run them centrally. Then, the order-
ing system crashed and sales plummeted for a month. The system was eventually
fxed, but the two decisions alienated dealers. Jack Smith, ex-CEO of GM, notes
that these and other problems were exacerbated by market manager Ron Zarrella,
who was brought in as an outsider from Bausch & Lomb. Smith notes that the car
business is unique, and an outsider might say, Thats really a dumb way to run.
But the unfortunate thing is, that is the way it runs. There are some things you just
have to live with (Taylor 2004).
GM, and other companies have begun experimenting with RFID tags to track
parts through the supply chain and factory. For example, GM uses active RFID
tags to store job information to indicate which parts need to be installed in each
vehicle. But the company is still focused on using bar codes to track parts. Bar
codes are substantially cheaper and are not subject to electrical interference from
421 Chapter 6: Transactions and ERP
metals and chemicals on the production foor. Engineers do believe passive tags
could be useful within the car, making it easy for repair people to quickly scan for
the exact part installed deep in a vehicle (Weier 2006).
As one of the largest organizations in the world with plants and offces in 200
countries, 280,000 employees, thousands of dealers, and millions of customers,
GM has an identity problem. GM has tried federating identity management sys-
tems from several companies, including tools from Novell, Siemens, Oracle, and
Sun Microsystems. But James Heaton, global director of identity management
said that a lot of vendor solutions halfway work for GM, but when we try to scale
them, they break. We break almost everything we touch the frst time we try to use
it. Even creating a system that handles password resets is challengingparticu-
larly with multiple languages. If a user forgets a password, the system asks per-
sonal questions to identify the user and reset the password. When the system was
installed, GM saw problems spike in Portugal and Brazil. One caller complained
I did everything the system told me to until I came to the validation questions
about my goat. I dont have a goat. Obviously there was a translation error in the
system, but it takes time and resources to spot the problems and fx them. The pro-
cess is complicated because GM has 2,481 applications that require authentication
(Babcock 2007).
In 2009, GM tried an experiment by auctioning a new car on eBay. The site
allowed California buyers to place online bids for cars from 225 of the 250 deal-
ers in California. A J.D. Power & Associates study had noted that 70 percent of
buyers use the Internet for research before buying a car. The initial auction was
successful, but most dealers already use the Internet and even eBay for sales
particularly for used cars (Barris 2009).
Near the end of 2009, Terry Kline became the CIO of General Motors when
Ralph Szygenda retired. One of Klines frst goals was to upgrade desktops to
Windows 7 (from XP), to make the systems easier and cheaper to manage. He
was also exploring options to use cloud computing to reduce management costs
of running new servers. But, he expressed concerns about the pricing models
(Thibodeau 2009).
IT played some interesting roles in the development of electric vehiclessuch
as the Chevy Volt for GM. Because EVs are such a big shift for consumers and
manufacturers, new design issues arise that do not have years of data or prior
solutions. GMs approach was to build multiple sensors into all of the early test
vehicles. As employees drove the vehicles, the data was collected and reported to
the designers. IT built new tools to retrieve and analyze the data. The designers
used the data to evaluate tradeoffs and make decisions on the batteries, motors,
and user interfaces (Brandon 2011). IT was also heavily involved in designing
tools for monitoring battery and charging levels. Most EVs have the ability to re-
port various status items to users through Web sites and smartphone applications.
Questions
1. How does GMs decentralized structure affect the implementation and use of
ERP systems?
2. How does an integrated production and design system help GM design new
cars?
3. Why is an integrated production system so important for building custom
vehicles?
422 Chapter 6: Transactions and ERP
4. Will GM eventually be able to build a higher percentage of custom-ordered
cars?
Additional Reading
Babcock, Charles GM, Boeing Faced Uphill Battle To Reach Global Identity
Management, Information Week, June 28, 2007.
Barris, Mike, GM, eBay to Test Online Car Sales, The Wall Street Journal,
August 11, 2009.
Brandon, John, Car Tech: Electric Vehicles Get an IT Assist, Computerworld,
April 12, 2011.
Grossman, David S., Putting Technology on the Road, Research Technology
Management, March/April 2004.
McMillan, Robert, GM CTO Sees More Code on Future Cars, Computerworld,
October 20, 2004.
Plunkett Research, U.S. Automakers Suffer Declining Market Share/Their
Response is to Restructure and Seek Greater Effciency including Cutting
Costs, http://www.plunkettresearch.com/automobile/automobile_trends.
htm#1, 2004.
Precision Marketing, GM Daewoo UK Leads Drive to First pan-Euro
Database, March 26, 2004.
Sullivan, Brian, GMs Tony Scott On High-Tech Driving, Wireless Cars And
Software Crashes, Computerworld, May 8, 2003.
Taylor III, Alex, GM Gets Its Act Together. Finally, Fortune, March 21, 2004.
Teresko, John, The PLM Revolution, Industry Week, February 2004.
Thibodeau, Patrick, GM Turns to IT to Fix Parts Supply Chain,
Computerworld, March 22, 2006.
Thibodeau, Patrick, GM Aims for Global IP System with New AT&T Deal,
Computerworld, February 21, 2007.
Thibodeau, Patrick, Hard Times Arent Slowing GMs New CIO,
Computerworld, November 16, 2009.
Weier, Mary Hayes, Nissan Plant Embraces RFID, Information Week,
November 27, 2006.
Zarley, Craig, Ralph Szygenda, CRN, December 15, 2003.
Case: Chrysler-Fiat
In 1999, when former Chrysler CEO Bob Eaton introduced the redesigned Jeep
Grand Cherokee, he held up a bag that he claimed contained all of the parts that
were carried over from the earlier design. He seemed proud of this huge design
change. But the costs had to be enormous. Toyota saves billions of dollars by reus-
ing as many components as possible. Reuse also leads to more fexible production
and design, enabling Toyota to produce new vehicles in a few months instead of
423 Chapter 6: Transactions and ERP
years (Taylor 2004). In 2007, Daimler spun-off the Chrysler Group by selling it
to a private equity frm Cerberus. Daimler owned Chrysler for slightly under 10
years, and fnally had to abandon it to restore proftability. In March, 1998 Daim-
ler paid $36 billion for Chrysler and technically sold it for $7.4 billion, but the
Wall Street Journal calculated that it would actually cost Daimler $650 million
in cash to dump Chrysler. In the 2008 recession and liquidity crisis, Chrysler sur-
vived only through funding by the federal government. Eventually, the bulk of the
company was sold to Fiat. The goal was to use Chrysler automotive technology
(largely engines) to build larger cars in Europe and use Fiats knowledge and pro-
duction to build smaller cars for sale in the United States.
Technology in Manufacturing
In 2004, DaimlerChrysler had 104 manufacturing plants in 37 countries. Commu-
nication among the 362,000 employees was challenging across those distances.
The company used videoconferencing and held more than 100 meetings a day
with the technology, saving it as much as $14 million a year in travel expenses.
The engineering teams used Web portals to share work and check on business in-
formation (Niccolai 2004).
In 1998, after the merger of Daimler and Chrylser, Susan Unger was named
CIO and head of global IT operations of the new company. In the middle of the
dot-com hype, she noted that she had a different message, which was that in the
e-world, you have to have business value. It was kind of funny at the time be-
cause I was a voice in the wilderness talking that way. Because of this focus, the
company worked on B2B initiatives. Unger notes that many other companies have
had to write off their Internet projects, but we have had none because we were
kind of religious about ROI (return on investment (Gibson 2004).
One of the big tools that DaimlerChrysler implemented was DELMIA from
Dassault Systemes AG. Unger points out that as the engineer designs a vehicle,
they can use the tool to create a virtual manufacturing environmentincluding
your work cells, your line, your equipmentand simulate your workers installing
a wiring harness or whatever else. The multiple divisions (Daimler, Chrysler, and
Mitsubishi) all use an e-engineering portal to share CAD information.
DaimlerChrysler was also a big user of the Covisint automotive auction sys-
tem. Sue Unger noted that in 2003, the company used the system for almost 200
separate bids, saving it between 15 and 20 percent compared to traditional prices.
More important, the system simplifed the purchase process, reducing the time
from months to days (Gibson 2004).
Auto Sales and the Internet
In the middle of the dot-com boom, some people were forecasting that all car
sales would be made online within 6 to 10 years. Today, most sales are still made
in personpartly because people want to see, touch, and drive the cars. Yet Sue
Unger reports that 90 percent of buyers use the Internet for research before shop-
ping (Gibson 2004).
Although DaimlerChrysler used incentives to try and gain market share for its
primary models, Mitsubishi Motors was being hammered in the market. Their
sales approach in 2002 did not helpwhen the company targeted frst-time young
buyers with a zero-zero-zero campaign. Essentially, even poorly qualifed buy-
ers could get new cars with nothing down and no payments for one year. Unfor-
tunately, most of the cars had to be repossessed at the end of the year. In 2004,
424 Chapter 6: Transactions and ERP
Mitsubishi tried to recapture market share through marketing. This time with a
new twista return to Internet advertising. In 2001, the company abandoned Web
ads as nonproductive. In 2004, the company is spending $6 million on the Web
alone. DaimlerChrysler increased its Web spending by 30 percent in 2003 (Man-
galindan 2004). Although the Mitsubishi campaign represents only 5 percent of its
total advertising, the company believes the Web ads are more effective than other
approaches. The key: targeted ads and quick ties to dealers. Tom Buczkowski of
Silver Creek, New York, is one who responded to the new approach. Research-
ing SUVs at the Autobytel site, he was presented with an ad from Mitsubishi. By
signing up for a test drive, he won a $15 gas card. At the Mitsubishi site, he built
a customized Outlander. The details and the personal data he entered were sent to
the nearest dealer in minutes. The next day, the dealer called him and suggested
a test drive. Mr. Buczkowski was impressed with the response If you get a re-
sponse from somebody a day after the request, thats something you dont fnd too
often anywhere else. He eventually bought a Mitsubishi.
Given the size of auto manufacturers and the number of dealers, providing com-
munications with the dealers was a critical aspect to selling cars. DaimlerChrysler
included 5,300 U.S. dealerships and another 1,500 worldwide. The manufactur-
er provided 240 applications to the dealers ranging from support and training to
sales. Prior to 2003, most applications were standalone programs running with
little or no control on dealer servers. Richard E. Earle, CIO at the Chrysler Group,
led a group to replace all of the applications with Web applications running on a
central server and accessible through Web browsers. With 300 to 500 internal de-
velopers working on the project, the DealerConnect system was built in a couple
of years. Serving 300,000 users in 10 languages, it servers 8 million pages a day
(Ulfelder 2005).
After the buyout by Fiat, Chrysler provided little fnancial and production in-
formation. The company focused on selling existing models until new, smaller
cars could be designed by the Fiat team. In 2008, Chrysler IT did move more of its
IT operations offshore to be handled by the Tata Consultancy Services (Thibodeau
2008).
In 2008, Chrysler tested an offer of a Wi-Fi hot spot as an option in its ve-
hicles. The system would provide Wi-Fi connections within the car and use cel-
lular phone service to connect to the Internet. At a base price of almost $500 plus
$29 a month for service, it is not clear how many customers would purchase the
option. Within a year, many smartphones began providing similar servicesand
they would not be tied to the car.
Questions
1. How do integrated design systems solve typical problems that arise?
2. Check out the Web sites by the automobile manufacturers. Why are they so
bad? As a customer, what additional features would you want to see?
Additional Reading
Gibson, Stan, DaimlerChrysler CIO on the Road to IT Success, eWeek, May 3,
2004.
Mangalindan, Mylene, After Wave of Disappointments, The Web Lures Back
Advertisers, The Wall Street Journal, February 25, 2004
425 Chapter 6: Transactions and ERP
Niccolai, James, DaimlerChrysler Sees Savings in RFID Tags, Computerworld,
March 17, 2004.
Taylor III, Alex, Detroit Buffs Up, Fortune, February 9, 2004.
Thibodeau, Patrick, Chrysler Moves More IT Work to Offshore Giant Tata,
Computerworld, February 21, 2008.
Ulfelder, Steve, IT Playbook: Great Works, Computerworld, January 3, 2005.
Case: Toyota
Since the gas crises of the 1970s, Toyota has been gaining U.S. and world market
share on American automobile manufacturers. Toyota had the lead in small-car
design. Over time, the company leveraged this knowledge of consumer preferenc-
es to improve quality. The company was also the frst to adopt lean manufacturing
techniques to reduce costs and formal integrated quality control to take the lead in
quality. Eventually, the company introduced the Lexus division to capture a large
share of the high-end market. By 2007, the company was approaching the num-
ber-two position in sales. With common Japanese kerietsu ties to suppliers, Toyota
pioneered just-in-time inventory deliveries. These inventory- and quality-control
measures require considerable communication with suppliers. Toyota has adopted
computer technology to facilitate communications. Toyota is trying to grow pro-
duction capacity but with an emphasis on fexibility. Using its ties to suppliers and
dealers, the company can increase or decrease production at any plant on short no-
tice. It also tries to standardize vehicle platforms and keep the line fexible enough
so that it can switch each line to a different product depending on the demand
(2006 Annual Report and Duvall 2006). As with other manufacturers, Toyota uses
advanced CAD systems to design new vehicles and parts. With this technology,
Toyota has been able to reduce design time for a new vehicle from four years
down to between one and two years. Toyota also centralizes all of its data. The
CIO and executives have access to all global data when making decisions (Miller
2006). Toyota briefy took over the number two spot in U.S. sales, but its momen-
tum was derailed when the tsunami hit Japan in 2011, causing disruptions in the
supply chains for many components.
Technology in Sales
From 2000 on, the world auto industry had an excess production capacity, leading
to intense competition; particularly in the United States. Online Web sites such as
Edmunds and Vehix also made it easy for customers to search for cars and pric-
es from multiple dealers. Proft margins at dealers fell for several years. To help
maintain overall profts, dealers had to get bigger to increase volume and spread
the overhead costs. Many also carry multiple brands of vehicles. Gulf States Toy-
ota is a distributor for 145 Toyota dealers in fve states. The company processes
more than 190,000 vehicles a year at an 84-acre facility in Houston, TX. The com-
pany faced a problem in 2004 where they either needed to add more buildings or
fnd a way to get vehicles through the facility more effciently. WhereNet Corp
provided an RFID-based vehicle tracking system. New vehicles delivered by rail
car are tagged with an active RFID sensor and the VIN is entered into a database.
The facility has 40 wireless LAN access points and 74 RFID readers. As vehicles
enter and leave the facility, the data is picked up and entered into the database
(Rosencrance 2005).
426 Chapter 6: Transactions and ERP
Toyota USA also needs to communicate with dealers and distributors. An early
communication system developed in the early 1980s was based on IBM AS/400
technology. The system handled parts ordering and warranty claims, but all other
communications needed to be handled by phone or fax. With 1,100 Toyota and
Lexus dealers, Toyota needed a better way to communicate and improve dealer
productivity. The Dealer Daily system was created to handle all common commu-
nications. It is a Web-based system running over a virtual private network (VPN)
that links the dealers to Toyota headquarters. Dealers can order parts, fle warranty
claims, and manage fnancing and insurance for customers. Dealers pay for access
to the system with a monthly fee based on the bandwidth they choose. Dealer Dai-
ly can also deliver critical news and information directly to any user at any dealer-
ship. Toyota is also working on a build-to-order system that will be integrated into
Dealer Daily (Rosencrance 2002).
Led by the Prius, Toyota is one of the leaders in hybrid vehicles. In 2011, the
company began expanding the role and variety of electric and hybrid vehicles
making Prius a separate division. Toyota also struck a deal with Salesforce.com
to create a private social network for owners of its hybrid and electric vehicles.
The Toyota Friend network will enable customers to share data with Toyota and
other owners. It will provide notices for maintenance schedules and other issues.
It will also allow customers to share driving and maintenance tips with each oth-
ersomething that is commonly done now through a variety of public Web sites
(Jennings 2011).
Toyota faced a couple of public image problems when it had to recall millions
of vehicles in 2010. For many years, Toyota was perceived as a quality leader,
and recalls and negative press affect that image. To take the next step at maintain-
ing high quality, Toyota developed a business intelligence (BI) tool to monitor
six years worth of product quality data pulled from internal systems. The sys-
tem consolidates and standardizes the data, enabling engineers to compare and
flter data on confgurations, customer call centers, warranty claims, and service
centers. Tom Trisdale, manager of Toyotas Technical Information & Diagnostics
Group noted that The great thing is, everything is available from one source. We
can have results very quickly (Vijayan 2011). By using off-the-shelf software
from Endeca, the IT department built the system within a few months. Similar to
other BI projects, 45 percent of the time was spent on cleaning and standardizing
the data to ensure consistency.
Questions
1. Why is information technology so important for lean just-in-time production?
2. Why does Toyota use online searches for vehicles in stock instead of building
cars to order?
3. Given the sophistication of Toyotas systems, why have defect rates and
design problems increased?
Additional Reading
Duvall, Mel, Whats Driving Toyota? Baseline, September 5, 2006.
Jennings, Ralph, Toyota Plans Social Network for Electric-Vehicle Buyers,
Computerworld, June 6, 2011.
427 Chapter 6: Transactions and ERP
Miller, Jon, How Toyota Uses Information Technology (IT) for Kaizen, Panta
Rei, June 21, 2006. (http://www.gembapantarei.com/2006/06/how_toyota_
uses_information_technology_it_for_kaizen.html)
Rosencrance, Linda, Dealer Daily: Toyotas Communication Pipeline,
Computerworld, August 12, 2002.
Rosencrance, Linda, Toyota Distributor Turns to WhereNet for Vehicle
Tracking, Computerworld, August 12, 2005.
Vijayan, Jaikumar, Business, IT Collaboration Drives New BI System at
Toyota, Computerworld, May 4, 2011.
Summary Industry Questions
1. What information technologies have helped this industry?
2. Did the technologies provide a competitive advantage or were they quickly
adopted by rivals?
3. Which technologies could this industry use that were developed in other
sectors?
4. Is the level of competition increasing or decreasing in this industry? Is it
dominated by a few frms, or are they fairly balanced?
5. What problems have been created from the use of information technology
and how did the frms solve the problems?
428
What You Will Learn in This Chapter
How do you make money on the Internet?
What types of products are sold online?
How do Web-based services work and why do they change the world?
How can customers pay for products and why do you need new payment mechanisms?
How do frms get revenue from Web ads and how do customers fnd a site?
How do you create an EC Web site?
How do portable Internet connections (mobile phones) provide new ways to sell things?
When do consumers and businesses pay sales taxes on the Internet?
Does the Internet create a global marketplace?
What are the costs for cloud computing?
Chapter Outline
Electronic Business
7
Chapter
Introduction, 429
Selling Products Online, 432
Business to Consumer, 433
Business to Business, 438
The Production Chain and
Disintermediation, 440
Three Stages of a Purchase, 443
Price Competition, 444
Services and Web 2.0, 446
Social Networking and Consumer
Services, 446
Digital Products, 448
Business Services, 449
Network Services, 451
Search Engines, 454
Payment Mechanisms and Risk Mitigation
in e-Commerce, 454
Payment Risks, 455
Payment Mechanisms, 456
Advertising, 460
Traditional Media and Name
Recognition, 461
Web Advertisements, 461
Privacy, 466
Developing and Hosting Web Sites, 467
Simple Static HTML, 468
Web Auctions, 470
Amazon WebStore, 471
Auction versus WebStore, 472
Web Commerce Servers, 472
Content Management Systems, 473
Application Service Providers, 474
Web Hosting Summary, 474
Mobile Commerce, 476
Taxes, 477
Global Economy, 478
Cloud Computing, 479
Summary, 480
Key Words, 481
Web Site References, 481
Review Questions, 482
Exercises, 482
Additional Reading, 484
Cases: Retail Sales, 485
429 Chapter 7: Electronic Business
Wal-Mart
Introduction
How do you make money on the Internet? In the late 1990s, the early
days of the Web when millions of people frst went online, thousands of com-
panies were created to sell items on the Internet. Billions of investment dollars
were spent by these frms developing new ways to conduct business on the Inter-
net. Some managers loudly proclaimed the dawn of the new economy and the
death of bricks-and-mortar companies. Most of these early frms focused on
selling products to consumerssimilar to existing mail order companies. In 2000
and 2001, hundreds of these frms crashed. Some managers then proclaimed the
Internet dead. Yet, from the beginnings in the mid-1990s, sales using the Inter-
net have increasedeven faster than retail sales in general. The initial irrational
exuberance (then-chairman of the Federal Reserve Alan Greenspans term) and
consequent crash, highlight the importance of carefully addressing the question:
exactly how can you use electronic business to make money? Wrong answers can
be costly on both sides: wasting money on hopeless schemes or losing money by
not using the Internet.
In the mid-2000s, attention and investment dollars returned to the Internet. This
time focusing on frms specializing in new services, dubbed Web 2.0. Firms like
YouTube, Flickr, Shutterfy, and social networking sites FaceBook and Twitter led
the way by attracting millions of members. Following the frst-round Web sites,
many of these frms received millions of dollars from investors and many provide
free access to consumersrelying on advertising to provide a revenue stream.
There is no hard-and-fast defnition of Web 2.0 frms, but the general distinction
is that they provide specifc services to consumers. Instead of providing products
or information the sites generally provide a framework for interaction, and users
provide content.
How do retail stores handle transactions? Wal-Mart has grown to become not just the
largest retailer but the largest company in the world. Each store is huge and sells hun-
dreds of thousands of items a day. Each sale has to be recorded with absolutely no
errors. Moreover, the store has to monitor sales and choose which products to order.
Then it must monitor the progress of incoming items, compare the received items to
each order, and resolve problems and errors. Wal-Mart has succeeded because it uses
information technology to handle these operations at the lowest possible cost.
A retailer that focuses on low prices can never rest. It must continually search
for new ways to reduce costs, improve store management, and choose the correct
products to sell at the best price. Being the biggest provides several advantagesno-
tably in terms of negotiations with suppliers. For these reasons, Wal-Mart is one of
the companies leading the transition to radio frequency identifcation (RFID) chips.
Initially, Wal-Mart is asking major suppliers to place the passive tags on pallets and
major crates. The primary advantage is that the receiving docks can quickly scan in-
coming shipments and match the products to the individual orders. RFID tags carry
more information and are easier to read than traditional bar codes.
430 Chapter 7: Electronic Business
What is electronic business? E-commerce, or EC, can be hard to defne. On
the one hand, it could be defned as selling items on the Internet. But Figure 7.1
shows there are many aspects to business and many ways of using Internet tech-
nologies. Some writers refer to the broader concept as e-business. The main point
is that EC represents considerably more functions than just putting up a Web site
to describe or sell products. The fundamental goal of e-business is to increase
sales and reduce costs by improving relationships with existing customers, and by
reaching new customers and providing new services.
For at least the past 50 years, companies have followed and refned the modern
business practices. These business-to-consumer (B2C) foundations were created
to facilitate purchasing and distribution in a world with limited delivery systems
and high communication costs. For example, retail stores for decades were small
Trends
Largely because of transportation costs, consumers have been limited to
purchasing products through local retail stores. Even for products produced
elsewhere, it was generally cheaper to ship items in bulk to the retailer than
to ship to individual customers. Plus, manufacturers and wholesalers did not
want to deal with individual customers. They did not want to spend the mon-
ey to create customer-service departments to handle thousands or millions of
individual orders, returns, and complaints.
Eventually, shipping and transaction costs began to decline. Sears got its
start and made its original reputation as a nationwide mail-order frm. Cus-
tomers could now order thousands of products from a catalog and have them
delivered. Over time, Sears found it proftable to build stores in thousands
of cities and moved away from catalog sales. In the 1980s and 1990s, many
other mail-order frms expanded to provide thousands of products direct
from the manufacturer to the customer. While some people prefer shopping
this way, only a fraction of total sales are made through mail-order compa-
nies. In 1998, mail-order sales were $356 billion, or slightly over 3 percent
of GDP.
Around 1997, sales over the Internet started to become important, and by
1999, e-commerce was the hot topic in the nation. By 2001, over 50 percent
of U.S. households had access to the Internet and e-commerce, promising
access to millions of customers. Hundreds of dot-com frms were funded
with venture capital and early IPOs to defne new ways to interact with cus-
tomers and businesses over the Internet. Hundreds of paper billionaires were
created as stock prices were driven by expectations and hype. Some people
were saying that bricks-and-mortar traditional frms were dead. But in late
2000 and early 2001, hundreds of the dot-com start-ups failed, laying off
thousands of workers and crashing the technology sector of the stock mar-
ket. Investors are wary, but the Internet continues.
Cell phones began with slow, poor quality analog signals that were gradu-
ally replaced with the second generation digital phones by 2000. The third
generation wireless phone will handle data and Internet access as well as
voice. Portable data access can create new opportunities in mobile com-
merce to improve contact with customers. Entirely new applications can
evolve from virtually immediate contact.
431 Chapter 7: Electronic Business
local frms where owners recognized customer trends and ordered a specifc mix
of products. As manufacturing, transportation, and communication costs changed,
some frms were early adopters and began to change retailing. For instance, Wal-
Mart took advantage of size in purchasing and distribution to create giant retail
stores with a relatively standard mix of products. The Internet provides even more
possibilities for change. At a minimum, the Internet makes more information easi-
ly accessible to everyone. Now consumer can instantly search for products, obtain
reviews, compare prices, and even get feedback from friends. Mobile phones
particularly those with bar-code reader applicationsmake these features instant-
ly available, even while shopping in traditional stores. The accessibility of this in-
formation changes the relationships between consumers and sellers, which should
eventually create changes in the way businesses operate.
On the business side, just-in-time inventory and EDI were only the beginning
of a revolution in changing the ordering systems of manufacturers. Electronic
marketplaces and auctions enable businesses to fnd new suppliers and obtain sup-
plies on short notice. Sellers can fnd new customers and negotiate prices without
expensive sales visits.
You should remember one important point: EC is not just an issue with new
frms. In many ways, existing frms have the most to gain from EC, because they
can leverage their existing strengths. Business to business (B2B) is also critical
Figure 7.1
Electronic commerce. The Internet is commonly used for sales from business-
to-consumer and business-to-business. Salespeople can use it to collect data and
communicate with clients and the main offces. New Web-based businesses are being
created to provide data and services.
Large business
Small business/
supplier
Customer
Salesperson
The Internet
Orders, Auctions,
and EDI
Sales and
CRM
Service, orders,
and information
Web hosting and
Web-based services
Consumers
432 Chapter 7: Electronic Business
for existing frms because it can reduce costs and provide new options to man-
aging purchases. Finally, the interactive aspects of EC will become increasingly
useful for intranets to improve internal operations and facilitate human resources
management.
Figure 7.2 shows a broader classifcation of e-commerce that includes B2B and
B2C as well as consumer-led initiatives. The consumer issues C2B and C2C make
up a minor portion of e-commerce. It is not even clear that good examples of
these categories exist. Auctions sites, led by eBay, and social networking sites, are
probably the best examples of C2C sites. Yet, the bulk of sales on eBay actually
originate from small businesses, and consumers do not receive any of the rev-
enue on social networking sites. It is even more diffcult to fnd examples of C2B
sites. Probably the best examples are contract employee sites such as vworker.
com. Businesses (or sometimes individuals) post jobs online and potential work-
ers submit a price to perform the specifed task. Similarly, the job search sites
might loosely be considered as C2B.
Eventually, the entire world changes when commerce systems change. But will
the economy really change that far? Did the mass failure of the EC frms in 2000
and 2001 really mean that consumers prefer the traditional systems? These are the
questions that make life fun and add the risk to entrepreneurship. You must under-
stand the fundamentals before you can create your own answers to these puzzles
and help shape the future of business.
Selling Products Online
What types of products are sold online? Selling products online is a
natural extension of the catalog sales that existed years before the Internet was
created. However, Web-based businesses can provide more pictures and descrip-
tions. Customers can search for products and sizes. It is easier to update the data
to provide new products. It is also easy to change prices or to tailor prices for
different groups of customers. These factors alone would probably be enough to
encourage more people to purchase goods online, but would not likely result in
a huge gain in sales. Yet, as Figure 7.3 shows, U.S. Web sales increased by an
average growth rate of over 22 percent from 2000 through 2010, according to
Figure 7.2
E-commerce categories. E-commerce can be considered in the four categories shown.
However, B2B and B2C are far more prevalent than consumer-led initiatives.
Business Consumer
Business B2B
EDI
Commodity auctions
B2C
Consumer-oriented
Sales
Support
Consumer C2B
Minimal examples,
possible contract employee
sitessuchasrentacoder.
com
C2C
auction sites (eBay),
but many of these are
dominated by small
business sales
433 Chapter 7: Electronic Business
US Census Bureau data. In the fourth quarter of 2010, Internet sales comprised 5
percent of the total retail sales. Not enough to proclaim the demise of bricks and
mortar stores, but a higher growth rate than expected from simply replacing mail
order sales. Note that the Census data does not include travel, fnancial services,
or B2B sales. One possible reason for the high growth rate might be the ability of
the Web to help customers fnd products and compare prices from multiple ven-
dors. Or, perhaps people simply want to purchase items from the comfort of their
homes. However, even if the high growth rate continues, it would take at least 25
years for EC sales to catch up to retail sales. And, some products and services are
unlikely to ever be purchased online. On the other hand, the Internet is heavily
used for research even if the product is not purchased online (consider housing
and automobiles).
To put the EC sales numbers in perspective, it is useful to consider one other
piece of data. In the fourth quarter of 2010, Amazon reported sales of $12.95 bil-
lion in their annual report. Compared to the total EC sales for that quarter of $52.6
billion, Amazon alone had almost 25 percent of the online sales! Some of Ama-
zons sales revenue comes from services, but the percentage is relatively low. This
large share partially exists because EC sales are still relatively new, and partially
because Amazon handles retail sales for many other companies.
Business to Consumer
When asked about e-commerce, most people think of B2C. Everyone is a con-
sumer, and it is easy to think about purchasing products and services over the In-
ternet. But how is e-commerce different from traditional sales methods? And are
there some products that people will not buy online?
Figure 7.3
U.S. e-commerce retail sales. Census Bureau data show a 26 percent average annual
increase. Sales for 2006-Q4 were 3.4 percent of total retail sales. Fourth quarter sales
average about 31 percent of annual sales for e-commerce, compared to about 26
percent for total retail sales.
0
10
20
30
40
50
60
B
i
l
l
i
o
n
$
U.S. E-Commerce Sales
434 Chapter 7: Electronic Business
A couple of simple rules dominate marketing. First, consumers prefer instant
gratifcation. Given a choice, with everything else equal, consumers will choose
the product at hand over one that will be delivered later. Related to this rule, con-
sumers will often buy items on impulsesimply because they are available and
enticing. Second, consumers will prefer to pay a lower total price. While this rule
seems obvious, it can be diffcult in practice. Consumers need to know that the
products being compared are equal. They need to know what other products or
suppliers exist and their prices. And they need to be able to compare total prices
(including taxes and transportation). Third, consumers prefer to see and touch
many products before they buy them. The real challenge in marketing is analyzing
the trade-offs when all conditions are not equal.
Food, Clothing, Housing, and Transportation
In many ways, traditional products are the least likely to be successful in e-com-
merceat least initially. Consider the four basic items on which people spend
most of their income: food, clothing, shelter, and transportation. Distribution is
the most critical issue with food. In the 1960s, when people lived closer together
in central cities and small towns, neighborhood grocery stores provided basic food
items within a short distance of many people. Yet these stores were ineffcient be-
cause they could stock only a limited number of common items; and the delivery
and inventory costs were high. Ultimately, large grocery chains that used their
size to hold down costs, provide a large selection, and negotiate favorable terms
with suppliers replaced the local stores. Consumers had to travel farther to these
new stores, but they were willing to accept the distance to reduce costs. Small
local stores were driven out. The two initial leading frms to sell groceries over
the Internet were Peapod and Webvan. Customers placed orders on the Web site
and drivers dropped off the purchases at a scheduled time, usually the next day.
Customers paid a delivery charge for the service. Neither company was very suc-
cessful in terms of profts. The increased costs, delivery time, and lack of ability to
touch the items discouraged customers.
Reality Bytes: Amazon Expenses
In November-December 2009, U.S. e-commerce retail sales not including travel hit
a record $32.6 billion, or an increase of 12 percent from 2008. For the fourth quarter
of 2010 (October-December) Amazons revenue was $12.95 billion, for an increase
of 36 percent. Think about those numbers for a second. Even assuming the U.S. sales
for October were similar to the November and December values, Amazon captured
over 25 percent of the U.S. online sales (not counting travel). To support its continu-
ing expansion, Amazon added 13 distribution centers in 2009, giving it a total of
52 sites. These costs have impacted Amazons proft, and the companys profts in-
creased only 8 percent compared to the 36 percent increase in revenue. Some of the
growth is fueled by digital products such as e-books, which now account for more
sales than print books at Amazon. In other cases, simple convenience and searches
encourage customers to shop online. Meaghan Keane, a Fairfeld, CT nursing student
noted that she did all of her holiday shopping online because I was able to fnd all
these different items that I wouldnt have even known where to look for in stores.
Adapted from Stu Woo, Expenses Eat at Amazons Proft, The Wall Street Journal,
January 28, 2011.
435 Chapter 7: Electronic Business
A second way to look at EC and food is to realize that few families cook their
own meals. Takeout from a variety of restaurants and even grocery stores is a pop-
ular substitute. Many restaurantsparticularly pizzeriasdeliver food on short
notice with just a phone call. Would there be a reason to convert the phone sys-
tem to an Internet connection? A few places do this, but many people still prefer
phones. Theoretically, the Internet can provide menus and it is better at handling
multiple customers at the same time. Furthermore, it could be used to provide
feedback to the consumerin terms of status of the order and when it will be de-
livered. But most restaurants are small businesses, and they have resisted building
the infrastructure to provide these features.
Clothing offers more prospects for e-commerce. Selection is always an issue
with local stores. No matter how large the store, it can carry only a small, targeted
selection of styles and sizes. And larger selection means greater inventory costs.
So, there is room for an EC frm to sell a wide selection of products across the na-
tion. In fact, several catalog mail-order frms concentrate on these markets. These
Reality Bytes: JCPenneys Gets Caught on the Dark Side
Search engine optimization (SEO) has become a popular topic among online ven-
dors. The goal is to obtain as high a ranking as possible on Google and other search
engines. If a site ranking closely matches a search term, it will be displayed at the
top of the page automatically; without paying any money to Google. Some people
spend a huge amount of time trying to determine how the search engines work. A
few people spend huge amounts of time trying to fgure out how to game the system
and obtain a high ranking for their pages. But, trying to deceive the search engines is
always a bad idea. Google succeeds only by returning accurate matches and decep-
tion can result in punishment. JCPenneys, an American department store, found out
the hard way in 2010/2011. For several months in 2010, JCPenneys was at the top
of the result lists for many products and even manufacturers. Apparently, the retailer
tried every trick in the book to get its site listed frst for hundreds of itemsusing
methods that crossed the line to the dark side of SEO. Doug Pierce, an expert in
searches, examined some of the companys practices and noted that Actually, its
the most ambitious attempt Ive ever heard of. This whole thing just blew me away.
Especially for such a major brand. Youd think they would have people around them
that would know better. Eventually, Google altered its algorithms and also punished
JCPenneys by forcing all of its entries to be buried several pages deep in the results.
JCPenneys fred its SEO consultant. Google uses on links from other Web sites to
help determine the content and importance of a site. Open Site Explorer helps iden-
tify when sites contain links to any given page. JCPenneys was paying people to
post links to its pages. Googles terms of service allow it to punish any company it
feels is not playing fairly. JCPenney also spent money on Google adsas much as
$2.4 million a month. In 2006, Google penalized BMW for using a black-hat SEO
strategy and basically removed the company from its search results. Overstock.com
was similarly punished with a two-month downgrade in 2011 when Google found
that Overstock was paying students to put links on their Web sites.
Adapted from David Segal, The Dirty Little Secrets of Search, The New York
Times, February 12, 2011; and Julianne Pepitone, Why Google Threw Overstock in
the Penalty Box, CNN Online, April 25, 2011.
436 Chapter 7: Electronic Business
mail-order companies have also been relatively successful at e-commerce. The
one problem is that clothing sizes are not quite standardized. Hence, many shop-
persparticularly womenprefer to try on clothing before purchasing it. Some
leading sites like Lands End have implemented electronic virtual models that en-
able customers to select items and see how they might look. But many people
prefer touching the individual garments frst. Still, the ability to search for styles
and sizes makes the Web a useful tool. And many consumers learn to trust certain
brand names, so they search the Web for those specifc brands.
Finding a home is always a diffcult task. A medium-size city might have thou-
sands of homes for sale at one point in time. It is hard to fnd and compare all of
the details. The Internet has helped in some respects. Searching is an important
strength of the Internet. Several real estate databases exist online to retrieve house
listings based on a variety of items. However, almost no one would buy a house
without seeing it in person; so the role of the Internet is limited. At frst glance, it
would seem that real estate might be a prime opportunity for e-commerce. Real
estate commissions are often priced at 6 percent of the sale price, which can be a
high value for expensive houses. So there should be strong incentives for remov-
ing the commissioned agent from the middle of the transaction. But buyers often
prefer to use agents. Real estate agencies control most of the housing market data
and they have resisted moving to an online worldparticularly one that might
result in a reduction in the commission rates. However, the Zillow.com site offers
several interesting features that might enable it to encroach on the traditional retail
listings.
Reality Bytes: Nestle v. Red Cross Tweets
Corporate marketing started to fall onto the social networking bandwagon by 2010.
The adoption of Twitter made it temptingly easy to create a social image. Companies
hired individuals and marketing frms to spread the news about the companies online.
But, image is something that can be feeting or at least easily affected by even simple
mistakes. In 2010, Greenpeace convinced people to food Nestles Facebook page.
Greenpeace objected to Nestles use of palm oil which allegedly impacts habitat for
orangutans. The organization encouraged supporters to food Nestles Facebook page
and use profle pictures of altered Nestle logos. The person running the Nestle page
responded by posting statements about taking down the negative comments. The re-
sponse angered thousands of more people and the foods escalated. Eventually, the
Nestle representative offered an apology, but the incident did not help the companys
image. In contrast, someone @RedCross posted an accidental tweet Ryan found
two more 4 bottle packs of Dogfsh Heads Midas Touch beerwhen we drink we
do it right #gettngslizzerd. An offcial response came quickly from @RedCross
with the tweet Weve deleted the rogue tweet but rest assured the Red Cross is sober
and weve confscated the keys. Dog Fish beer fans latched onto the #gettngslizzerd
hashtag, and breweries and pubs in many states launched beer-for-blood offers, in-
creasing awareness and donations to the Red Cross. Other examples of good and bad
responses exist, and new ones are likely to arise. Few rules exist in social networks,
and tastes change. But, building a loyal following and using light humor are gener-
ally good ideasparticularly when something goes wrong.
Adapted from Julianna Pepitone, 6 Painful Social Media Screwups, CNN Online,
April 7, 2011.
437 Chapter 7: Electronic Business
Transportation is more interesting because it can be a product (automobile) or
a service (airplane or subway ticket). Airlines have done well with direct e-com-
merce sales. Yes, they have offended the traditional distribution channel (travel
agents), but the people who travel the most have been willing to purchase tickets
directly to save money and gain control over their choices. Today, almost all air-
line tickets are sold online.
Automobiles are more interesting. Few people are willing to buy new automo-
biles over the Internet, but Web sites offering searches for specifc used cars are
popular. Part of the difference is that consumers have greater bargaining power
with used automobiles than with new ones, so the increased information on avail-
able cars gives them more leverage. If one owner or dealer offers a high price for
a specifc car, you can quickly fnd another one. New cars are more challenging
because of the strong relationship between the few manufacturers and the dealers.
Most people want to test-drive a car before they buy it, so the manufacturers
have a strong incentive to keep the dealer network. Many insiders also believe that
the salesperson is critical to selling cars, by overcoming objections and talking
people into buying cars when they hesitate. So, if dealers and showrooms are nec-
essary, what is the value of e-commerce in selling a car? Both General Motors and
Ford have experimented with online sales of new cars, with minimal success. Cur-
rently, the auto manufacturers prefer to sell through the dealers. A few states actu-
ally have laws that prohibit auto manufacturers from selling directly to the public.
While the manufacturers want to keep the advantages of the dealers, they also
want to fnd a more effcient method to distribute cars. Manufacturers have talked
about an Internet-based build-to-order system, where customers could select op-
tions and cars would be made to order. A few larger regional dealers would main-
tain basic inventory to support test-drives. The advantage of this system would be
to reduce inventories and enable manufacturers to build only the number of cars
that are needed. The main drawback is the diffculty in confguring assembly lines
quickly enough to hold costs down.
Reality Bytes: Even the Best Fall Down Sometimes
As an early adopter and leading e-commerce company, Amazon runs one of the most
sophisticated cloud-hosting services on the Internet. Several big-name Web-based
companies rely on Amazons servers to run their operations. On April 21, 2011, Am-
azon suffered a collapse of its internal network in its East Coast facilities. The dis-
ruption knocked out or slowed service to Internet service frms such as Foursquare,
Reddit, and Quora. Despite early optimism, it took Amazon engineers several days to
fully restore service. Amazon posted a detailed explanation of the problem after the
site was restored. Interestingly, the problem arose partly because of the redundancy
built into the EC2 facilities. A misconfgured router shifted traffc to a slow internal
network and datasets were unable to connect to their replica backups. Even when the
router confguration was fxed, essentially every dataset tried to re-establish a new
backup copyfooding the data controllers. With this knowledge, Amazon began
rebuilding its systems to prevent similar problems.
Adapted from Shara Tibken, Amazon Cloud Snafu Disrupts Websites, The Wall
Street Journal, April 21, 2011 and http://aws.amazon.com/message/65648/.
438 Chapter 7: Electronic Business
On the other hand, used cars present a different situation. Buyers have em-
braced the Internet as a method to locate used cars and compare prices. Sellers
fnd it a useful tool to avoid the high prices of newspaper advertisingparticu-
larly since it is inexpensive to place photos on Web sites.
The point of these examples is that without substantial changes in behavior,
people will continue to prefer the traditional sales mechanisms. Particularly since
these mechanisms have proven to be relatively effcientor closely controlled by
a group with a strong interest in maintaining the current system.
Product Characteristics for Online Sales
So, is the world really so bleak that B2C e-commerce is doomed to fail? What
about Amazon.com, one of the larger retailers on the Internet? By selling com-
modities, they avoid the problem of choosing products. The latest best-selling
novel is the same regardless of where it is purchased, so consumers do not need
to see and touch it before purchasing it. Besides, Amazon.com can offer a wide
selection of titles. It can also make it easier to fnd books and does a good job of-
fering related products that might interest the consumer. But the concept is still
hobbled by the distribution problemit takes time to deliver a book or CD to
the customer. So, online vendors like Amazon.com compensate by offering larg-
er selections than those found at a traditional local store. Amazon also discounts
some items to encourage people to accept the delivery delay. But, to achieve prof-
its, around 2003, Amazon began charging list price for mass-market paperback
bookswhich represent a substantial percentage of most book sales. Amazon has
also been one of the leaders in the switch to digital bookslargely by offering
their own e-book reader (Kindle) at declining prices.
To fnd successful B2C strategies, you need to look at the features that the In-
ternet provides that are superior to traditional stores. The most important ones are
the: (1) search technologies, (2) ability to quickly compare multiple products and
vendors, (3) low costs for large amounts of information, (4) ability to reach a wide
audience, and (5) ability to tailor responses to individual customers.
The essence of a proftable Web site for products is to identify items that can
beneft most from these features. For example, specialty products can be hard to
fnd. A few frms could reach a national audience using EC and capture most of the
market by being easy to fnd and offering competitive prices. Another approach is
to offer products with many options that require customization. Dell has been suc-
cessful at selling computers over the Internet by making it easy to confgure and
compare prices and by using modern production technologies to hold costs down
so that the EC solution highlights their prices.
Look at the EC sales data one more time and realize that almost one-third of the
sales take place in the fourth-quarter, year-end, holiday shopping season. People
are searching for specifc items. They might want unique items, or they might
search based on availability or the lowest price. Of course, the types of items that
ft these categories are also items that are likely to be purchased online during the
rest of the year.
Business to Business
Business-to-business e-commerce has the potential to be more important than
B2C e-commerce. First, businesses tend to buy repeat items in bulk, so they do
not need to test-drive or touch every product. Second, medium and large busi-
nesses already have high-speed connections to the Internet and rely on computer
439 Chapter 7: Electronic Business
systems in their daily operations. Third, costs are becoming a driving factor, and
technology can reduce the transaction costs and the number of errors.
Extended EDI
By simply offering the ability to sell products to other businesses, the Internet can
be used for EDI. For materials and components that are purchased on a regular ba-
sis, EDI software can connect across the Internet to automatically monitor inven-
tory and send orders to the appropriate company. For less frequent purchases, a
buying frm could set up software to scan servers for prices, select the appropriate
items, and place orders automatically.
Currently, few systems work this effciently. Most require a human to collect
data and place orders. Web sites make it easier to collect data on prices and avail-
ability, but every site has different search methods and different purchase screens.
EDI software helps by following standards, but the companies involved must in-
stall and confgure it. XML is a more fexible method of sharing data with sup-
pliers and customers. Eventually, the technology can be married with expert sys-
tems to provide more automated intelligence to handle ordering basic items and to
monitor the progress of standard orders.
Some companies, such as Offce Depot, have leveraged the Web to lock-in
business customers. Companies sign up with Offce Depot and employees place
orders for offce supplies directly on the Offce Depot Web site. Offce Depot de-
livers the products on a daily basis and bills the company for all purchases. It is
not exactly EDI, but a simpler method to connect directly to customers. Most ERP
systems provide these capabilities, so almost any business can create Web sites
that enable business customers to order directly.
Auctions
From an economic perspective, B2B auctions are one of the most exciting tools
created through e-commerce. In the past, companies purchased materials and sup-
plies from a complex set of distributors and wholesalers, driven by in-person sales
calls. Within this context, most manufacturers dealt with only one or two suppliers
for each part. To hold down transaction costs, it was simpler to establish long-term
relationships with a limited number of companies. Of course, it made it harder to
ensure that the buyers were getting the best price. Competition helps hold down
prices during the initial contract negotiations, but if anything changes in the en-
suing year or two, it is diffcult to renegotiate the contract. But in exchange, the
buyer gains a more stable environment.
Economic theory shows that well-run auctions are the most effcient way to
establish an effcient market price. To be well run, the auctions have to be open to
the widest range of participants, and everyone must have complete information on
the items and prices. Several industry-specifc auction sites have been established.
One of the more successful sites involves the steel industry. Signifcant amounts
of steel are still sold directly to manufacturers on long-term contracts. However,
the auction sites make it easier for suppliers to unload specialty and overstocked
inventory in a spot market. The auctions also give manufacturers the ability to
monitor the spot market and availability of steel products, so that they can quickly
pick up additional quantity.
For commodity items, auctions can hold down prices by improving competition
and making price and quantity data available to all participants. Auctions are also
useful for specialized products, when it is diffcult to determine an asking price.
440 Chapter 7: Electronic Business
Some companies have found that they can obtain higher prices for their products
when they sell them at auction. Also, auction prices can change easily, so if there
is a short-term jump in demand for your product, you will be able to capture the
additional proft. Of course, you might have to accept lower prices the next day.
Te Production Chain and Disintermediation
What problems might arise from shifting sales to the Internet? To understand the
issues in EC, you must frst understand the production chain. Shown in Figure
7.4, the strategic effects are important to EC. One of the key aspects in B2C e-
commerce is the ability to bypass entire sections of the production chain. Consider
the situation of airlines. In the 1960s and 1970s, airlines created giant reservation
systems to handle fight bookings. The system consisted of the airlines massive
central computers and databases and travel agent terminals connected by a custom
network. It was too expensive for customers to connect directly. Also, the systems
were hard to use and travel agents needed special training. Agents were paid a
commission based on the value of the fights booked through the reservation sys-
tem paid by the airlines. With the advent of frequent-fyer miles, airlines encour-
aged consumers to book fights with the airline itself, bypassing the travel agent
and saving the cost of the commission. But it is diffcult to search for fights using
parts
supplier
parts
supplier
parts
supplier
warehouse warehouse
supplier supplier supplier
tool
manufacturer
Manufacturer
workers
wholesaler
wholesaler
distributor distributor
distributor
retail store
retail store retail store retail store
Consumers
Figure 7.4
Production chain. The production chain is important to EC because EC offers the
ability to skip elements of the chain. It also makes it easier to reach new customers at
any level in the chain.
441 Chapter 7: Electronic Business
the telephone. The Internet changed everything. Several travel sites and the airline
sites themselves make it easy to fnd fights, compare prices, and purchase a ticket
any time of day without the assistance of an overworked travel agent or salesper-
son. Tickets are merely electronic reservation numbers, where you simply show
appropriate identifcation at the airport. On the production chain, the airlines (as
service providers) bypassed the intermediaries to sell directly to the consumera
process known as disintermediation.
As shown in Figure 7.5, for a few years, most of the airline industry
relied on a few companies to provide data and reservation services to
various Web sites. These companies were the same reservation systems
originally created by the airlines, including Sabre created by American
Airlines, and spun off. In 2010, the disintermediation extended further
when American Airlines, in a dispute with the reservation companies
(including Sabre), pulled all of their data from the online systems and
required customers to book online directly with the airline. Southwest
Airline had long followed a similar practiceto avoid the fees paid to
the reservation companies. One effect of this change is that it is more
diffcult for consumers to fnd and compare fight costs. If all airlines
require individuals to connect directly, a search would require check-
ing every airline separately. Eventually, a consolidator might be able
to search and display data from multiple sites, but the airlines will be
reluctant to pay the fees, so the consolidator would have to fnd an-
other way to make money.
Figure 7.5
Airline industry disintermediation. Partly because airlines sell a perishable service,
and partly because of the role of information (reservation), they have led the way in
fnding ways to connect to customers. Web sites initially supplanted travel agents,
but the Web sites were controlled by the original reservation companies. To reduce
fees, airlines (led by Southwest and American) bypassed the reservation systems and
require customers to work directly with the airline.
1960s-1990s
Airline (American)
Reservation
system
(Sabre)
Travel agent
Customer
2000-2010
Web Sites
(Expedia, Orbitz,
Travelocity)
2010-
442 Chapter 7: Electronic Business
A similar process can occur in manufacturing. Instead of wholesalers, purchas-
ing agents and suppliers are forming B2B auction sites. Companies can sell or buy
products and materials on a variety of Web sites. Instead of searching out buyers
or sellers, businesses simply submit a bid on a Web site that covers the desired
product.
Today, it is rare for a company to be vertically integrated across the production
chain. For example, most manufacturers rely on other frms to handle distribution
and retail sales. In a sense, they choose to outsource these functions because of
the costs. Over the last 50 years or so, frms have worked to become more eff-
cient within their niche. As shown in Figure 7.6, e-commerce has the potential to
change these relationships. By reducing the costs of dealing with individual cus-
tomers, it becomes possible for frms to circumvent the retailers and sell directly
to the end consumer. Since retail price markups can be in the range of 100 percent,
the manufacturer has a strong incentive to sell directly to the public to capture
some of this additional proft.
However, particularly in these early days of e-commerce, many manufactur-
ers are reluctant to remove the retail role. Taking sales away from the established
retail channel could alienate the retailers, who are currently responsible for almost
all of the sales. If retailers decide to drop your product, and consumers are slow to
switch to direct purchases, you may lose the market.
Interrelationship with the existing retail distribution channel is a critical factor
in any e-commerce strategy. Removing an intermediary can increase your profts
Manufacturer
Retailer
Consumer
Production Chain
E-commerce
Web site
Figure 7.6
Disintermediation. The traditional production chain evolved because separate frms
provided specialized functions more effciently. E-commerce reduces costs and has
the potential to circumvent various intermediaries. But disintermediation is a risky
strategy.
443 Chapter 7: Electronic Business
and can be used to reduce prices to capture more market share. But is the interme-
diary a critical component? Will your sales remain if you remove it? Are custom-
ers ready to switch to direct purchases? Some frms attempt to do both: keep sales
through traditional channels and also provide direct e-commerce sales through a
Web site. But they minimize competition and appease the retailers by charging the
suggested retail price on the Web site. So, consumers can often fnd the product
cheaper at a local storewhich is willing to offer a discount on the list price.
In some situations, the reliance on the retail channel leads to strange conclu-
sions. In early 2001, Compaq was producing a popular PDA with a color screen.
But Compaq had trouble with production and demand was substantially higher
than supply. Consequently, few retailers carried the product. Some of the busi-
nesses that were able to obtain the product did not bother to sell it at their local
stores. Instead, they auctioned the units individually on eBay for several hundred
dollars over the list price. Would Compaq have been better off auctioning the
PDAs directly to consumers?
Tree Stages of a Purchase
How do you use the Internet to market goods and services? From a marketing
perspective, the buying process has been defned in three basic steps: (1) prepur-
chase information gathering, (2) the purchase itself, and (3) postpurchase support.
Figure 7.7 lists these steps with examples. The Internet can support each of these
areas. The level of support in each area depends on the industry, type of prod-
uct, and capabilities of the customers. Note that the process differs depending on
whether the customer is a retail consumer or another company. For example, sales
to other companies are generally repetitive and typically require additional docu-
mentation and billing procedures.
In many ways, the purchase issue is a minor component. EC purchases cur-
rently offer only minor benefts compared to traditional phone orders. The main
beneft to EC lies in providing additional support to customers before and after
the sale. In particular, intelligent Web sites supported by expert systems can help
customers select options and products or solve problems. For fxed development
costs and relatively low monthly fees, the online systems can provide 24-hour
Prepurchase Purchase Postpurchase
Static data sites
Promotion
Product specifcations
Pictures
Schematics
Pricing
FAQs
Interactive sites
Confguration
Compatibility
Complex pricing
Transmission security
User identifcation
Product selection
Payment validation
Order confrmation
Service
Problem tracking
Sales leads
Resolve problems
Answerquestions
Product evaluation
Modifcations
Tracking customers
Figure 7.7
Electronic commerce. Websites are commonly used to support the three main phases
of marketing.
444 Chapter 7: Electronic Business
support. Sales can be increased by providing more detailed information, helping
customers customize their selections, and using an expert system to build cross
sales. Costs are reduced because the system is automated. Sales and costs can
be further improved by providing after-sale support. Expert-system guided sup-
port can help customers solve problems faster. Any product design or production
problems can be reported directly, giving you the chance to fx the product before
it ships to more people.
Price Competition
A primary concern expressed by many frms investigating e-commerce is the is-
sue of price. The Internet makes it easy for people to search vendors and com-
pare prices. This process is particularly easy for products that are the same (such
as books, videos, and electronic equipment). For example, Google (www.google.
com/products), Bing (click the Shopping tab), and several other sites offer search-
es for products that display prices and availability for a variety of products. As
shown in Figure 7.8, several cell phone apps even provide the ability to snap a
picture of a bar code and look up online prices. Consumers now have easy meth-
ods to obtain more information.
However, merchants are concerned that people will compare sites based only
on price. Availability of the item will also make a difference. Why are merchants
concerned about price competition? First, the existing retail product chain was
originally created so that retail outlets could provide personalized service and
product information to customers. Vendors survived and grew based on their
ability to provide customized information and support to local areas. Competing
purely on price and availability changes the rules and requires a different type of
merchant system. Second, if customers look only at price and availability, it is
easy for a new frm to enter the market. The new frm simply slashes prices and
sells products at a loss to attract customers. Of course, in the long run, the frm
will failbut so will the other frms. Economists can assume that managers and
owners are intelligent and will eventually learn to charge a price that does provide
a proft. But it might take time for this new economy to evolve. This fear of ir-
rational frms does have an element of truth. Amazon gained its market position
primarily by offering substantial discounts on books. In fact, Amazons fnance
Figure 7.8
Barcode search. Most smart phones have barcode scanning apps that use the camera
to capture the barcode, send the number to a Web server, search for the item and
return sites and stores with prices for that item.
http://scan.jsharkey.org/
Web search
Prices and more
445 Chapter 7: Electronic Business
offcer made the remark in 2000 that he was surprised people were criticizing
Amazon for not making a proft. He said that Amazon never intended to make a
proft on sales. However, after the crash in e-commerce stock prices, Amazon has
worked harder to cut costs, and has increased prices on many items to achieve a
proft.
Initially, the largest impact of Internet price competition will be on the retail
frms. By minimizing the aspect of location, the primary strength of local frms is
eroded. If customers are willing to wait for products to be delivered, then there is
no longer a point in having thousands of small local stores. But that if is huge.
The ultimate economy will depend on consumer preferences between price and
the ability to receive a product immediately.
A ruling by the U.S. Supreme Court in 2007 could ultimately affect the degree
of price competition on the Internet. In Leegin Creative Leather Products v.
PSKS Inc., the Court ruled 5-4 that in many cases manufacturers could enforce
minimum retail prices for their products. Although the case did not directly in-
volve the Internet, one of the issues manufacturers face is that customers might go
to local stores to check out products and get advice and service. But the customer
might then turn to the Internet to purchase the product at the lowest possible price.
Effectively, the local store does the work but loses the sale to a store that provides
minimal service. The effect of the controversial ruling remains to be seen, but the
most likely impact is fewer discounts available for customers. Or at least it will
be more diffcult to fnd the discounts.. to obtain more information.ture the
barcode, send teh icesut the airlines will be reluctant to
A few e-commerce frms have attempted to use the interactive features of the
Internet to set prices dynamically. In an experiment, Amazon.com charged dif-
ferent prices to different customers. It appears to have been a relatively standard
attempt to statistically evaluate price sensitivity to various products. However,
when customers learned that others had obtained the same product for a lower
price, they complained. Yet, in traditional stores, customers routinely are charged
different prices for the same itemsfor example, through coupons or negotiation.
As shown in Figure 7.9, part of the fear is that the Internet might someday be used
to force people to pay the highest amount they are willing to pay, as opposed to
Reality Bytes: Dr. Peppers Social Networking
It took Dr. Pepper several years to build a base of 8.5 million fans on Facebook. But,
the investment pays off. The company uses the group for test marketing. Each day,
the company puts out two messages on its Facebook fan page and then it tracks and
evaluates the responses. New York based Code & Theory created custom code to
measure how many times a message is viewed and how often it is shared with other
users. Robert Stone, director of interactive media services for Dr. Pepper Snapple
Group Inc. notes that We mine the data to understand what is appreciated, and what
is not. One thing the company learned is that diehard Dr. Pepper fans like edge
one-liners. For instance, the company heavily promoted the phrase If liking you is
wrong, we dont want to be right. Through Facebook, Dr. Pepper gains fast feed-
back to concepts, along with free marketing when fans spread the ads to their friends.
Adapted from Geoffrey A. Fowler, Are You Talking to Me? The Wall Street Jour-
nal, April 25, 2011.
446 Chapter 7: Electronic Business
perfect competition price. At a perfectly competitive price, many customers pay
less than the maximum amount they are willing to pay, providing them with a
consumer surplus. If vendors can charge the maximum price to each person, the
company can capture some, or all, of the surplus resulting in higher prices for
consumers.
Services and Web 2.0
How do Web-based services work and why do they change the
world? As households and businesses obtain higher-speed connections, new
Web-based services become possible. You have probably heard about some of
the consumer-oriented sites such as YouTube, Facebook, and Flickr. Other sites
offer more sophisticated services to businesses. For example, several companies
provide online accounting or even ERP services such as customer relationship
management. The purchasing companies pay a monthly or annual fee to use the
applications. All of the processing and data storage is handled by the providing
company, leaving the customer frm free to ignore the technical issues and focus
on running its own business. Some companies, such as Google, provide applica-
tions such as a word processor, spreadsheet, and communication systems that can
be used by both individuals and entire organizations. A third important category
of services relates to the Internet itself: providing network access, developing new
applications, and hosting applications on servers.
Social Networking and Consumer Services
YouTube, Flickr, FaceBook, Twitter, and similar social networking Web sites led
the service revolution for consumers. These applications provide new tools for
people to interact with each other, offering more reasons to spend time online.
Most of the consumer-oriented sites do not charge customers to use the applica-
Figure 7.9
Dynamic pricing. The ultimate goal is to set individual prices for each consumer
to capture the maximum price each is willing to pay, as opposed to the perfect
competition price, where everyone pays the same price, and some customers gain
because they were willing to pay more.
P
Q
D
S
Perfect competition
price
Price consumer is
willing to pay
consumer
surplus
447 Chapter 7: Electronic Business
tions. Instead, they make money by selling ads. Consequently, the sites that grow
the fastest and attract the largest number of users stand to make the most money.
Giving free access helps attract users, but the sites still need to provide a service
that users actually want. There are still plenty of opportunities to invent new ser-
vices that will attract users, but as always, the challenge lies in fnding an appli-
cation that is useful to millions of people. On the other hand, as users gain even
higher-speed connections, particularly mobile ones, new opportunities become
feasible.
Some Web sites are actually services in disguise. For example, 1800fowers
sells fowers, but the company does not grow or ship the fowers. It contracts all
of the details to other frms. What the main site really does is keep track of special
event days, such as birthdays and anniversaries. It basically provides a reminder
service and makes it easy to order products corresponding to those dates.
The challenge with consumer-oriented service sites is to make money. The
choices are (1) charge for the service, (2) sell related products, (3) sell advertising
space, and (4) sell the service to another company. Many of the failed dot-coms
chose option three. When the advertising market crashed, they could not cover
their costs and went out of business. Option four is discussed in the business ser-
vices section. Selling related products is probably the easiest solution today. In
this case, the service is simply another feature that will attract customers to your
site. But the additional costs can make it harder to compete on the basis of price,
so you have to be certain that customers really do value the service. Figure 7.10
shows the basic process of generating money through ads. The Web site (such as
Facebook) contracts with Google to display ads on pages. No money is received
at this point. Ads are displayed along with the content. If a user clicks on an ad,
MySpace
Google Ads
Advertiser
Content
Ad
$
$
Figure 7.10
Free content supported by ads. Sites can offer free content by displaying ads
delivered through Google or Yahoo. When users click on an ad, the advertiser pays
Google, which pays a portion to the original site.
448 Chapter 7: Electronic Business
Google tracks the click and directs the user to the advertisers page. At the end of
the month, the advertiser pays Google, and Google pays a small percentage to the
original site owner. The site usually receives only a few cents per click, so it takes
thousands or millions of clicks to make money. But the site has almost no costs for
carrying the ads, so it is easy to experiment with sites to see what brings in money.
Financing and building an ad-based application is a challenge. Revenue does
not arrive until the site succeeds in attracting thousands or millions of users. In the
meantime, you need millions of dollars to build, host, and market the new service.
Digital Products
This category blurs the lines between products and services. You can buy music
as CDs, movies on DVDs, paper books and newspapers. If you buy these items as
traditional products, they need to be shipped to you. But all of these products can
be sold and delivered as digital products or services that you download immedi-
ately. For example, some music sites, such as Rhapsody, provide the music as a
service because you only rent the music. If you drop your subscription, the music
will no longer play.
Digital products are a feld where e-commerce will eventually dominate. Al-
ready, many products are stored in digital format: music, news, books, movies,
software, and games. In late 2000, many consumers found how easy it was to dis-
tribute digital music over the Internet using MP3 fles and Napstereven though
it was illegal. Digital content over EC meets two of the main consumer criteria:
it is instantly available at any time, and costs should be lower since distribution
costs are small. Furthermore, digital content is more portable than traditional CDs,
DVDs, and books.
The main challenge to digital content revolves around intellectual property
rights and laws. Digital content can be easy to copy and redistributedepriving
the owners (artists) of any reward. The risk is that free distribution of digital con-
tent would remove all incentive for artists and authors to invest time for which
they receive nothing.
Reality Bytes: Fox Broadcasting Sells More Online Ads
Fox Broadcasting, a division of New Corp., announced plans to increase the number
of online video ads. The goal is to match the number of commercials in traditional
TV broadcasts. Pricing of commercials would also change as the broadcaster strives
to combine TV and online audiences into a single group. Toby Byrne, the president
of Foxs ad sales noted that This is what our business is becoming. There shouldnt
be a different commercial experience by virtue of which way you choose to watch
our content. For early 2011, Foxs traditional prime-time audience share for 18-49
year old viewers had dropped 5.4 percent to 4.6 million. One goal of the new pric-
ing strategy is to capture the number of viewers who watch the show online instead
of through broadcasts. Fox is following in the footsteps of the CW joint venture
between CBS Corp and Time Warner Inc. who adopted the same approach a year
earlier.
Adapted from Sam Schechner, Fox Shifts How it Sells Online Video Ads, The
Wall Street Journal, May 16, 2011.
449 Chapter 7: Electronic Business
Several companies (particularly Apple, Microsoft and RealNetworks) have
developed digital rights management (DRM) systems to prevent unauthorized
copying. Microsoft and a couple other companies have systems in place for books.
Most systems take advantage of the Internet. When a consumer purchases a digital
product online, the purchase is recorded in a digital rights management server and
issued a unique ID. From this point, the systems vary. Some work by periodically
checking the Internet server as the product is used to verify that it is an autho-
rized copy. In some systems, the generated ID can work only on the computer for
which it was frst created, so giving the fle to someone else does not allow it to be
played or viewed. Some systems enable users to transfer rights to another person;
others do not.
Another challenge with digital products is the payment mechanism. The trans-
action costs on credit cards and checks are too high to enable low-price purchases,
such as buying one song for a few cents. Until micro-payment systems become
accepted, it is diffcult for sites to charge for content. Currently, subscriptions are
the most common solution. One of the more successful sites is The Wall Street
Journal, which charges an annual subscription fee to several hundred thousand
subscribers. And even the Journal admits that it has diffculty preventing people
from paying for one subscription and sharing it (although that would be in viola-
tion of the subscriber agreement).
One diffculty with any protection system like the digital rights management
schemes is that it is diffcult to stop someone from breaking the system. Early
software vendors in the 1980s learned the lesson that copy protection schemes
were routinely defeated and removed. However, the digital millennium copy-
right act (DMCA) in the United States makes it illegal to break copy protection
schemes. As a relatively new law, it remains to be seen whether this condition
can be enforced. Also, the law does not apply to people outside the United States.
DVD vendors pursued this issue in 2000 and 2001 when a group broke the en-
cryption scheme used to slightly protect DVD movies. The Motion Picture As-
sociation of America (MPAA) has sued several companies in the United States
for even linking to sites that list the decode algorithm, but the code remains on
thousands of sites around the world. A major question exists in terms of whether
copy protection schemes can survive. In 2007, Steven Jobs at Apple began push-
ing the recording publishers to enable Apple iTunes to sell music without DRM.
In general, customers do not like DRM because it limits how the content can be
used. In Apples case, songs purchased on iTunes can be played only on the Ap-
ple hardware; and DRM-protected songs purchased from competing sites cannot
be played on that equipment. Protecting content has been one of the biggest hin-
drances that has delayed the introduction of many services, including download-
able videos and books.
Business Services
Providing online services to businesses is similar to providing services to consum-
ers, except that the services differ and it is easier to charge other companies for
using the application. Services can be as simple as providing direct applications
such as ERP or e-mail. However, the Web infrastructure has the ability to support
distributed services, where companies provide various pieces of a Web page
which appears to the consumer as a single integrated page.
450 Chapter 7: Electronic Business
Applications
Many of the applications are aimed at small to medium businesses that lack the
resources to pay huge upfront costs to purchase expensive applications. For in-
stance, several companies provide online ERP services. Smaller companies con-
fgure their accounting systems and employees access the system through Web
browsers. Since everything is Web based, it does not matter where the applica-
tion is hosted. And, the smaller company can rely on the service provider to keep
the servers running, provide backups, and monitor security threats. Salesforce, the
leading customer relationship management system runs purely as an online ser-
vice. Companies pay by the month or the year based on the number of employees
using the system. Companies can expand or contract their usage by purchasing
access for additional employees.
Google has purchased several companies to provide even more online service
applications to businesses (and consumers). An e-mail and calendar communica-
tion system was the frst main application. Companies simply pay an annual fee to
maintain all of their e-mail on Google servers. They get to use their own domain
name (as opposed to gmail.com), and Google handles all of the servers, backup,
and security issues. Google (and other frms) also offer online service applications
to handle word processing, spreadsheets, and slide show applications. Although
they lack some of the features of standalone packages, basing them on a central
server makes it easy to share the data created with other team members. For in-
Figure 7.11
Distributed services. Firms can offer digital services over the Internet to other
companies, such as document translation or reservation handling. With XML, the
process is relatively automatic and can be billed for one-time and limited uses.
Company 1
Company 2
The Internet
Original
document
Translated
document
Internet Service
e.g., automated
document
translation
451 Chapter 7: Electronic Business
stance, someone in marketing can write a marketing plan. By simply assigning
permissions, other employees in the company can work on the same flefrom
anywhere in the world.
Distributed Services
XML and other standards create opportunities for a new type of B2B e-commerce.
Web sites can provide specifc automated services that can be sold to other busi-
nesses. One example would be a Web site like Altavista (babel.altavista.com) that
has an automated document translator. Figure 7.11 shows the basic concepts. The
key is that the services are automated and simply called from your Web site. This
arrangement is actually more of a peer-to-peer system than a client-server technol-
ogy. You can create a Web site that uses services from many different companies.
For example, you might create a Web site that pulls current stock price data from
one site, performs some complex fnancial calculations on a second site, and con-
verts currencies using a third sites exchange rates. All of these activities happen
behind the page, so your users see only the fnal application.
The main advantage to this type of system is that experts can build objects and
maintain and run the services on a Web site available to anyone willing to pay the
service fee. In many cases, the service fee could be a small per-usage value. So
you could build a composite application that has state-of-the-art features and pay
only for the actual usage of these features. The other alternative would be to li-
cense these technologies on an annual basis for a higher fee and run them on your
own server, where you continually need to maintain and upgrade the services.
The technologies to support these services are still being developed. XML and
the simple object access protocol (SOAP) are two important technologies. SOAP
is a method of describing and activating services across the Internet. Ultimately,
to make it easier to fnd services on the Internet, companies will want to register
with a directory. In many ways, Google is a primary Web service because it pro-
vides searches, and more importantly, delivers ads that generate money.
Network Services
A third category of Internet services consists of the network connections. As a
consumer, you see a portion of this industry because you have to pay an Internet
service provider (ISP) to connect to the Internet. Businesses also have to pay an
ISP, but they have additional expenses that are provided by other companies. To
create a Web site, you need to register the domain with a registrar paying an an-
nual fee, purchase a security certifcate for an annual fee, pay a hosting company
to run your Web servers for a monthly fee, and pay someone to design, develop,
and maintain your Web softwareusually for a fxed fee plus maintenance costs.
Several companies compete in these various businesses, and the industry brings in
billions of dollars a year.
Internet Service Providers and Hosting
Providing Internet access to households and businesses is a big business. Think
about how much you pay for monthly Internet service and multiply that num-
ber by several million. The business also has large economies of scale, both in
providing services to users and providing facilities for businesses to host Web
sites. Consequently, the industry has consolidated over the past decade. However,
there is still a relatively intense battle for providing service for the fnal mile to
individual households. Chapter 3 describes the various options and costs, but the
452 Chapter 7: Electronic Business
Technology Toolbox: Paying for Transactions
Problem: As a business, how do you get paid?
Tools: Many mechanisms have been proposed to handle payments, from cash to
credit cards to cell phones.
Payment Method Fixed Cost Fixed Fee Discount Fee Fraud/Insure
Cash Low except for
security
$0.00 $0.00 Physical security
Check-physical $20/month $0.25 1.7% Included
Check-electronic $20/month $0.25 2.5% Included
Credit card-
physical
$10/month
Minimum $25
$0.25-$0.50 1.6% Covered:0.08%
fraud average
Credit card-
electronic
$30 - $50/month
Minimum $25
$0.25-$0.50 2.6%-4% Not covered:
0.25%fraud
average
Debit card Setup/key pads $0.35-$.055 0% - 2% None
PayPal None $0.30 2.2%-2.9% Covered
for physical
shipments
For decades, checks were the dominant payment mechanism in the United States.
Only recently has it been possible to use electronic checksessentially a direct debit
to your checking account based on the routing numbers. Each method has potential
advantages and drawbacks. As a businessperson, you might be tempted to accept as
many methods of payment as possible, so you do not shut out potential customers.
However, many of the methods have setup and fxed costs, so it can be expensive to
accept everything.
Any payment method essentially has three main costs to the business: (1) fxed
setup costs, (2) transaction costs as a fxed number and a percentage of the price, and
(3) the expected loss from fraud or the cost of an insurance system. Often, there is an
implicit cost to train employees in the proper procedures as well, which increases as
you try to accept more variations of payments.
The transaction costs and risk are all paid by the seller. Merchant banks usually
charge a monthly document or connection fee, and sometimes a one-time setup fee.
A fxed cost per transaction is common, as well as a percentage of the sale. Custom-
ers often prefer credit cards, although in 2002, 15 percent of U.S. purchases were
made with debit cards, and that number is increasing rapidly. Debit cards are useful
to brick-and-mortar merchants because of the lower transaction costs and minimal
risk. However, they are rarely accepted for online commerce because of the potential
risk to consumer accounts. Checks and credit cards carry similar transaction costs
todaywhen you factor in the insurance coverage for insuffcient fund checks. One
challenge with most of the payment mechanisms is that merchant banks usually re-
quire a monthly minimum fee charge. If your frm has few sales through the system,
you will still have to pay $25 per month. For small companies just starting out in
business, this fee can be expensive.
Quick Quiz:
1. Why have consumers rejected most electronic payment mechanisms?
2. What additional fees are charged for international transactions?
3. What happens if a customer refutes a charge?
453 Chapter 7: Electronic Business
primary choices are telephone (dial-up, DSL, or FiOS) and cable modem. Cell
phone or mobile access is gaining in popularity but cannot deliver the same high-
speed service of cable modems. Providing business connections generates even
more revenue, with prices for a T1 line running about $400 a month. Most of the
providers in this market are large and diffcult to compete against. However, many
small wireless frms have arisen to provide niche services in small markets. For
instance, you could pay $400 a month for a T1 line and install a wireless modem
and sell access to the Internet to your neighbors for a monthly fee. You can break
even (not counting initial hardware costs), if you fnd 10 neighbors willing to pay
$40 a month. Of course, you have to handle billing, marketing, and some legal
and technical issues. So, you probably will not make much money, but a T1 line
provides bi-directional speeds of 1.544 mbps, which can be useful if your neigh-
bors want reliable speeds for video conferencing or other activities.
Web hosting is also a large industry. It has several major providers, led by those
who have built huge data centers around the nation and world. The large ISPs,
telephone companies, also provide hosting services because they have direct ac-
cess to their networks. However, many of the large data centers cater to larger
companies. So intermediaries have evolved who purchase space in the data cen-
ters and then resell services to smaller companies.
Design and Development
Compared to the other areas of Web infrastructure, design and development is
highly fragmented with thousands of frms and millions of individuals working
on applications and Web sites. The existing and potential demand is huge, both
for individuals and for frms specializing in developing Web sites and applica-
tions. Chapters 12 and 13 discuss the various information technology careers and
methods of organizing and managing the IT processes. For now, it is important to
recognize that many Web-based careers exist, with a variety of skills ranging from
artistic to programming, security, and management. It is relatively easy to estab-
lish a Web design frm and substantial demand exists for these services. Startup
frms might need to focus on low-price jobs to gain experience and respect. Busi-
nesses can fnd several frms that will help with everything from art design, to
programming, and custom marketing strategies.
Facilitators
Creating a commercial Web site requires a fair amount of effort and knowledge.
Several companies advertise plans to put you on the Web for a low cost. These
systems might work well for small businesses with a limited number of custom-
ers. However, few of them will scale up easily if your business suddenly grows.
Creating and managing a Web site can be a complex processmade increasingly
more diffcult due to security issues. Consulting and specialist frms have arisen
to help you understand these issues and design large, secure, complex Web sites.
Other facilitators have arisen to help with more mundane tasks. For example,
most cities have small businesses that will help people sell items on eBay. In gen-
eral, it is relatively easy to set up an account on eBay and sell various items. How-
ever, many people have only a few items to sell, do not want to take the time to
learn the details of how eBay works, and are uncertain about their technical skills
to handle the process. For a percentage of the revenue, facilitator frms will handle
the complete process, including taking photographs, pricing the item, posting the
information, validating the purchaser, and shipping the item.
454 Chapter 7: Electronic Business
Search Engines
Most people have used search engines to fnd information on the Internet. The
searches are not always successful and tend to return a large number of sites un-
less the key words are specifc and relatively unique. Nonetheless, search engines
are an important method for potential customers to fnd your site.
One of your frst objectives is to get your site listed and indexed on the major
search engines. Each system uses a different process to search and categorize your
site. All of the search engines have a Web page where you can register your Web
site by entering the Internet address and a description of the purpose of the site.
Eventually, your site will be added to the search engine list. Once your site is list-
ed by one of the major services, the other search engines will also fnd it earlier.
Some companies offer to register your Web site with the search engines for
a fee. While this process might be convenient, it is rarely necessary. The good
search engines eventually fnd your site even if you do not register it at all. Some
people claim to know tricks to make your page appear at the top of the search en-
gine listings, known as search engine optimization (SEO). Do not believe them.
In some cases, the advice is harmfulsearch engine developers know most of
the same tricks and will automatically punish Web sites that use the blatantly bad
ideas. Read the Web site descriptions at the search sites for more useful advice.
Basically, make sure your main page contains a precise description of the sites
purpose. Include key words that consumers are likely to search for. Be as accurate
as possible. Think like a customer and try searching for other sites. Look at the
key words you used. Include them on your Web page. The problem with SEO
frms is that the search engines continue to change their algorithms, and trying
to optimize your site for one version can result in a huge drop when the search
method changes. The ultimate goal of a search engine is to identify exactly what
the user wants to see and provide just those pages. So your best objective should
be to carefully defne exactly what your site and pages contain so the search en-
gine can match those pages to specifc searches. The main focus should be on the
page content and descriptions, meta tag keywords, and links from legitimate sites.
In some cases, there is a way to get your site listed higher up in the search
engine results. Many of the sites accept advertising payments to give higher prior-
ity to your site. You will have to carefully evaluate the costs and benefts of this
approach compared to other advertising strategies. Most search engines also rank
sites based on their linkages from other Web sites. So, if you can get your site
listed on established pages, with an accurate description, it can be found faster by
the search engines and will often be listed higher on the results page. Remember
that most people will not scroll through more than a couple of pages of search
results to fnd your page.
Payment Mechanisms and Risk Mitigation in e-Commerce
How can customers pay for products and why do you need new
payment mechanisms? Credit cards remain the most popular method of
paying for items and services purchased on the Internet. In other transactions,
debit cards have become more popular, but they are basically processed as credit
cards for Internet transactions. Consumers like credit cards because they are com-
fortable with them and because banks have largely removed the risks to consum-
ers. Chapter 6 describes the various transaction risks to the consumer, business,
and government.
455 Chapter 7: Electronic Business
Payment Risks
The transaction risks in e-commerce are similar to those of traditional commerce,
but with a couple of twists because of the network connection. The Internet is an
open network where messages can be intercepted and transferred at will. Con-
sequently, it is challenging for the merchant and customer to verify the others
identity. Similarly, both merchant and vendor need to be concerned about the
transfer of money and digital products. Because these two issues stem from the
same cause (the insecure network), they have both been solved through the use of
strong encryption methods. These techniques are described in Chapter 5. They are
commonplace on the Internet today, and consumers and vendors face minimal risk
from the interception of data. Figure 7.12 shows that encryption can protect the
transmission and storage of credit card data, but vendors still assume several risks
because the only method they have to identify customers is by the credit card data.
Some vendors attempt to reduce this risk by shipping products only to the home
address corresponding to the customers credit fle.
The risks of nonpayment or nondelivery are more diffcult to solve. They have
been particularly challenging in an international environment where governmental
jurisdiction and enforcement are not effectively defned. For the most part, con-
sumers are still protected if they use a credit card to pay for a product. However,
the consumer may still fnd it hard to prove that a product was not received. On
the other hand, e-commerce businesses have virtually no protection from fraud.
The credit card rules specifcally exclude mail orders, telephone orders (MOTO),
and Internet orders. The card companies will assist merchants in identifying inval-
id cards, but will not guarantee the transaction. This issue is important because the
Gartner Group (Computerworld 8/11/2000) estimated that credit card fraud is
Vendor
Customer
Encryption protects
transmission of data and
veries identity of vendor.
Consumer is protectged
by credit card company.
It is critical that vendors
protect their databases.
Vendor is not protected by
credit card and has only
weak methods to verify
customer identity.
p
ro
d
u
cts o
r services
Encrypt (Database)
En
cryp
t (cred
it card
d
ata)
V
erify ven
d
o
r id
en
tity.
Figure 7.12
Risk mitigation in e-commerce. Encryption verifes the identity of the vendor
and protects the data in transmission. Credit card companies accept risks for the
consumers but not for the vendors. Huge vendor databases of credit card data are
tempting targets and need to be protected by the vendor.
456 Chapter 7: Electronic Business
12 times higher for online merchantswith about 1.1 percent of all online trans-
actions fraudulent.
Technically, it is relatively easy to use encryption to verify the identity of the
merchant and the customer in any transaction. In fact, the common Web encryp-
tion system works because the merchant buys a digital certifcate from an encryp-
tion company. Customers could obtain similar certifcates or digital signatures,
but they have little incentive to do so, since the credit card companies protect
them. With todays encryption systems, transmission risks are relatively minor.
Two far more serious risks are (1) theft of consumer data from the vendors com-
puter and (2) alteration of the purchase documents by either the merchant or the
customer (repudiation).
The risk of theft is real and has happened to several vendors. The potential tar-
get is huge: thousands or millions of validated credit card numbersall accessible
via the Internet. The only effective solutions are for vendors either to keep the
card numbers off-line or to encrypt them and bury the encryption key.
The second risk arises because digital orders are easy to alter. The solution is
to create electronic orders that cannot be altered. Again, this solution requires en-
cryption. In this case, the customer and the vendor both need a digital certifcate.
When both parties encrypt the order, it cannot be altered later.
Payment Mechanisms
Payment mechanisms must change along with the changes in transactions. Years
ago, when purchases were made locally, currency was the primary method of set-
tling transactions. Eventually, as banks stabilized and gained respect (and gov-
ernment guarantees), transactions were settled by checks. Business transactions
(particularly internationally) are often settled with letters of credit from banks. In
the United States, many payments have migrated to credit cards and debit cards.
Figure 7.13
Payment mechanisms. Credit cards do not protect merchants and have high
transaction costs, so they cannot be used for low-price items. Several systems have
been created to provide the desired characteristics, but customers have not yet been
willing to adopt them.
Smart Card
5400-1111-0000-
Name
Credit card drawbacks
High transaction costs.
Not feasible for small payments.
Do not protect the merchant.
Characteristics needed
Low enough costs to support payments less than $1.
Secure transmission.
Authentication mechanism.
Easy translation to traditional money.
Alternatives
Mobile phone bill.
Smart cards.
Digital cash.
457 Chapter 7: Electronic Business
From a consumer standpoint, credit cards are easy, available, provide short-
term loans, and offer protection from fraud and errors. Figure 7.13 shows the
drawbacks to credit cards and lists the characteristics desired from a new payment
mechanism. From an e-commerce merchant perspective, credit cards offer only
minimal support and are expensive. From the perspective of a mobile-commerce
merchant, credit cards will be unacceptable because the transaction costs are too
high to support small payments.
From a theoretical perspective, e-commerce payment mechanisms should be
easy to create. In fact, dozens have been proposed or started in the past few years.
None of them have garnered enough support to be successful. Some, like PayPal
process payments, but most of those payments today are based on credit cards.
Figure 7.14 shows the main participants in a credit card transaction. The frst
important concept is that all of them charge for their servicesand those fees are
billed to the merchant. The second issue is to examine what happens if something
goes wrong with a transaction. For instance, if a customer fails to pay bills, the
issuing bank is stuck with the charges. Similarly, if a merchant skips town with-
out shipping products, the merchant bank is on the hook. Both banks cover these
risks by charging higher fees and limiting who they provide services to. So, small
startup merchants might have problems fnding a merchant bank and will prob-
ably have to pay higher fees.
Several companies have proposed alternative payment mechanisms, but most
of them failed. PayPal (owned by eBay) has survived, but it is largely a credit card
processing system now. Google and a few other Web sites also offer credit card
Figure 7.14
Credit card industry. Merchants can accept cards only if they are associated with
a merchant bank and a card processor. Both of them charge fees. New, untrusted
merchants, usually pay higher fees because the bank takes some of the risk.
Issuing Bank Merchant Bank
Customer Merchant
VISA,
MasterCard,
AmEx, Discover,
JCB,
Security
Database
Payment data
Product/service
Card Processor
Authorization data
Payment data
458 Chapter 7: Electronic Business
processing. The main difference between these companies and traditional card
processing is that the merchant never sees the credit card data. Customers enter
the data through the PayPal or Google site and merchants receive an e-mail noti-
fying them of the payment. By not handling the actual credit cards, the merchant
faces fewer security issues, but pays higher transaction costs.
The main challenge with credit cards is the relatively high fees. The per-trans-
action costs make it diffcult to accept credit cards for an amount less than $10.
Mobile commerce offers one possibility for handling small transactions: put the
cost on the customers cell phone bill. Most phone bills already contain lists of
small transactions, and the total monthly fee is high enough to pay using tradi-
tional mechanisms. As long as the vendor builds up enough credits with the phone
company, the transaction costs on that side will be reasonable. Currently, the big-
gest potential drawback is the limited security. Phone numbers are easy to fnd,
although a 4-digit PIN would improve security a little. Requiring physical access
to the phone will provide more security, until the phone is lost or stolen.
For on-site transactions, mobile phone companies are beginning to offer near
feld communication (NFC) payment methods. NFC is similar to RFID in that
it uses tags and readers that pick up data at very short range (a couple of inches).
Essentially, cell phones have a chip (or perhaps a chip on a sticker) that contains
encrypted identifers. As shown in Figure 7.15, waving the phone next to a ter-
minal transmits the ID and the terminal subtracts the payment amount from the
consumers account. This account could be a prepaid account or perhaps tied di-
rectly to a bank account similar to a debit card. In advanced systems, the terminal
can send a message to the phone with the receipt and details of the transaction.
Some systems require a PIN as well as the phonewhich is useful if the phone is
Figure 7.15
Near feld communication payment. The cell phone contains a tag with an identifer
that is read when placing it close to a terminal. Sometimes a PIN is added for
security. The terminal subtracts the money from the consumer account which can be
a prepaid account or a debit account.
Bank
Customer
Terminal
Identifier + PIN
inches
price
Message receipt
Prepaid account
Debit account
459 Chapter 7: Electronic Business
Technology Toolbox: Choosing Web Server Technologies
Problem: How do your Web servers handle interaction and database tasks?
Tools: Web servers require special code engines to handle the interaction with users
and the database. Three basic systems have evolved over time: Java (J2EE), PHP/
PERL/PYTHON, and Microsoft .NET. Websites today are built using one of these
three technologies. There are
major differences in the under-
lying technologies and philoso-
phies of the three approaches,
and some developers treat them
as religious issueswhich is
a way of saying that proponents
of each often argue over the
relative merits of their choice
of technology. As a manager,
why do you care about the three
technologies? The main answer
is that you will probably have
to make a decision between
them if you develop a website. All three have evolved considerably over the past few
years and will continue to improve.
Of the three, Microsofts .NET is the newest and has some features that do not yet
exist in the other methods. It is also considerably faster and more effcient at pro-
cessing code and connecting to databases. It is also the most expensive. Java is prob-
ably the second most powerful technology. It has the advantage of being a standard
that is supported by many vendors. Systems developed using standard Java code can
be transferred to run on Web servers built using a variety of hardware and operating
systems. Not only is the server code inexpensive, but the hardware and Web server
software are inexpensive. The other approaches use scripting languages that have
diverse features. Websites built on these systems can be run on a variety of hardware
and software platforms. In all three cases, you need to work closely with the hosting
company to ensure that the proper hardware and software packages are installed.
Building interactive websites generally requires custom programming to tell the
server how to handle the customer responses. Development environments exist for
Java and .NET that help programmers write the code. Most applications are built as
Web forms where the user enters the data. This data is then transferred to the server,
and the code behind the form examines the values. Based on the responses, the data
can be stored in a database, e-mailed to someone, or additional pages can be returned
to the user.
The differences between the systems lie in the capabilities of the underlying code
and the amount of effort it takes to write the code and connect to database systems.
Increasingly, vendors are developing libraries of code for the three systems that pre-
package common procedures. These packages enable developers to build new appli-
cations faster and with fewer errors
Quick Quiz:
1. Why would programmers become so attached to one system?
2. What are the advantages of choosing the most popular server technology?
3. What are the dominant costs of creating a Web site?
460 Chapter 7: Electronic Business
lost. The method is popular in Japanparticularly to pay for subways and trains.
Apple and Google have both begun offering the chips in some phones. However,
vendors need to upgrade their terminal systems and it is not clear yet whether the
transaction fees will be low enough to justify adopting this payment method.
In summary, electronic payment mechanisms are still in their infancy. It could
take years for a standard to evolve and be accepted by enough merchants and cus-
tomers to be important. In the past, governments have borne the costs of creating
and printing money. Today, most seem unwilling to become involved, and they
have left the mechanisms to the private sectorwhich is more focused on devel-
oping a system that provides profts to the issuing authority, instead of developing
a system that would be widely accepted.
Even for traditional businesses, bill presentation and payment mechanisms
can make life easier and save money. Service businesses in particular can beneft
because they tend to bill clients on a regular basis. The goal is to send all bills
electronically and provide a simple method for clients to transfer funds to your ac-
count. If clients are large businesses, they may wish to use existing EDI or bank-
ing systems (wire transfer) to transfer money. Smaller companies with smaller
payments will generally prefer the newer online payment systems because they
have lower costs to the customers.
The electronic systems save time because the bills can be created automati-
cally from the in-house billing system. They do not have to be printed or mailed.
Customers can feed the data into their own accounts payable systems and create
electronic payments with only a few review steps. The payment data, and any
disputes, can be processed electronically and automated. Many systems work di-
rectly from checking accounts, effectively transferring an electronic check. As of
2007, the U.S. checking system supports completely digital copies of checking
data, processing transactions within the existing system at relatively low transac-
tion costs.
Advertising
How do frms get revenue from Web ads and how do custom-
ers fnd a site? Advertising has become an important source of revenue for
Web sites. To understand and take advantage of advertising, you need to look at
the process from three perspectives: (1) the advertiser, (2) the publisher Web site,
and (3) the consumer or ad viewer. You probably have the most experience as the
user, but do you recognize the three main types of ads in use today? As with other
components of the Web, consolidation among companies has reduced the com-
plexity of advertising. Today, you can deal with two or three companies to handle
most of your advertising needsboth as a publisher and an advertiser. In fact, for
2010, the Interactive Advertising Bureau (IAB) statistics showed that the top ten
Web advertising frms were responsible for over 70 percent of the total advertising
revenue.
The three main types of Web ads are: (1) Small text links provided by Google
or Microsoft that provide publishers with a small fee when users click on them;
(2) Banner ads that contain images and fash video, where publishers are usually
paid simply for displaying the ad to visitors; and (3) Independent links to third-
party Web sites where the site pays the publisher based on the number of visitors
generated.
461 Chapter 7: Electronic Business
Traditional Media and Name Recognition
To a consumer, name recognition of a company is an important element of buy-
ing products over the Internet. Trust is particularly critical when the consumer is
not dealing face-to-face with the merchant. Depending on your target customers,
it might be necessary to build this name recognition through advertising in tra-
ditional media (television, radio, or newspapers). Some early start-ups chose the
splashy, but expensive, method of buying television spots during the Super Bowl
to reach a large audience. If you do use traditional advertising, make sure that
your Web site name is easy to remember and easy to type. Avoid words that are
commonly misspelled.
Web Advertisements
Web advertising offers some potential advantages over traditional advertising.
Ads can be delivered to specifc audiences and to some extent controlled so that
people continually see new ads. Increasingly, Web ads deliver on their original
promise of tracking responses by measuring the effectiveness based on the click-
through rate, or the number of people who actually click on an ad and go to a site
to get additional information. The original ad model matched the offine model by
simply displaying banner ads on a page and waiting for people to click an ad.
Figure 7.16 shows the estimated total advertising revenue by year as reported
by the IAB. Advertising fell from 200-2002 because of the dot-com crash and then
accelerated when Google introduced keyword advertising. Google has since pur-
chased several other advertising companies, including DoubleClickone of the
leading portals for banner advertising. Along the way, advertisers developed more
Figure 7.16
Web advertiser quarterly revenue. Revenue fell in 2001-2002 with the dot-com bust,
but began to recover in 2003 as advertisers found new ways to attract customers.
Sources: http://www.iab.net/resources/ad_revenue.asp and Google quarterly reports.
0
1
2
3
4
5
6
7
8
9
B
i
l
l
i
o
n
$
Web Ad Revenue
Revenue
Google
462 Chapter 7: Electronic Business
sophisticated ads using Flash and video. All of the parties have also increased the
ability to track customers and monitor the performance of all online advertising.
Still, the comparison to revenue earned by Google shows a strong correlation with
the growth of online advertising. By 2008, Google was also generating some rev-
enue from other sources, including hosting e-mail and Google docs, so Googles
total revenue now exceeds the total online advertising revenue. Estimating total
advertising spending is a challenge, but some reports suggest that online spending
represents about 9-10 percent of the overall U.S. total. Based on changes in the
industry, much of the online spending has come at the expense of advertising in
newspapers and magazines.
Banner Advertising
If you want to advertise on a site, how do you get started? If you have a popular
Web site, where do you fnd advertisers? Like the traditional world of print, radio,
and television advertising, the daily issues of handling the ads, monitoring place-
ments, fnding clients, and billing can be time consuming and expensive. Most
sites choose a third party to perform these tasks, and DoubleClick is by far the
largest such company. Of course, DoubleClick takes a portion of the ad revenue
for its services. Figure 7.17 shows the intermediary role played by DoubleClick.
The third party also simplifes the process for advertisers, since it would be diff-
cult for a company to contract with hundreds of sites to place ads. In 2007, Google
purchased DoubleClick from a private equity frm, to consolidate its role in the
advertising market, but it still operates under the original name and Web site. In
Figure 7.17
Advertising consolidator. DoubleClick provides advertising services by functioning
as a central point for both advertisers and publishers. DoubleClick handles the details
of delivering the correct ads, tracking impressions and collecting and distributing the
money.
User Web browser
Publisher Website
Advertisers
DoubleClick/Google
content
Ad
request
page
page +
ad link
Browse
info
ad
negotiate sites
negotiate ads
Rotate ads
Track hits
Collect money
Distribute payments
Track customers
463 Chapter 7: Electronic Business
2004, DoubleClick earned about $300 million in revenue, so despite its position,
it receives only a small percentage of the total advertising spending. Although it is
convenient for advertisers and publishers to deal with a single central intermedi-
ary, it is relatively easy for users to block ads from the central server. Check the
Internet for information on how to add the DoubleClick sites to your hosts fle and
your computer will stop receiving any information from them.
An interesting twist on banner ads is that video games are now beginning to
place ads. Games that connect online can download new ads. Generally, the ads
are embedded within the game, such as billboards on car-driving games. But at
least one pizza company added a link to a game so that players can click an icon
within the game and order a pizza for delivery.
Advertiser and Publisher Perspectives
In the world of traditional banner ads, similar to the offine world, advertisers will
place ads based on the demographic characteristics of the potential viewers. Fig-
ure 7.18 summarizes the perspective of advertisersthe ones who pay for the ads.
They generally want the ads to be seen and to generate click-through responses.
There is some argument that click-through rates are not an effective measure of
advertising. Possibly the effect of an ad is to build an image or a brand name.
Consumers might not need to purchase something immediately, but they might
remember the ads later and use them to accept the validity of the company.
Increasingly, advertisers want to establish a relationship with the potential cus-
tomers. Consequently, audience size and demographics are important to adver-
tisers. In particular, advertisers are fnding the most success in targeting specifc
sites. For instance, automobile manufacturers fnd it worthwhile to advertise on
sites dedicated to automotive topics (such as vehix.com, Edmunds, and autobytel.
com).
Many Web site publishers would like to get a share of the advertising revenue,
but keep in mind that according to the private Internet advertising bureau (IAB),
about 75 percent of online ad revenue goes to the top 10 Web site publishers. So,
there is not much left for your share. The frst catch is that you need a substan-
tial volume of visitors to get anyone to consider your site. Probably at least 25,000
unique visitors a month, and 1 million would be a more likely minimumsince
advertisers prefer larger audiences. Figure 7.19 shows some of the key points
from a publishers perspective.
One of the most diffcult issues is obtaining the demographic data. You need
some mechanism to identify your Internet users and to obtain some personal data
Figure 7.18
Web advertiser perspective. Advertisers want the biggest target audience possible.
They need demographics about the Web site visitors, and they monitor response
rates.
Wantviewerstoseethead.
Wantviewerstoclickthroughtothemainsite.
Wanttocollectcontactinformationfromviewers.
Needtomatchsitedemographicstotargetaudience.
Monitorresponserates.
Cost.
464 Chapter 7: Electronic Business
from them. Of course, this data raises many privacy questions. Most sites fnd that
they have to reward customers in some fashion to get them to provide personal
demographic data, but it is often amazing how little is required to get customers
to respond. Common tactics include random drawings for prizes or free trinkets.
The other approach today is to have focused Web sites and then match the demo-
graphics against the existing public data. For example, antique car sites attract a
particular demographic, while baby sites attract another group.
Google Keyword Ads
In 2002, Google changed the online advertising world by introducing click-
through ads tied to searches. Look again at Figure 7.16 and it is clear that the
entire increase in online advertising since 2002 has been due to Google ads. The
basic concept is straightforward, but to use the system effectively, advertisers
must make some complex decisions. Advertisers choose keywords. When a user
enters that keyword in a Web search, Google displays an ad from a company that
purchased that keyword. Users win because the ads are likely to match what they
are searching for. Advertisers win because users are more likely to respond to the
adand advertisers pay only when a user clicks on the ad.
One twist is that prices for keywords are not fxed. Instead, advertisers pur-
chase keywords based on an auction process. The company that bids the highest
price for a specifc keyword gets listed higher in search results. Since thousands or
millions of people might search for a keyword, advertisers need to control expens-
es by specifying a maximum budget, such as a maximum daily amount. When the
budget is spent, your ads will no longer appear. So the highest-price bid can vary
throughout the day, week, or month depending on the bids and budgets of com-
petitors. Advertisers must choose keywords, the bid price, and the budget amount.
As shown in Figure 7.20, Google provides support for selecting keywords and
estimating bid prices and daily budgets. In particular, Google shows the average
number of daily searches for the keywords you select so you get some idea of the
popularity of each word. Google also shows the current average prices being paid
by your competitors for each keyword and the approximate position your ad will
get. You can use this information to set a daily budget. Be carefulsome words
Figure 7.19
Web publisher perspective. There is money being spent on advertising, but your
rates depend on volume and the ability to provide detailed demographic data. The
daily tasks of sales and providing the ads are often handled by a third party like
DoubleClick.
Income
Cost per thousand viewings ($1 - $50)
Need volume (25,000 or 1,000,000 per month)
Need demographics
Tasks
Ad rotation software
Tracking and monitoring
Ad sales staf
Billing
Tird Party: DoubleClick
465 Chapter 7: Electronic Business
can be expensive. Paying a higher price will put your ad near the top of the list,
but it will quickly blow through your budget. Pricing your ad too low means that
it will not make the frst results page. Increasingly, people will never look beyond
the frst page of results or ads. On the other hand, if customers never see your ad,
they will not click on it and you will not have to pay anything to Google. So, per-
haps there is a strategy of bidding low and waiting for all of the other budgets to
run out. Ultimately, results also depend on the number of competitors. In the end,
you have to experiment with different words at different times to see which cus-
tomers actually click your ad and how many then complete a purchase. Oh, you
also have to write the adbut it is easy to look at the format of other ads to see
what features are attractive and which ones are not.
Google AdSense
Another Google twist was the introduction of AdSensewhich is designed for
publishers of other Web sites. Basically, anyone can place Google ads on their
Web pages. The process works the same way as AdWords, but Google matches
the keywords to specifc sites (instead of waiting for a search). Visitors to your
site see ads that are placed by Google. When visitors click an ad, the advertiser
is charged through Google and Google shares a portion of the revenue with your
publishing Web site.
One of the strengths of the Google approach is that it is relatively easy for both
advertisers and publishers to join the program. And both can experiment without
Figure 7.20
Estimating budgets for Google AdWords. Google provides estimates on the number
of daily searches for each keyword you select. It also looks at the average bid price
for those keyword ads and estimates a daily cost and ad position.
466 Chapter 7: Electronic Business
long term contracts and can begin with low numbers and small budgets. In other
words, it is easy to experiment and tweak your involvement until you fnd a com-
bination that works. Even small advertisers and Web sites with a small number of
viewers are welcome. In many ways, Google democratized the online advertising
world. Almost anyone can now advertise or receive money from ads even with
low traffc volumes.
Click Fraud
One potential problem with Googles approach is the opportunity for click fraud.
In theory, you could enter a search at Google for your chosen keyword; then re-
peatedly click on your competitors addriving up its costs and forcing it off the
list when the budget is reached. Google claims to have software in place to rec-
ognize these attempts, and claims that fraud rates are relatively low. For example,
ad clicks from the same IP address in the same day are supposed to be charged
only one time. Fraudsters have to be a little more sophisticated than sitting at their
desk clicking away. And most people are probably relatively honest and would
avoid such behavior. Nonetheless, you need to monitor your usage data and click
through rates to watch for potential problems.
Privacy
Privacy is the important fip side of advertising. The more serious privacy prob-
lems that have arisen were due to issues with advertising. The problem is the
trade-off faced by advertisers. Companies want to target ads as closely as possible
to people who are likely to care about and purchase the product. Hence, advertis-
ers want to know a considerable amount of information about current customers
and viewers of various Web sites. Yet collecting this data creates a loss of privacy
for the customers.
DoubleClick instigated one of the broader privacy problems. By routing so
many ads through its servers, DoubleClick is able to track the Web pages vis-
ited by each of millions of Web browsers. At one point, DoubleClick wanted to
sell this information along with demographic data on the individual consumers.
Reality Bytes: Sales Tax Revenue Declines
Citizens often want governments to provide services such as parks, education, roads,
police, and so on. Many of them do not realize how cities and counties fund those
operations. In most states, property taxes are the primary source of revenuefol-
lowed closely by sales taxes. The Census Bureau reports in 2008 that on average 23
percent of U.S. state and local taxes come from sales taxes. The recession of 2008
resulted in declines in purchaseshence a reduction in sales tax revenue. But, the
National League of Cities reported that municipal sales tax revenue declined in six
of the ten years from 2005-2010. Part of the problem is that cities and companies
overbuilt the number of malls. The amount of retail store space increased by 126
percent from 1970-2010 while population increased only 52 percent. But, city lead-
ers are concerned that online sales ultimately are a problem because they will reduce
sales tax revenue collected through traditional stores.
Adapted from Miguel Bustillo and Kris Hudson, Faded Malls Leave Cities in the
Lurch, The Wall Street Journal, June 8, 2011.
467 Chapter 7: Electronic Business
Most consumers are not happy when a company tracks the sites they visit without
informing them of the process. The basic premise of tracking demographic and
customer data is that, by knowing more about the customer, it is easier to provide
specifc ads and data that might appeal to the customer and, in essence, fewer
junk ads the viewer does not want.
Most advertising sites, including DoubleClick, use third-party cookies to track
sites visited by as many people as possible. When you visit a site that contains a
DoubleClick ad, DoubleClick inserts a cookie on your computer that records the
time, Web site, and ad displayed. Any other site that uses DoubleClick returns that
tracking cookie. Because thousands of sites use DoubleClick, the company can
generate an extensive summary of your online activity. In 2010, the Wall Street
Journal ran an extensive series of articles on the area of Web advertising and pri-
vacy. Consumers can take some actions to protect their privacy. For example,
most browsers have privacy settings to block third-party cookies. These settings
have to be made manually. Browsers also have more advanced private modes
which block almost any data and cookies, but allegedly in response to advertis-
er complaints, the developers (particularly Microsoft and Google) have made it
somewhat diffcult to enter that special mode. In 2011, Microsoft announced that
it would support an opt-out privacy flter that would give people some ability to
prevent Web sites from tracking any information about them. It remains to be seen
if these tools will be implemented or if they will be useful.
Developing and Hosting Web Sites
How do you create an EC Web site? Once you have decided that you
want to participate in EC, you need to fgure out how to create the site and get it
hosted. In part because of the expense of maintaining a high-speed Internet con-
nection, several companies have been created to provide alternative Web-hosting
options. These hosting companies already have high-speed Internet connections,
Web servers, databases, and management staff. They provide a variety of leasing
options to host your site. One of the most important decisions to make regarding
the Internet is where to locate the Web fles. A variety of choices exists, and each
method has different advantages, costs, and drawbacks. The choice of Web-host-
ing method depends on several characteristics of your business. Companies will
often start with one option and move to other selections as they expandparticu-
larly small frms or start-ups.
Today, companies rarely host their own Web sites. Several huge companies
provide comprehensive capabilities with servers located around the world. Even
if you want total control over your own servers, several companies provide co-
location services, and with high-speed Internet connections, it no longer matters
where servers are physically located. Even large companies that have the exper-
tise to run servers typically make use of these large server farms. Virtual machine
technology has made it even easier to use hardware maintained by other compa-
nies. The virtual servers can be confgured and moved to any physical hardware.
Even if you want a retail Web page to display the current inventory level (to indi-
cate if an item is in stock), the Web server can connect to your internal databases
across the Internet. Still, there are times when companies will want to run their
own servers. The bigger question is when you can use existing software and when
it is necessary to create custom software to run on the servers.
468 Chapter 7: Electronic Business
Simple Static HTML
The most basic Web site consists of simple HTML pagestext and some images.
These pages are generally fast to load, require minimal support from the server,
and are relatively easy and inexpensive to host. For example, many Web provid-
ers offer free Web space. Most developers try to hold Web pages down to about
50KB per page, including graphics. The goal is to keep download times to an ac-
ceptable level even for slow connections. These basic Web sites cannot interact
with the viewer. For example, you cannot accept form data or process credit cards.
Similarly, the Web pages cannot interact with your internal databases. Generally,
a single set of pages is made available to everyone, with little or no customization
for individual users.
Although these relatively simple pages are easy to create, it is diffcult to
change them and keep them up to date. All changes must be made individually,
and the developer must keep track of the details.
Consider the steps involved in creating a retail Web site with static HTML
pages. You write a page that describes each product, including price and photo.
You create a style for the site, adding fonts and colors. You can link the pages,
probably using some type of index or a start page that lists major categories. With
free hosting, it is rare to have a personalized search engine, so customers will
need an easy method to fnd the products you are selling. Figure 7.21 shows the
resulting hierarchical structure that you will have to follow. Each product will
ultimately be displayed on a separate page. Each of these pages must be created
individually, and links created by hand. To change any content, such as prices or
Main Web Page
Categories
...
Category 1
Product photo
... ...
Product 1
Description
Price
Photo
Product 2
Description
Price
Photo
Product 3
Description
Price
Photo
Product n
Description
Price
Photo
Category 2
Product photo
... ...
Category 3
Product photo
... ...
Figure 7.21
Retail website with simple pages. Each product will generally be on a separate page,
but each page must be created individually and linked by hand.
469 Chapter 7: Electronic Business
descriptions, you must go to the desired page and make the change. This method
may work for a small number of products, but as the number of products increas-
es, it will become diffcult for the developer to keep content and links up to date,
and virtually impossible for users to fnd anything.
The other challenge with this Web structure is that the static Web server will not
collect customer data, and because it cannot process form data, it is challenging
to process a sale. One method is to use e-mail, where the customer enters product
choices into a message that is e-mailed to your order-processing department.
The Buy Now or Buy Me button is one of the easiest methods to accept on-
line payments. Several companies, such as goemerchant and Google, offer these
checkout services. You set up a merchant account with one of these services and
place a couple of lines of HTML text on your page. When users click the dis-
played Buy Now button, the item is added to a shopping cart that is maintained
by the service provider. As shown in Figure 7.22, to purchase the items, the user
is taken to the checkout form run by the service provider. All credit card and pay-
ment data is handled by the providerthe merchant never sees the customers
fnancial information. This process makes it easier for the customer to trust the
merchant, and the merchant does not have to handle the security problems and
costs associated with collecting and storing credit card data. Because all of the
interaction and processing is handled by the service site, the merchant site can run
as simple HTML pages. Of course, this convenience carries a pricethe service
provider collects a fxed fee per transaction and a percentage of the sales revenue.
However, if you decided to handle your credit card processing by yourself, you
would still have to pay the credit card company and a card processor frm. So the
net cost to using Google is relatively low. Plus, you can get a service that does
Merchant Web site
Product
Description
Price
Buy Now
Shopping Cart
Item Price
Total
Check Out
Credit Card Data
Name
Address
Phone
Card Number
Submit
Card Processor Site
Customer
Notication
(Accept/Reject)
Notify merchant
Figure 7.22
Order processing with static pages using a third-party processor. Clicking a link
brings the customer to the card processor to enter card data and make the purchase.
470 Chapter 7: Electronic Business
not charge fxed monthly fees, enabling you to start small and pay only when you
actually have sales. However, these services tend to provide less vendor protec-
tion than you get by using a credit-card processor. Many seller complaints against
PayPal are listed on various Web sites with claims that PayPal does not support
vendors. It seems to be a risky PayPal strategy, because vendors are the ones who
pay the fees and choose the provider.
The main drawback to this method is the diffculty in updating the data, and the
related challenge for the customer in fnding specifc products. Because the pages
are static, you have to edit each page separately if you want to change data. And it
is diffcult to add search and flter conditions to help customers fnd specifc prod-
ucts. Static pages work when you have a limited number of products that tend to
remain the same and do not require customization.
Web Auctions
Some companies are interested in selling only a few individual items. If you want
to experiment with the Internet, have a few unique items, or need to clear out a
couple of items, it usually does not pay to set up a separate Web siteprimarily
because it would be hard to attract customers on a part-time basis. EBay.com is
the best-known general auction site. The system operates similarly to newspaper
classifed advertising, but interactively enables potential buyers to bid on items.
As highlighted in Figure 7.23, anyone can buy or sell products. The Web site lists
the products and tracks the bids. At the end of the bidding period, the seller con-
tacts the high bid and arranges shipment and payment.
One of the major diffculties with individual sales is authentication and ensur-
ing that the transaction is handled properly. The buyer runs the risk that the seller
is dishonest. If the seller ships the item before receiving payment, the buyer may
never pay up. Most sellers are unwilling to accept this risk, so they generally re-
quire the buyer to send payment before the item is shipped. However, the buyer
runs the risk of fraud. In 2000, eBay recognized the importance of this problem
and added the ability for sellers to accept credit cards from any buyer (called
Billpoint).
Uncertain prices
Can set reserve price
Good for unique items
Eciency depends on
Full information
Adequate number of
participants
Figure 7.23
Auctions. Good for unique items where you do not know what price to set. Economic
effciency depends on the number of participants and full information.
471 Chapter 7: Electronic Business
Several layers of pricing exist at auction sites. Generally, the seller must pay a
fee to list the item and a second fee once it sells. If the item does not sell, the seller
pays the frst fee. The fee amounts depend on the value of the item being sold and
on the options you choose. Read the fee schedules closely. For an average, fgure
$1 to list an item and about 3.5 percent of the value when it is sold. If you choose
the credit-card billing option, the seller will generally pay another 3.5 percent of
the selling price. As eBay has grown in size, the other auction sites (such as Ya-
hoo) have left the industry. Economic theory states that relying on a single provid-
er of auctions might affect the charges because of a lack of competition. However,
a single site makes it easier for buyers and sellers to fnd each other.
Amazon WebStore
Amazon.com was one of the early e-commerce sites to enable small merchants
to start Internet sales. As shown in Figure 7.24, the system (Amazon WebStore
which used to be called MarketPlace) enables merchants to sell items by setting a
fxed price. Listing items for sale is similar to the auction process. The seller pays
a fee for listing the item and a fee based on the selling price when the item is sold.
The fees change over time, but are loosely $1 per item plus 6 to 15 percent of the
items value. Amazon also imposes some limits on the prices you can charge for
various items. The company provides a bulk loading program to transfer all of the
product descriptions and prices.
Amazon is essentially a Web mall that supports a number of sellers. Since the
products show up in a regular search at Amazon, many customers do not know
they are dealing with a third-party supplier. Consequently, although the costs are
relatively, high, the sellers gain instant credibility from the Amazon name. Other
companies offer merchant mall services, but few have the name recognition and
customer base provided by Amazon. Amazon also provides a system for vendors
to create their own store sites.
Cameras
Description
Price
Checkout
Catalog
database
Search
Transaction Processing
Amazon.com handles credit.
Sends order info to merchant.
Merchant ships item to consumer.
Consumer
Product search.
Choose vendor.
Pay for item.
Vendor Transfer
Description
Price
Scanned image
Contact info
Figure 7.24
Amazon.com WebStore. Vendors list individual items. Consumers see WebStore as
the store and search for a product. Amazon.com can process the credit card-based
purchase, and the vendor ships the product to the consumer. Vendors pay fees for
listing items, selling them, and using the credit card processing.
472 Chapter 7: Electronic Business
Auction versus WebStore
If you wish to sell a small to medium number of items, then auctions and Amazon
are a good option. The transaction and shipping costs tend to rule out low-priced
items. On the other hand, buyers are somewhat leery of high-priced items from
unknown sellers. For example, most people might consider buying a rare coin
from a dealer but would be more reluctant to deal with an unknown independent
seller.
If you have a small number of intermediate-priced items to sell, should you
choose an auction site or Amazon? Auctions are particularly useful for unique
items or items where you are uncertain of the value. The WebStore system has
a good search engine and works well for small retailers who wish to maintain a
continued presence on the Web. Auctions present a slight uncertainty in the fnal
price. However, economic theory observes that an auction that is based on free in-
formation, and attracts all the relevant participants, will result in the highest price.
One computer manufacturer that traditionally sold only through distributor chan-
nels tested this theory in 1999 by offering a limited number of machines at an auc-
tion site. All of them sold for higher prices than could have been obtained through
traditional outlets. Keep in mind that if you have several products, you can always
try multiple outlets and test the response.
Web Commerce Servers
Transactions on Web sites are often handled by Web commerce servers. These
software programs provide all of the features needed to run a commercial Web
site. As shown in Figure 7.25, the site can be run by a specialty hosting company,
Web servers
Database
Commerce Server Shell
Web/Commerce Hosting Company
Customers
Merchants
Your Web site
Products
Shopping cart
Sales
Load database
Images
Descriptions
Prices
Customize site
Figure 7.25
Web commerce servers. The Web hosting company provides the servers, Internet
connection, and commerce software that processes transactions. The merchant loads
the database with product descriptions, images, and prices. The commerce software
provides a typical retail experience.
473 Chapter 7: Electronic Business
or you can run it on your own servers. The software is used by companies like
Amazon to host multiple sites. You can also lease it from specialty hosting frms
just to provide services for your company. The capabilities of the site depend on
the features available in the software. As a vendor, you should examine the fea-
tures of different site products to see which ones you need. Software systems are
available from several companies to run on your own servers or as a hosted ser-
vice. Dot Net Nuke is a popular open-source system for Windows-based servers
and Joomla is sometimes used on Linux-based servers.
The Web hosting company provides a server, a connection to the Internet, an
account for the hosting software, and credit-card processing. The Web commerce
server hosting software provides displays of your products, the ability to cus-
tomize your stores displays, a search engine for your products, and the ability to
process transactions securely. Some of the hosting software packages offer de-
tailed customization options, while others are more restrictive; but all of them
provide the basic elements you need to create and run a retail Web site. The Web
hosting company generally charges the retailer a setup fee, a fxed monthly fee,
and a transaction feeparticularly for processing credit cards. The fees are highly
variable and each company bases them on different parameters (such as number
of products versus number of transactions). The main strength of the Web com-
merce software is that you load product information into a database so it is easy to
update and easy for customers to search. The software contains all of the code to
build a relatively sophisticated Web siteyou simply customize it with your own
designs. Today, you can build many elements of a commerce server using compo-
nents produced by the open source community.
Content Management Systems
If you have a small business with a Web site that sells only a few items, it is
relatively easy to create and manage the Web site. On the other hand, you might
have hundreds of products and need to change descriptions, photos, or prices on a
regular basis. Or you might have thousands of pages of content that need to be up-
dated. For example, a service organization might include descriptions of services
or analysis of recent events. Keeping pages up to date can require the participation
of dozens or hundreds of workers to create and edit the content.
A catalog management system is designed to help you maintain a database
of products for sale on Web sites. You enter product descriptions and prices on
a local system and it updates the Web site catalog. The system has to recognize
and know how to communicate with your commerce server software. The main
strength of the catalog management system is that it focuses on the products and
provides tools to group them into categories and change prices. It can then auto-
mate the Web server updates.
Web sites that focus on text pages instead of products are often more compli-
cated. The pages can be written by hundreds of different employees. You want
all of the pages to follow a standard style and to ft into your Web sites structure
and search system. You cannot let hundreds of employees edit the Web site direct-
lyit will be next to impossible to maintain consistency and security. A content
management system is designed to make it easy for nonprogrammers to update
content, maintain a consistent style, and keep track of changes to a Web site. The
systems generally allow workers to create content using traditional editors such as
Microsoft Word, and then convert the text into HTML and store it in the appropri-
ate pages. They also track the revisions, so you know who changed each page and
474 Chapter 7: Electronic Business
when it was modifed. Most of the systems also maintain version control so you
can switch back to an earlier version of a page if something goes wrong.
Application Service Providers
An application service provider (ASP) is a Web-based business that provides
a specifc service to other businesses. The service is very specifc, and might or
might not involve interactions with customers. For example, as shown in Figure
7.26, one company provides online accounting services for small businesses. For
a monthly fee, you can enter all of your transaction data and generate standard re-
ports. Other ASPs act as intermediaries in providing services. For instance, a few
major companies provide Web-based real estate listing services. Other companies
provide online reservations services for service businesses.
If you can fnd an ASP that provides the services you need, it will generally be
easier and cheaper to use the services of the ASP than to create your own Web site.
Competition should eventually give you greater choices in price and quality. Even
if an ASP does not exist for the service you wish to provide, it might be possible to
convince a frm to adapt their products or create a new service.
The other way to look at ASPs is to fnd your own application service that you
can provide to other organizations. It takes time to create the application because
it is almost always custom programming. But, once the application is running, it
generates money on a regular basis. And you might be able to collect advertising
revenue from the sitewhich also rolls in every day.
Web Hosting Summary
As shown in Figure 7.27, once you know the type of e-commerce site you wish to
run, you need to select a hosting option. Today, most companies outsource their
Web sites to specialty data-center companies that have direct high-speed connec-
Businesses that lease the use of the application.
Store data.
Analyze data.
Facilitate company interaction.
Business Application
e.g., Accounting
Figure 7.26
Application service provider. The Web server runs an application that holds data for
other businesses. The data may be exclusive to one business (e.g., accounting); it may
be used to interact with other businesses (e.g., supplier auction site); or businesses
may interact with consumers (e.g., real estate).
475 Chapter 7: Electronic Business
tions to the Internet. But, you can choose from thousands of companies with many
different options. You need to begin the process by identifying the primary fea-
tures that you need. For example, if you need your own brand identity, you will
want your own URL, so Amazon WebStore might not be the best solution. If you
need custom programming, you will have to fnd a hosting company that provides
support for the languages and databases you need. If you need Web commerce
software, you will want to test the catalog management system to ensure it is easy
to use and compatible with your existing systems.
Web hosting companies typically charge fees based on the disk space used by
your site and by the monthly data transfers. The monthly data transfers become
one of the critical issues and tend to affect the price. If your site contains lots of
video and large photos, or if you expect millions of visitors, you will need to look
at hosting packages that provide the ability to transfer huge amounts of data each
month. The monthly data transfer number represents the cost of the bandwidth
that you are using. It is a diffcult number to estimate for startup frms. You can
try to estimate it based on the expected number of visitors, the average number of
pages viewed, and the size of the page in bytes. But the expected number of visi-
tors can be hard to estimate. Once the site has been operating for a few months,
you can get a better idea of the data rates. Until your site gets mentioned on a na-
tional radio or TV show and the number of visitors skyrockets.
Web hosting companies provide several levels of servicewith increasing
prices for each type of service. The simplest hosting consists of basic HTML pag-
es, with no database connectivity and limited programming. You might or might
not get your own name as a Web address; but you can probably fnd this level of
service at almost no cost. You can add more features to basic sites to add more
e-commerce options. For example, database connectivity makes it easier to store
product details. Programming support is useful if you need to customize the Web
site. Preprogrammed shopping carts and security certifcates are useful if you han-
dle payments yourself. Web commerce software simplifes the tasks of handling
product sales. Most companies provide these services on a shared serverwhere
Business Situation Hosting Options
Smallbusinesswithafewbasicitems. StaticHTMLwithaBuyNowbutton.
Uniqueitemsofuncertainvalue. eBayauction.
Many items but minimal confguration
issues.
Web commerce server hosted by third
party.
Manyuniqueitemsandmerchantidentity
isnotcritical.
Amazon WebStore
Uniqueservice. Custom programming, probably run on
ahostedserver.
Custom application with tight linkages to
in-houseapplicationsanddatabases.
Custom programming running on your
ownservers.
Figure 7.27
Web hosting options. Today, most companies host their Web applications on the
servers of specialty companies. Your job is to match the services you need for your
business.
476 Chapter 7: Electronic Business
hundreds or even thousands of other company sites are hosted on the same physi-
cal server that is owned and managed by the hosting company. Another option
is co-location, where you own the server hardware and install the software and
manage the system and security. Essentially, you just rent space and a high-speed
Internet connection from the hosting company. This option is useful if you are
concerned about security or interference from other Web sites, and have the per-
sonnel to manage the server and security issues.
Running your own Web server is a challenging task. The software and servers
are relatively easy to deal with. Security and monitoring are considerably more
complex. Plus, it is expensive to install high-speed Internet connections to your
premises. But, sometimes you have no choice and need the total control over your
applications. Before you take this step, be sure to hire experienced security ex-
perts. And keep in mind that even large frms like Yahoo host their servers at spe-
cialty sites. Google is an exceptionin addition to running its own Internet con-
nections, the company custom-builds its own servers.
Mobile Commerce
How do portable Internet connections (mobile phones) provide
new ways to sell things? In many ways, mobile commerce may not be
much different from the existing Internet. As shown in Figure 7.28, users have
cell phones and tablets with wireless connections to the Internet. However, for the
near future, these appliances will have small, even tiny, screens. With 3G wireless
networks, led by Verizon, the data transmission speeds have improved but are still
relatively slow. From a technical standpoint, companies will have to rebuild their
Web sites to support these devices. Each screen of data will have to be carefully
designed, most graphics will have to be downsized, and the page navigation will
need to be simplifed. Because the keyboards are hard to use, the Web sites will
have to reduce the amount of data to be entered. The most recent 4G services are
relatively fast (particularly LTE offered by Verizon) as long as congestion stays
low. Higher speeds lead to new possibilities, including video; which might open
more opportunities for sales and marketing.
The real beneft of wireless connections is that they create new opportunities. If
people are connected everywhere (or at least in the major cities), a vast amount of
Figure 7.28
M-commerce tools. As cell phones and tablet computers converge, people can
connect to any business every place they go.
HTC Evo Motorola Xoom Apple iPhone
477 Chapter 7: Electronic Business
information becomes available at any time. Stores could instantly provide detailed
product information to customer phones. For B2B sales, a salesperson could in-
stantly retrieve data on competitor products, build charts, and transfer the presen-
tation to the customers system. Payments could be handled with wireless trans-
fers of secure code, digital signatures, or even biometric data.
M-commerce will have an impact even on businesses that choose to stay with
traditional sales methods. Consider a customer shopping for a product at a re-
tail store. The customer can instantly get comparative price quotes from a dozen
other sources and make an informed decision about whether to purchase the item
electronically and wait for it to arrive, or to pay a premium to take the product
home immediately. Several companies offer comparative shopping sites that make
it easy for customers to check prices on their cell phones. With GPS chips, cell
phones also provide the ability to expand location-based applications, including
advertising. For example, Google maps enables companies to advertise business-
es, such as restaurants, that are displayed on a map when the customer searches
for an address. With a little additional effort, the restaurant could offer coupons or
make it easy for customers to make a reservation or check waiting times.
A newer use of cell phones is to tie shopping into social networks. Several
companies encourage shoppersparticularly womento share potential purchas-
es with friends. For example, try on a piece of clothing virtually and let friends
vote. Even basic tasks such as reviewing products and recent purchases for your
friends to see might lead to increased sales.
Taxes
When do consumers and businesses pay sales taxes on the In-
ternet? Sales taxes present a problem in the United States. Most states tax sales
of products and services to obtain revenue to pay for public services. Many mu-
nicipal governments add their own sales taxes to cover costs of local services.
Consequently, over 7,800 separate tax districts exist, with the possibility of sev-
eral thousandbased on each city. The system works reasonably well for small
stores located in one district. But businesses that operate in more than one district
must register and fle tax forms within each district.
If the sales tax rate were the only issue, the situation might not be too bad. The
diffculties multiply because each district has different categories of products and
different taxable items. An item taxable within one district might not be taxed
within a second. A third district might place the item in a different category and
impose different taxes.
The interesting legal aspect of the taxes is that they are defned as use taxes
on the citizensand are supposed to be paid by consumers regardless of where
the product was purchased. Since consumers are generally slow to volunteer pay-
ments, the states require businesses to collect the taxes and forward them to the
appropriate agencies. This situation causes problems when the business is locat-
ed in a different state. At various times, states have attempted to require out-of-
state frms to collect the taxes, but the U.S. Supreme Court has always ruled that
the U.S. Constitution clearly forbids the states from taxing interstate commerce.
The fact that it is a constitutional issue is important, because it would require a
constitutional amendment to change the situation. Congress has discussed creat-
ing a simpler tax system, but it is unlikely that it will pass as a constitutional
amendment.
Local merchants often complain about the diffculty of competing with out-
of-state frms that do not have to collect taxes. However, these same frms could
478 Chapter 7: Electronic Business
sell into other states, so the issue could be neutral. Also, consumers who want to
touch the product and bring it home immediately are still going to buy from local
merchants. More important, state and local governments are concerned about los-
ing their tax base. If consumers shift more of their purchases to e-commerce, the
states will lose substantial revenue. For instance, consider the fact that Dell is one
of the leading retailers of personal computersrelatively expensive items. Yet
Dell has a physical presence in only a few states, so they do not collect taxes for
most of the sales. This multi-billion-dollar industry represents hundreds of mil-
lions of dollars of annual tax revenue to the states. On the other side, some large
companies, such as Cabelas (Idaho Statesman May 8, 2007), have argued that
their mail/Internet companies are distinct subsidiaries from their physical stores;
and sales from the Web site remain nontaxable, even when a physical store is
opened in a new state. Ultimately, states will have to increase other taxes to com-
pensate for this lost revenue. Since most economists consider an income tax to be
more progressive than sales taxes, the effect is not all bad.
Sales taxes on services are an even trickier issue. Since a large portion of the
GDP is based on services instead of product sales, many states have begun taxing
services. In 2003, Congress allowed the federal moratorium on Internet taxes to
expire. States are now free to charge taxes on Internet connections. Just as you
now pay several dollars a month in taxes and fees for telephone service, you might
be asked to pay more for your Internet connection.
Global Economy
Does the Internet create a global marketplace? E-commerce has the
potential to open up the global economy. Theoretically, anyone with access to the
Internet can purchase products directly from anywhere in the world. However,
actual practice cannot live up to the expectations of theory. Three major issues
still limit international trade: (1) transportation costs, (2) national policies, and (3)
payment and trust limitations.
Transportation costs will always exist, but they can be relatively high for in-
dividual orders. International bulk shipments are considerably more economical,
Reality Bytes: How Do People Communicate?
Texting, or short-message service (SMS), grew to huge volumes in the 2000s.
In the second half of 2010 alone, U.S. cellphone users sent more than 1 trillion text
messages. Although the number seems huge, it actually represents a slowing of the
growth of text messages. Eelco Blok, CEO of Dutch provider Royal KPN NV, noted
that the companys youth-oriented brand saw an 8 percent decline in SMS messages
in the frst quarter of 2011. As the number of smart phones increases, vendors are
adding apps to send text messages over Internet connections, bypassing the phone
company SMS system. This distinction is critical to the mobile phone carriers.
AT&T and Verizon, the biggest carriers, charge $20 a month for unlimited texting.
This huge price provides at least an 80 percent proft margin, compared to 35 percent
for data or voice. If customers switch from texting, carriers will need to make up the
lost revenue through data prices.
Adapted from Anton Troianovski, Carriers Sweat as Texting Cools Off, The Wall
Street Journal, June 8, 2011.
479 Chapter 7: Electronic Business
so there will always be an incentive for retailers to purchase in bulk and resell
individual items. Transportation companies consolidate shipments to reduce costs,
but customers often want products relatively quickly, and shipping by air is more
expensive than shipping by sea.
Nations have many different policies and taxes regarding imports and exports.
Most shipments have to go through a customs agent. Even digital products carry
restrictions. A few nations attempt to monitor and control all Internet usageto
the point of insisting that all Internet traffc be channeled through government
computers.
Think about the consequences if every nation imposed its will on Internet sales.
While individual nations do have the right to control sales within their territory,
it would destroy e-commerce if every nation imposed its control on all Internet
sales. As e-commerce increases in importance, more of these issues are going to
arise, and frms will need to have technology ready to handle them.
Global e-commerce is evolvingfrom many nations, you can buy English rug-
by jerseys from British vendors. But, the payment mechanisms need considerable
work. Many U.S. Web sites will not accept overseas shipments because the risk
is too great. Many companies will not sell to nations in eastern Europe, southeast
Asia, and the Middle East because the risks are even higher.
Cloud Computing
What are the costs for cloud computing? Many of the e-commerce
hosting methods rely on cloud computing. Today, most of the major providers of-
fer virtual machineswhere the hosting company runs massive server hardware
and hosts independent virtual machines that you can lease. In true cloud comput-
ing systems, you pay only for the machines when they are used and you can usu-
ally expand the capacities by adding more servers on demand. As shown in Figure
7.29, the basic cost structure can include: a fxed monthly fee, charges based on
processing, monthly data storage costs, data transfer in and out of the server, and
fees for databases or specialized software.
Amazon is one of the most advanced providers of cloud services. The company
offers three major services: virtual machines in the Elastic Cloud (EC2), data stor-
age with Simple Storage Service (S3), and a couple versions of database access.
Figure 7.29
Cloud computing cost structure. Most costs are variable and it is usually easy to scale
up the capacity. Costs will increase but they can be matched to increases in usage.
Fixed monthly fee
Cost per processing
Data storage costs
Data transfer in and out
Database/software fees
Examples:
Amazon: Elastic Cloud (EC2), Simple storage servive (S3)
Microsoft: Azure and SQL Azure
Rackspace
Equinix
480 Chapter 7: Electronic Business
Microsoft offers similar capabilities with Azure and SQL Azure. Amazon includes
calculators on the Web site to estimate monthly costs based on expected usage
rates. Data transfer costs are a large component of the total bill, but they typi-
cally increase only as the site usage increases. Presumably, increased use and data
transfer leads to more sales revenue to cover the costs.
Summary
E-business is a complex topic. On one hand, the Internet and mobile commerce
simply represent new ways to interact with customers and handle transactions. On
the other hand, they have the potential to change the economy and society. The
Internet continues to expand into more areas business and consumers lives. Busi-
nesses at all levels need to fnd new ways to connect to customers, while staying
on the right side of the thin line of privacywhich keeps moving.
Businesses have many ways to make money on the Web and with
mobile commerce, but ultimately, revenue comes from sales of prod-
ucts, sales of services, or advertising. Although anyone can make mon-
ey with advertising thanks to Google AdSense, currently a handful of
frms receive the bulk of Web advertising dollars. So, you should prob-
ably think about fnding ways to sell products and services.
Advertising on the Web is straightforwardbut also controlled
through a few primary sites. Google is the main advertising point on
the Web and it controls most of the keyword search ads as well as ban-
ner ads through DoubleClick.com. You should be able to use Googles
keyword tools to fnd keywords, estimate the bid prices for them, and
establish a daily advertising budget.
E-commerce sales can be analyzed in three phases: prepurchase,
purchase, and postpurchase. The prepurchase phase consists primar-
ily of advertising, providing specifcations, and product confguration
or selection. Purchase largely consists of handling the transactions, in-
cluding verifying the customer, protecting the data transmissions, and
handling the money transfer. Postpurchase support includes service,
problem tracking, and cross selling.
Developing and hosting Web sites is a relatively complex business.
Most companies choose to outsource these activities to specialists. How-
ever, it is relatively easy for small businesses to create a Web site and
begin selling items online. The Buy Now button approach is relatively
inexpensive and easy to experiment with. Web auctions are useful for
unique items, particularly when the value is uncertain. Amazon Web-
Store is a good alternative for small businesses that want to sell prod-
ucts online to an established set of customers, without the costs and
hassle of building a separate brand name. More complex sites, such
as Web services are still built with custom programming, but several
frms can help develop and host these new services.
Mobile commerce is similar to e-commerce, but the wireless capabili-
ties can provide some interesting applicationsparticularly for B2B e-
commerce. Sales taxes and the Internet are a challenging problem for
states. Ultimately, states will have to alter their tax systems. Similar
problems arise on a global scale. Many issues involving customer au-
thentication, payment validation, and national control need to be re-
solved before global e-commerce can seriously expand.
481 Chapter 7: Electronic Business
Key Words
Web Site References
Cloud Hosting
Amazon (EC2) aws.amazon.com/ec2/
Amazon (S3) aws.amazon.com/s3/
Microsoft Windows Azure www.microsoft.com/windowsazure
Microsoft SQL Azure www.microsoft.com/windowsazure/
sqlazure
IBM www.ibm.com/cloud-computing
Savvis (CenturyLink) www.savvis.com
RackSpace www.rackspace.com/cloud
A Managers View
Making money on the Internet is not easy, but it is possible. Internet sales
are increasing faster than sales through traditional channels. The challenge is
to use the Internet to increase your sales while still maintaining existing re-
lationships. New services are being created and the sales of digital products
are expanding. M-commerce offers the potential to provide another shift in
business and societybut it will be a while before the hardware, networks,
and software become widespread enough to make a difference. You need
to understand how customers use Web sites to purchase products. Attract-
ing customers or making money through advertising requires a thorough un-
derstanding of Googles keyword sales method. Developing basic sites and
fnding hosting companies for them is relatively easy. Creating custom ser-
vice applications is still diffcult. Choosing the right hosting approach is a
key step in getting online with an affordable system.
application service provider (ASP)
auction
bill presentation and payment
business to business (B2B)
business-to-consumer (B2C)
catalog management system
click-through rate
co-location
commerce server
content management system
digital rights management (DRM)
disintermediation
e-business
intellectual property
near feld communication (NFC)
search engine optimization (SEO)
simple object access protocol (SOAP)
social networking
static HTML
Web 2.0
482 Chapter 7: Electronic Business
Review Questions
1. What types of products are easy to buy online and which ones are diffcult to
sell solely online?
2. What are the potential benefts and costs to disintermediation that can be
accomplished with e-business?
3. How does B2B differ from B2C e-commerce?
4. How does EC differ in the three areas of prepurchase, purchase, and
postpurchase?
5. How do Web 2.0 sites make money?
6. What are the primary payment risks in e-business and how do frms reduce
the risks?
7. What options are available for promoting a Web site?
8. What choices do advertisers need to make when dealing with keyword ads?
9. What options are available for building and hosting Web sites?
10. How do people use cell phones when making purchases?
11. Many people were concerned that by not requiring EC frms to collect sales
taxes, traditional frms would eventually lose business and the states would
suffer large declines in tax collections. Why did this scenario not happen?
Might it still happen in the future?
12. What problems make it diffcult for EC to be global?
Exercises
1. Choose a non-digital item that can be purchased online. Find at least three
sources for it and compare the prices. How can different prices exist for the
same item?
2. Using the Web or by talking to retailers, fnd a company that only sells
through retailers. Or, fnd a company that sells direct, but only at list price.
What characteristics of the product and industry support or encourage this
choice?
3. How can the Web site Twitter make a proft?
4. Choose an industry and assume you are running a Web site for a company
in that industry. Select keywords that you might use to advertise your Web
site. Estimate the amount you would be willing to bid for Google ads on the
keywords and specify a budget. Hint: How many people who click-through
an ad will become customers?
5. Select a Web site and identify the prepurchase, purchase, and postpurchase
elements.
6. Check with a Web advertising site and identify the cost to run a banner ad on
the site. Specify the type of ad and the number of times to run.
483 Chapter 7: Electronic Business
7. Obtain the fnancial statements from a publicly traded social network site and
identify the major sources of revenue and costs.
8. Research PayPal from the perspective of a vendor and briefy describe what
happens if a consumer claims that they never made a purchase that has
already been shipped.
9. What percentage of apps in the mobile market are for games, books, or
entertainment?
Technology Toolbox
10. Select one of the major Web server tools and identify how it handles multiple
languages.
11. Find a reference that identifes the percentage of sites based on Microsoft
Web servers.
12. Check your schools course catalog or talk with instructors in computer
science and MIS to see which Web technologies are taught at your school.
Also check a local community college catalog.
13. Use Dice.com to compare the number of jobs available for the three main
Web technologies.
14. Find current costs for processing credit cards through (a) PayPal, (b) Google,
(c) an independent merchant processor.
15. Find the current VISA merchant security requirements if your Web site
handles credit card data directly. Estimate the costs of complying with the
requirements if you are a small merchant.
Teamwork
16. Search for a common product such as a camera and choose three Web sites
with at least one of them from a small company. Compare the three sites in
terms of their support for purchase, pre-purchase, and post-purchase support;
and their use of social networks.
17. Have each person choose a different item for sale on eBay that has similar
items for sale at retail stores or other Web sites. Compare the fnal eBay price
to the other prices. Summarize the differences for the team.
18. Assume that a friend wants to start an online business selling jewelry. Have
each person fnd a hosting company that could handle the site. Identify the
costs and tools provided by each company. Share the results and choose one
to recommend to your friend. Briefy explain the basis of the decision.
19. Assume the team wants to create a new cell phone app. Find estimated data
on prices and sales for existing apps. Estimate the costs of developing and
marketing an app and use the data to estimate potential profts.
20. Choose a Web site. Evaluate all aspects of the site and write a plan to suggest
how it can be improved.
484 Chapter 7: Electronic Business
Rolling Thunder Database
21. Identify at least three areas in which Rolling Thunder Bicycles could proft
from e-business. Be specifc, and explain what technologies would have to be
added (for instance, Web hosting).
22. Find at least fve sites on which it would make sense to advertise Rolling
Thunder Bicycles. As much as possible, identify the advertising costs and the
demographics of the site visitors.
23. Develop a plan for expanding Rolling Thunder Bicycles into international
sales. Be sure to identify any potential problems, and discuss how you will
deal with them.
24. Develop a plan for creating a Web-based system for connecting to suppliers.
What software would you need? How can you convince the suppliers to
cooperate?
25. The management of Rolling Thunder Bicycles cannot decide on a Web
strategy. For the three main approaches (simple HTML, auctions, and
commerce server), list the primary strengths, weaknesses, and costs as they
apply to this company. Make a recommendation and briefy explain your
choice.
Additional Reading
Borzo, Jeanette. Online Micropayment Systems See New Interest but Face Old
Hurdles, The Wall Street Journal, April 3, 2001. [Decline of e-commerce
advertising revenue and increase in selling of content.]
CNN, Study: Four sites account for half of Web surfng, June 5, 2001.
[Dominance of a few large frms in attracting users.]
Collett, Stacy. Amid turf battle, some middlemen call for truce with online
rivals, Computerworld, April 16, 2001. [Discussion of role of middlemen
and disintermediation in e-commerce.]
Fireswick, Kris. The e-fles, CFO, February 2001. [Comments and analysis of
some lead managers of failed dot-coms.]
Matthews, Robert Guy. Web Firm Lures Steel Giants, The Wall Street Journal,
September 2, 1999. [Early auction site for the steel industry.]
Moss Kanter, Rosabeth, The Ten Deadly Mistakes of Wanna-Dots, Harvard
Business Review, January 2001. [Discussion of the e-Commerce failures.]
National Mail Order Association, 1998 Mail Order Sales Results, 1999, http://
www.nmoa.com/Library/1998sale.htm. [Statistics on mail order sales.]
Regan, Keith. Study: Era of E-Commerce Profts Underway, EcommerceTimes,
June 20, 2001, http://www.newsfactor.com/perl/story/11381.html.
[Summary of McKinsey study on e-commerce profts.]
Shopping around the web, The Economist, February 26, 2000. [Special section
on e-commerce.]
485 Chapter 7: Electronic Business
Stone, Martha L., U.S. cell phone technology lags Japan,Europe, mediainfo, June
7, 2000,
http://www.mediainfo.com/ephome/news/newshtm/stories/060700n2.
htm. [Statistics on cell phone usage in several nations.]
Swisher, Kara. Web Retailers Faced Death; Now Can They Handle Taxes? The
Wall Street Journal, April 9, 2001. [Summary of issues on e-commerce sales
taxes.]
Cases: Retail Sales
Te Industry
The retail sales industry includes a broad variety of products, but regardless of
the product, several fundamental issues apply. You need to remember that retail-
ers play three critical roles in selling products. The frst is locationretail stores
succeed by displaying and delivering products where the customers are located.
The second is customer service. Many customers need help choosing products
and need reassuranceparticularly when buying large items. Retail stores also
0
50
100
150
200
250
300
350
400
450
1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010
B
i
l
l
i
o
n
$
Annual Revenue
Wal-Mart
Sears
SuperValu
Amazon
-0.7
-0.6
-0.5
-0.4
-0.3
-0.2
-0.1
0
0.1
0.2
1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010
R
a
t
i
o
Net Income / Revenue
Wal-Mart
Sears
SuperValu
Amazon
486 Chapter 7: Electronic Business
handle returns and take care of any problems that might arise with a product. The
third major role played by retailers is to spread the sales risk. Generally, retailers
purchase items in bulk. If the items do not sell, the retailer marks down the prices
until they are sold. But, the retailer decides which items to carry and what fnal
price to charge, so the retailer takes the loss if products do not sell well. These
three services are important to manufacturers. As part of the economics of special-
ization, manufacturers can concentrate on building products, retailers can focus
on customer service, and both frms come out ahead.
Transactions
Tracking sales of individual items and recording transactions are critical factors
in retail sales. Originally, retail frms tracked fnal sales only for themselves. They
used the information to help decide when to reorder and when to cut prices. Since
the retailer sits in the middle between suppliers and customers, the retailer par-
ticipates in several types of transactions. Consequently, retailers built important
accounting and inventory systems. Recording transactions with customers is rela-
tively easy in theory. The challenge is to keep the costs as low as possible, which
is why retailers continually experiment with technology at the checkouts. The re-
tail sales transactions also have to be accurate and secure. Because retailers are
generally responsible for collecting sales taxes, the systems also have to maintain
adequate audit trails for the state examiners. Retailers also have to track purchases
from suppliers. The actual purchase is not that diffcult to track, but they also have
to monitor shipping and fnancing costs. Moreover, there are always special or-
ders, and someone has to match received items to orders, monitor quality, and
often track down missing or incorrect orders. Increasingly, retail stores also have
to build transaction systems to handle the fnancial aspects as well. As more cus-
tomers switch to digital payment systems (debit cards), retailers have to work with
banks to validate card numbers, verify account balances, and transfer the transac-
tion totals. The detailed fnancial system must also be able to go back and provide
documentation for possible fraudulent transactions.
Supply Chain Management
Today, led by Wal-Mart, the emphasis is on the entire supply chain. A key aspect
to reducing costs and improving the proft margin is to minimize the items held in
inventory. Or, in retailer accounting language, maximizing inventory turn (over).
The ultimate goal might be a just-in-time replenishment system: just as a custom-
er buys an item from the shelf, a new one shows up at the loading dock. Of course,
this perfect system is almost impossible. But the proftable stores get closer every
year. One key is the ability to forecast exactly which products customers are go-
ing to buy, and then build a supply chain so that the right products are delivered
on time. Transaction information is a key element in supply chain management.
Retailers share their daily sales data with manufacturers, so manufacturers can
forecast demand and fne-tune their delivery times.
Supply chains often suffer from what is called the bullwhip effect. A small in-
crease in sales causes retailers to forecast an increase in demand and bulk order
more of the product from their distributors. If the increase arises from several
stores, the distributor also sees an increase in demand and orders more products.
In the meantime, the stores perceive a shortage that is not being flled by the
distributor, so they increase their orders even furtherto hoard the product and
ensure deliveries. The manufacturer sees a giant increase in demand and starts
487 Chapter 7: Electronic Business
cranking up capacity. The initial small increase in demand has been magnifed as
it moves up the supply chain. Ultimately, the manufacturer over-compensates and
the supply increases too far, raising costs for everyone and depressing prices as
the retailers mark down the item to get rid of it. Of course, the fuctuating prices
send the wrong signal to customers and can start the cycle all over again. One way
to minimize the bullwhip effect is to make sure that all participants have access to
the original data on customer demand and that everyone uses the same forecast.
Retailers generally support this approach and share their sales data with manufac-
turers (Hugos 2003).
Of course, a large retail store carries tens of thousands of products and has a
few thousand suppliers. So, the retail store needs to be able to integrate with thou-
sands of different systems, or at least provide data in some common format. The
massive volume of data also presents problems for storage, access, and transpor-
tation across networks. Ultimately, the stores that succeed in handling these data
volumes at the least cost are the ones that have prospered.
Additional Reading
Hugos, Michael, Essentials of Supply Chain Management [book excerpt],
Computerworld, March 24, 2003.
Case: Wal-Mart
Wal-Mart (ticker: WMT) represents a classic business technology case. Empha-
sizing customer service and low prices, the company pushes its suppliers hard.
Founder Sam Walton realized early that computers would play an important role
in these goals. In the mid-1960s, computers were used to handle basic accounting
functions. Counting inventory was still painful because the tools were not avail-
able. It was not until 1983 that item-level bar codes were available on the majority
of products. Each product was assigned an identifer or stockkeeping unit (SKU)
and a standardized bar code. At that point, Wal-Mart installed point-of-sale ter-
minals and was able to track inventory based on the sales. In 1987, the company
used a satellite system to link all of the stores to company headquarters. The sys-
tem enabled the company to compile real-time inventory data (Dateline 2002).
To reduce the inventory levels, Wal-Mart knew it needed to enlist the cooperation
of its suppliers, so the company instituted the collaborative planning, forecasting,
and replenishment (CPFR) program to share data with its suppliers. Pete Abell, re-
tail research director at the AMR Research consulting frm, notes that Wal-Marts
margins can be far lower than other retailers because they have such an effcient
supply chain. He estimates that the company pays 5 to 10 percent less than its
competitors for products (Johnson 2002). The suppliers are willing to offer better
prices to Wal-Mart because sharing the supply chain management reduces their
costs as well. And it does not hurt that Wal-Mart is the biggest company in the
world with almost $250 billion in annual sales and more than 1.2 million employ-
ees (www.fortune.com global 500).
As Americas biggest employer and driven to be a price-leader, Wal-Mart seeks
new ways to reduce labor costs. In 2007, the company implemented a new com-
puter scheduling system that evaluates historical patterns and slots employees to
cover the busy times and then sends them home during periods with fewer cus-
tomers in the store. In the process, employees no longer have set schedule shifts.
488 Chapter 7: Electronic Business
Instead, they pick up a few hours each day. The system will also improve com-
pliance with federal wage and hour lawsperhaps reducing the lawsuits against
Wal-Mart. (Maher 2007).
Supply Chain Management
Wal-Mart led the industry in improving its supply chain to reduce costs. Its in-
credibly effcient distribution centers are one part of the story. Bulk shipments
arrive from vendors at one side of the distribution center. For example, a large
truck might be full of identical boxes of laundry detergent. The contents of the
truck are unloaded and placed on a conveyor belt. The products are routed through
the distribution center to the other side where a mixed load of multiple items is
placed into another truck. This load might contain some laundry detergent, toys,
and clothes. The mixed load is then taken to a specifc store. The computer-con-
trolled distribution center knows exactly which items need to be shipped to each
store and loads the trucks accordingly. The system runs by reading the individual
bar codes and shifting products to different belts.
In 2003, Wal-Mart shocked many people when it announced that its top 100
suppliers would have to switch to radio frequency identifcation (RFID) chips in
2005. Initially, the RFID tags would apply only to pallet loads of products. The
tags provide some signifcant advantages over bar codes in the warehouse. They
can be read from farther away and do not require perfect line of sight. Multiple
tags can be read at the same time (if boxes are stacked together). They are less
susceptible to damage. An important issue is that they can contain more data. This
last factor is important because it would enable Wal-Mart to electronically record
and track the receipt of individual shipments. Bar codes allow it to track only the
specifc product. A person has to manually match the shipment with the specifc
order. The main drawback to the RFID approach is cost. Bar codes are essentially
free, since they can simply be printed on the box or a label. RFID tags in 2003
cost around 50 cents each. Wal-Mart is hoping that by forcing suppliers to adopt
the tags, the bulk demand will convince manufacturers to expand capacity and re-
duce prices through economies of scale. Wal-Marts target is 5 cents per tag, and it
anticipates that about 1 billion tags will be needed initially (Vijayan 2003).
It is risky to be on the leading edge of technology. Standards are not yet in
place and costs are relatively high. The lack of standards is a substantial problem
in the international marketplace. As of mid-2004, many Chinese manufacturers
were waiting for an RFID standard to be approved before agreeing to use RFID
tags. Consequently, some companies might end up having to add the RFID tags
after the product reaches the United States (Sullivan June 2004). Several groups
have also raised concerns about privacy issues if RFID tags are moved to indi-
vidual products. Although the tags can be read from only a limited range of a few
feet, some people expressed concerns about stores being able to track people by
tags placed in their clothes. And if not enough suppliers and distributors install the
hardware and software to take advantage of the tags, the entire experiment could
be an expensive trial. Some experts were suggesting that as many as 50 percent
of these trials would fail. Nonetheless, Linda Dillman, CIO of Wal-Mart, observed
that the retailer believed it needed to stay on the leading edge of technology. It
was important to try technologies that might help, even though the technology
eventually might not be useful (Sullivan July 2004). Initial trials with Kimberly-
Clark were successful. In April 2004, the company shipped pallets of its Scott pa-
per towels with RFID tags through Wal-Marts scanners. But Kimberly-Clark has
been working toward the RFID system since 2001 (Bacheldor 2004).
489 Chapter 7: Electronic Business
By early 2006, more than 300 suppliers were using RFID tags on products
shipped through fve distribution centers to 500 Wal-Mart stores. Carolyn Walton,
VP of information systems noted that out-of-stock items with RFID tags were
replenished three times faster than before and the amount of out-of-stock items
requiring manual intervention dropped by 10 percent. We see this as a continual
process in an effort to focus on bringing our customers what they want (Songini
2006). The company intends to push the use of RFID tags through all of its pro-
cesses. A typical truck delivery carries 7,000 boxes that have to be unpacked and
organized. Wal-Mart plans to provide employees with wearable devices that can
identify high-priority boxes that need to be unloaded immediately.
Collecting RFID data internally solves some problems, but Wal-Mart is push-
ing for tighter integration of the supply chain by asking suppliers to share data
on the Global Data Synchronization Network (GDSN). The GDSN system builds
pools of XML-based data for specifc industries and stores. Supplies and mer-
chants upload data and synchronize their own systems so everyone has the current
data (Songini 2007 and www.gs1.org).
In 2010, Wal-Mart rolled out RFID tags to track individual clothing items. Ini-
tially, the clothing items will contain removable smart tags. Raul Vazquez, the
Wal-Mart executive for the Western U.S. noted that This ability to wave the
wand and have a sense of all the products that are on the foor or in the back room
in seconds is something that we feel can really transform our business. Wal-Mart
also expects the technology to cut down on employee theft because it will be eas-
ier to see which items are missing. Wal-Mart subsidized some of the costs to the
suppliers to ensure adoption by its major suppliers (Bustillo 2010).
Tighter Integration with Manufacturers
Procter & Gamble sells $40 billion of household products every year. You know
most of their brand names. Despite the use of information technology and elec-
tronic ordering systems, Steve David, the CIO, pointed out that returns from retail
stores cost P&G $50 million a year. Problems arise from incorrect orders, dam-
aged products, and inaccurate shipments (Stahl 2003).
How can so many problems exist in an electronic system? One of the problems
is that every company has a different description and ID number for every product.
For example, P&G might have an internal ItemID for a tube of Crest toothpaste.
But Wal-Mart will assign a different SKU to each specifc size and favor. The
Wal-Mart database might even have a different description for the product than
that used by Crest. Both companies probably have even more numbers to describe
bulk orders or boxes of toothpaste. Relying on people to match the descriptions or
to fnd items in a catalog or Web site is time consuming and easily causes errors.
And manufacturers tend to continually introduce variations or new products and
change the numbers. The consulting frm A.T. Kearney estimates that 30 percent
of the information in catalogs is incorrect at any point in time (Konicki 2002).
P&G alone sells around 60,000 different items.
One answer is to ensure that everyone uses a single standard description and
ID of every product. But you have to get all of the manufacturers and retailers
to agree to use the system, and someone has to pay for its maintenance. The cur-
rent answer is the UCCnet registry. It is a not-for-proft subsidiary of the Uniform
Code Council (UCC). Ultimately, it makes money by charging manufacturers and
retailers an annual fee to use the system (www.uccnet.org). Each item listing con-
tains 62 pieces of product data. By placing it in a single location, all merchants
490 Chapter 7: Electronic Business
can synchronize their databases to the manufacturers standard. Errors are reduced
when everyone works from the same clean database (Meehan 2002).
With more accurate data, Wal-Mart can rely on EDI to place most of its or-
dersreducing the costs and time of having employees manually enter each or-
der. EDI has been around since the 1980s, but it carried a high cost because most
of the transactions were on private VAN networks that are expensive. In 2003,
Wal-Mart began encouraging suppliers to switch to an Internet-based EDI system.
To ensure security, most merchants are using the electronic data interchange In-
ternet integration applicability statement 2 (AS2) standard. AS2 provides security
through certifcate-based encryption. Merchants and producers can use the system
either through a Web browser or through low-cost client tools that will connect to
their ERP systems (Scheier 2003).
Competition
Competition in discount retail is stiff. Wal-Mart has literally grabbed most of the
market from other retailers. For comparison, look to Kmartwhich was domi-
nant through much of the nation before Wal-Mart. Because the company did not
have the supply chain management systems, and because it did not have the data
to forecast customer demand, its stores rarely had the products in stock that cus-
tomers wanted. Ultimately, it fled for bankruptcy protection because it could not
compete against Wal-Mart and Target. In 2000, the Kmart CEO announced that
he would spend $1.4 billion on technologymore than the company had spent
in an entire decade. The company burned through fve CIOs in seven years and
went without one for almost two years. The company also had to take a $130 mil-
lion write-off of supply chain software and hardware that did not work properly.
Although spending the money earlier on technology might not have saved Kmart,
it is clear that it has provided a competitive advantage to Wal-Mart (Sliwa 2002).
Smaller stores have found ways to use technology to compete with Wal-Mart.
Smart & Final, a California-based chain with 225 stores has installed in-store
technology to display prices and handle all data processing. The system analyzes
demand and can adjust product prices on-the-fy without the need to print new
labels or reprogram POS terminals. It also provides immediate sales data to sup-
pliers with real-time access to inventory. Bob Graham, vice president of stores
technology noted that using technology like this is the best way to go up against
a particular big company [Wal-Mart] that is taking over the world (Hall 2004).
In 2010, Wal-Mart began experimenting with a new technology within its
Sams Clubpersonalized discounts for individual customers. The eValues pro-
gram runs primarily from a kiosk inside the store. Customers log into the kiosk
and the system prints a set of coupons specifcally aimed at that customer with
discounts on individual products. The members can also get e-mails and view
coupons on the Web site. The system analyzes prior member purchases to predict
what products each customer might buy and how much discount should be offered
(Martin 2010).
Privacy
Wal-Mart collects a huge amount of transaction data, data that includes detailed
information on everything customers purchase. Unless payment is made in cash,
the Wal-Mart databases also identify the individual purchaser. This data can pro-
vide useful insights to manufacturers and marketing companies. In 2001, three
retailers (CVS, Kmart, and Wal-Mart) decided to pool their pharmacy sales data
491 Chapter 7: Electronic Business
and sell up-to-the-minute numbers to drug manufacturersin exchange for a few
million dollars in fees. However, Wal-Mart also made a decision to stop selling
general sales data to market research companies. A Wal-Mart spokesman notes
that our competitors were getting more out of the third-party aggregation than we
were, so it made more sense for us to stop (Rendleman 2001).
Financial Transactions
On March 31, 2004, Wal-Mart spotted a problem: 800,000 shoppers were over-
charged on their credit and debit cards. The transactions were double- or triple-
billed due to a hardware error. First Data Corporation, which clears fnancial
transactions for Wal-Mart, noticed the problem when reviewing one of its qual-
ity control logs. The company reversed the duplicate transactions, but Wal-Mart
put up notices to customers to double-check their statements (DAmbrosio 2004).
First Data blamed the error on a computer glitch, but did not provide details.
In 2010, Wal-Mart announced that it would replace all of its payment terminals
in the U.S. with a version that supports smartcard technology. Smartcards contain
a chip to provide additional information, including a PIN; and they are commonly
used in Europe. To date, U.S. banks and other vendors have resisted switching to
the smartcards; largely because of the costs (Vijayan 2010). It is not known if the
terminals will also support near-feld communications (NFC); which are likely to
be the primary method adopted for cell phone payments.
Online
Wal-Mart has several online systems in place, but they provide only a tiny fraction
of sales. Yet the site does get traffc. A test of the site for the 2003 holiday season
showed that it was being used somewhat over its capacitymaking it sluggish.
The site was ranked19th of 20 Web sites. Consumers had to wait an average of 54
seconds to complete an online transaction (Rosencrance 2003).
Somewhat surprisingly, in 2003, Wal-Mart introduced an online music ser-
vice that charges 88 cents per song11 cents less than the leading site by Apple.
Songs are being provided by Anderson Merchandisers, which acquired Liquid Au-
dio, one of the innovators in digital music. With a somewhat limited selection of
songs, it remains to be seen whether customers will use the service (Bartels 2003).
Wal-Mart also tried to compete with NetFlix and offer DVD rentals by mail for a
monthly fee. That operation was folded after a year of weak demand.
Over time, Wal-Mart recognized that its Web site was not an effective method
of selling products. Linda Dillman, executive vice president, stated at the end of
2005 that weve changed our dot-com presence. The company now views the
Web site as a marketing tool. Eventually, the retailer hopes to add online software
to help customers organize their data and prepare for trips to the store, particularly
in terms of the pharmacy and health care areas (King 2005).
Moving in a slightly different direction for Wal-Mart, its Sams Club division
started selling a digital health records system to physicians in 2010. The package
deal bundled Dell computers with software from eClinicalWorks. The package
includes software, maintenance and training and is priced based on the number of
doctors in a practice (Lohr 2009).
IT Development
Unlike many of todays large companies, Wal-Mart tends to develop most of its
own software. The company is leery of commercial packages because it does not
want to be held hostage by the software vendor. The CIO of Wal-Mart also em-
492 Chapter 7: Electronic Business
phasizes that developers have to understand the users tasks before creating soft-
ware. Just developing something does not mean it will actually be used. Conse-
quently, before the IT staff creates and deploys an application, developers have to
work in the real job. For example, if someone is going to rewrite a point-of-sale
application, he or she has to work for a couple of days as a cashier. That way,
developers learn what issues are important and what problems need to be solved
(Schrage 2003).
Questions
1. Why are some people upset about RFID tags? Are their fears justifed?
2. What does the UCCnet project do and why is it so important to retailers?
3. Why did Wal-Mart stop selling some transaction data and will it affect the
company in the future?
4. What is the role of Wal-Marts Web site? Is it a useful tool?
5. Should Wal-Mart continue to rely on developing its own software?
6. What are the benefts and costs to having developers work in a functional
area before creating new applications?
Additional Reading
Bacheldor, Beth, Kimberly-Clark On RFID Trial: So Far, So Good,
Information Week, May 17, 2004.
Bartels, Chuck, Wal-Mart Begins Testing Online Music Service, Information
Week, December 18, 2003.
Computerworld, Dateline: A Timeline Of Technology Advances At Wal-Mart,
September 30, 2002.
Bustillo, Miguel, Wal-Mart Radio Tags to Track Clothing, The Wall Street
Journal, July 23, 2010.
DAmbrosio, Dan, 800,000 Cards Overcharged At Wal-Mart, Information
Week, April 5, 2004.
Hall, Mark, Retailer uses Technology to Defend Against Wal-Mart,
Computerworld, March 9, 2004.
Johnson, Amy Helen, A New Supply Chain Forged, Computerworld,
September 30, 2002.
King, Julia, Wal-Mart to Add 250 IT Jobs, Expand Online Presence,
Computerworld, December 2005.
Konicki, Steve, Shopping For Savings, Information Week, July 1, 2002.
Lohr, Steve, Wal-Mart Plans to Market Digital Health Records System, The
New York Times, March 10, 2009.
Maher, Kris, Wal-Mart Seeks New Flexibility in Worker Shifts, The Wall Street
Journal, January 3, 2007.
Martin, Andrew, Sams Club Personalizes Discounts for Buyers, The New
York Times, May 31, 2010.
493 Chapter 7: Electronic Business
Meehan, Michael, UCCnets Promise: Synchronized Product Data,
Computerworld, June 10, 2002.
Rendleman, John, Customer Data Means Money, Information Week, August 20,
2001.
Rosencrance, Linda, Report: Some Retail Sites Strained By Online Shopping
Surge, Computerworld, December 3, 2003.
Scheier, Robert L., Internet EDI Grows Up, Computerworld, January 20, 2003.
Schrage, Michael, Dont Trust Your Code To Strangers, Computerworld,
September 18, 2003.
Sliwa, Carol, IT Diffculties Help Take Kmart Down, Computerworld, January
28, 2002.
Songini, Marc, Wal-Mart Details its RFID Journey, Computerworld, March 2,
2006.
Songini, Marc, Wal-Mart Pushing Data Synchronization Network,
Computerworld, January 2, 2007.
Stahl, Stephanie, Editors Note: Effciency Leads To Lower Costs, Information
Week, June 16, 2003.
Sullivan, Laurie, China RFID Standards Are Eagerly Awaited By U.S.
Manufacturers, Information Week, June 21, 2004.
Sullivan, Laurie, RFID Will Go Through Growing Pains, Information Week,
July 2, 2004.
Vijayan, Jaikumar and Bob Brewin, Wal-Mart To Deploy Radio ID Tags For
Supply Tracking, Computerworld, June 12, 2003.
Vijayan, Jaikumar, Wal-Mart to Support Smartcard Payments, Computerworld,
May 21, 2010.
Case: Sears, Roebuck and Co. and Lands End
As one of the earliest mass merchandise stores, Sears (ticker: S) has a major place
in the history of business in the United States. Richard Sears opened his frst store
in Chicago in 1887 selling watches and jewelry. In 1896, he began shipping the
general catalog that made the company famous. In 1993, the company stopped
distributing the general catalog because of the production and mailing costs. Its
Craftsman tools and Kenmore kitchen appliances are household icons. In the
1980s and 1990s, Sears acquired several frms that were unrelated to its primary
mission. For example, in 1981 it acquired the brokerage frm Dean Witter as well
as the Coldwell Banker real estate company. By 2003, the company had divested
all of those frms to concentrate on sales (www.searsarchive.com).
Gary Comer founded Lands End in Chicago in 1963 with a couple of friends to
sell yachting hardware. Over time, the company expanded into luggage, moved to
rural Dodgeville, Wisconsin, and took off with direct sales of clothing through its
catalogs, telephone operators, and the best guarantee in the business (www.land-
send.com). In 2001, Lands End had revenues of about $1.6 billion compared with
494 Chapter 7: Electronic Business
$41 billion for Sears (Weiss 2002). In 2002, Sears purchased Lands End for $1.9
billion. However, as a wholly-owned subsidiary, the company remains relatively
independenteven down to its information technology systems. The merger has
had some interesting effectspartly of the success of Lands End and the number
of Lands End executives who gained power at Sears.
Lands End used technology to boost sales. In 2001, the company noticed that
it was losing sales because products were not in stock. So, in 2002, the company
built an inventory-management workbench. The data warehouse system uses an
analytic engine to monitor sales and create reports. It automatically alerts sales
managers when popular items need to be restocked. The system links to seven-
year sales histories in the Lands End IBM DB2 database. It even contains re-
gional weather data so it can determine why sales of raincoats or parkas increased
in an area. With its success, the company created another workbench to help with
business-to-business sales, and a third one to help schedule workers in the ware-
houses (Whiting 2003). In addition, the Lands End Web site introduced several
innovative features.
Online
As a direct merchant, Lands End presented several innovations. One of its more
powerful tools is its virtual model. Customers enter some basic measurement
data into the Web site and the system draws a 3-D model to match their body
type. From that point, customers can have the model display combinations of the
clothes to see how they might ft. Extending on its telephone-based personal ser-
vices, the Web site also has a personal shopper service. When new styles are re-
leased, the personal shoppers recommend combinations to shoppers based on their
preferences and prior purchases.
Lands End built its company by establishing strong relationships with suppli-
ers around the world. These ties enabled the company to offer custom clothing
through its Web site. In 2001, the company began offering custom Chino pants for
$54 online, compared with standard prices of $30-$40. By 2004, the company was
offering custom dress shirts or blouses, dress pants, and jeans as well. In addition
to basic measurements, the Web site asks customers to choose among basic body
types. The company then has the shirts or pants built to the specifcations in a few
days. The customization feature is useful because the top reason for returns is that
clothing does not ft properly (Swanson 2001).
Lands End quickly learned an important lesson about Internet sales: you still
have to provide good customer service, so the Web interface does not necessarily
save money. On the other hand, the level of service provided by Lands End is
amazing and generally exceeds that provided by most merchants. For example, a
customer called to buy clothes for his wife for Christmas. He had already ordered
a charcoal-gray blazer and slacks. He wanted to know if a skirt on a different page
would match. The customer service representative put him on hold and quickly
called a personal shopper, who pulled both garments from a rack and compared
them to see that they did not match. In 96 seconds, the service representative was
back on the phone with the caller with a suggestion for a different skirt that did
match and a decision to ship the skirt at no extra shipping costs, since the frst
items were ordered a scant 12 hours earlier. Although the order was placed over
the phone, the same level of service is available online. Bill Bass, vice president of
electronic commerce, notes that one of the great fallacies of the Internet is [that]
youll save on customer service costs because customers [will] serve themselves.
495 Chapter 7: Electronic Business
But reducing service costs is not really an important issue to Lands End. Instead,
the company would like to reduce the cost of printing and mailing its 250 million
catalogswhich accounts for 41 percent of its operating costs (King 1999).
The site also offers the ability to shop with a friend. A customer shares a Web
site with a friend in a different location. The two see the same products and can
communicate via a chat session. To Lands End, it is all part of customer service.
One of the tools that Lands End needed help with is the search engine. Ac-
tually, few Web sites have had good search engines. Although companies like
Google make their search engines available to commercial sites, they are designed
to search static Web pages and not product databases. Specialty search companies
such as EasyAsk and Endeca have created search engines that enable customers
to ask questions in natural languages (e.g., English). The system then searches the
database for the best matches (Sliwa 2002).
In 1999, Lands End launched a global Web site, building the site on IBMs
Websphere platform and partnering with Berlitz to handle the initial translations.
By 2001, 14 percent of the total sales were outside of the United States. The frst
sites they added were Japan, the UK, and Germany. A few months later, they add-
ed Ireland, France, and Italy by cloning the UK site. Sam Taylor, vice president of
international operations, notes that to launch the French site, it cost us 12 times
less than the UK site, and to launch Italy, it cost us 16 times less. Thats the beauty
of the Internet. Its so scalable (Sliwa 2001). He also observed that it is consider-
ably cheaper to reach customers via the Internet than through printing and mailing
catalogs. However, he also pointed out that the company should not have created
the Japanese site frst. Theres nothing worse than when your programmers are
making changes, and they look at the site to see if it works and they cant read it
[Sliwa 2001].
In 2009, watching sales shrink at traditional stores, Sears began pushing new
Web sites and new ways of purchasing products. For instance, the MyGofer.com
site lets customers order items and pick them up at a local store on the same day.
Common products include groceries, prescriptions, pet food, and some electronic
items (Bustillo and Fowler 2010). A similar process can be used to order items
and pick them up at a local Sears store. Executives say that online sales have in-
creased by double-digits, reaching $2.7 billion in 2008. Edward S. Lampert who
purchased and merged K-Mart and Sears is reportedly more willing to spend mon-
ey for online ventures than trying to save the local stores.
Te Merger
Sears knew that its clothing division was in trouble, even though they sold $4.7
billion of apparel a year. And with the divestiture of its credit card and other unre-
lated operations, the executives knew that clothing sales had to be turned around.
The merger with Lands End, one of the most successful direct clothing mer-
chants, gave them the opportunity to fx the problem. The Lands End executives
were given control over the Sears clothing department.
Although it was expected, trouble began brewing between the two cultures.
The Lands End group was used to making fast decisions informally. The Sears
bureaucracy had multiple levels of red tape. Sid Mashburn, Lands Ends vice
president of design and now design chief at Sears as well, refers to the main head-
quarters as the Battlestar Galactica and suggests giving out machetes at the
door to cut through the ingrained procedures. He might have been referring to the
29,000 pages of company guidelines that Sears once had (Merrick 2004).
496 Chapter 7: Electronic Business
When the Lands End merchandise was frst brought into the 870 stores, sales
were weak. Placing $139 cashmere sweaters next to $17 sweatshirts did not help
sales of either item. Customers were confused about where to fnd items. Also,
Lands End executives did not have data on what items would sell, or characteris-
tics of the shoppers. Several items had to be marked down at the end of the season
to clear out the inventory.
Jeff Jones, originally chief operating offcer at Lands End, asked if he could
purchase data mining software to analyze customer purchases. Executives said
that Sears did not use those tools. After some behind-the-scenes negotiations,
Jones was fnally able to get the tools. Using the software, he was able to learn
that the store needed to target more upscale customersthose with incomes of
$50,000 to $100,000 or more. Other merchandising experts from Lands End have
been brought in to retarget all of the clothing lines and identify the primary cus-
tomers. Mindy Meads led groups to picture an image of a representative customer
for each of fve brands of womens clothing sold at Sears. This routine exercise
and the data mining were things that Sears had neglected for years (Merrick 2004).
In March 2005, Kmart purchased Sears. The combined companies are run un-
der the Sears Holdings Corp. name. Karen Austin, the CIO from Kmart was made
CIO of the new company (Sliwa 2005).
Technology
In 2002, Sears purchased a huge storage area network from EM to handle a new
customer relationship management database. The system will include 95 terabytes
of new storage. It will be used to combine data from several inventory databas-
es and existing data warehouses. The system is designed to give the company
the ability to examine purchases by customers within the store and over time. As
Jonathan Rand, director of merchandise planning and reporting, commented, the
company needs to make sure customers fnd the merchandise and service they
want in our stores, while eliminating what they dont want faster than the compe-
tition (Mearian 2002).
Because the Lands End division continues to run as a separate subsidiary,
Sears did not attempt to merge their information systems. Their Web site and in-
ternal systems remain as separate units. This decision minimizes interruptions and
avoids causing problems with a system that has been successful.
At the same time, Sears realized that it needed to overhaul its own informa-
tion systems. In 2003, Alan Lacy, the CEO of Sears, observed that weve got too
many point-of-sale systems, too many inventory systems, too many this, that, and
the other thing, because we basically allowed for many, many years each busi-
ness to do its own thing, which were not going to do anymore (Sliwa 2003).
However, he also recognizes the importance of keeping the successful Lands End
systems separate. In early 2004, Sears announced that it was installing 37,000
Internet-enabled IBM cashier terminals. The connected systems will enable Sears
to provide additional types of customer service (McDougall 2004).
In 2004, Sears signed a $1.6 billion 10-year outsourcing contract with Comput-
er Sciences Corporation (CSC). The main elements of the contract cover desktop
services, servers, networks, and system management of the Sears.com Web sites.
Management of the servers running the fnancial reporting and sales systems re-
mains outsourced to IBM. The Lands End operations remain completely indepen-
dent (Weiss 2004). Less than a year after signing the contract, the company ter-
minated the contractalthough Sears and CSC fought over the cancellation fees.
497 Chapter 7: Electronic Business
Sales reports for 2007 indicated substantial declines for both Sears and Kmart
stores.
Sears also made a decision to recentralize its IT staff. Up until 2003, the staff
was split into the various business units such as human resources or credit. The
company also moved to standardize its choice of hardware and software vendors.
The overall goal was to reduce the number of disparate systems. Cheryl Murphy,
vice president of IT operations and engineering, observed that were pulling the
IT staffs together to get operational excellence and to drive that into the company.
We want to fnd one way of doing things (Rosencrance 2003).
Suppliers
Sears has been successful in its automotive division in building a relationship with
Michelin. In a pilot test with GlobalNetXchange, Sears provides detailed real-
time sales data to Michelin. Sears had planned a sale on Michelin tires in June
2002, but even before the sale began, Michelin spotted a problem. Sales earlier in
the year had been higher than expected, and the sale would push even more tires
out the door. Michelin was forecasting that it would be short 5,000 tires. Since
Michelin had direct access to the sales and inventory data, and knew which sizes
were selling, the company was able to increase production before the sale began.
Hank Steermann, senior manager of supply chain for Sears, commented that this
is a way to manage the supply chain that is good for Sears, because were fulfll-
ing our commitment to customers, and its good for the supplier, because theyre
selling more units than wed planned (Konicki 2002).
Questions
1. How can Sears use information technology to improve the sales of clothing
particularly the Lands End items?
2. What are the benefts to centralizing the information systems and the IT staff
at Sears?
3. Given the benefts of centralization, why does every Sears executive keep
saying that they will not integrate the Lands End systems with the Sears
systems?
4. If Sears wanted to combine data from the Lands End fnancial system with
the main systems at Sears, how could they do it without actually merging the
systems?
Additional Reading
Bustillo, Miguel and Geoffrey Fowler, Sears Scrambles Online for a Lifeline,
The Wall Street Journal, January 15, 2010.
King, Julia, Service Needs Drive Tech Decisions at Lands End,
Computerworld, December 20, 1999.
Konicki, Steve, Sears, Michelin Test Supply Chain, Information Week, July 1,
2002.
McDougall, Paul, Ordering IT, Information Week, March 22, 2004.
Mearian, Lucas, Sears To Build Huge Storage Network For CRM,
Computerworld, January 24, 2002.
498 Chapter 7: Electronic Business
Merrick, Amy, Sears Orders Fashion Makeover From the Lands End Catalog,
The Wall Street Journal, January 28, 2004.
Rosencrance, Linda, New Sears VP Of IT Operations Wants To Simplify IT
Environment, Computerworld, May 16, 2003.
Sliwa, Carol, Clothing Retailer Finds Worldwide Business on the Web,
Computerworld, April 30, 2001.
Sliwa, Carol, E-Retailers Seek Improved Search Engines, Computerworld,
August 12, 2002.
Sliwa, Carol, Sears CEO Says Company Will Standardize Technology,
Computerworld, January 20, 2003
Sliwa, Carol, Kmart CIO gains top IT job at Sears Holdings, Computerworld,
April 4, 2005.
Swanson, Sandra, Lands End Brings Custom-Made Pants Online, Information
Week, November 6, 2001.
Weiss, Todd R., Sears Buying Lands End, Computerworld, May 13, 2002.
Weiss, Todd R., Sears Inks $1.6B IT Outsourcing Services Deal With CSC,
Computerworld, June 2, 2004.
Whiting, Rick, The Data-Warehouse Advantage, Information Week, July 28,
2003.
Case: Super Valu and Albertsons
SuperValu (ticker: SVU) began as the Winston and Newell grocery warehouse
serving Minneapolis, MN in 1924. Over the years, the company developed a dis-
tribution chain, largely supplying independent and affliated grocers in the region.
Buying other regional distribution chains, the store hit $1 billion in sales in 1971
under the SuperValu name. In 1980, the company moved into the retail trade by
purchasing Minnesota-based Cub Foods, operating fve stores. From 1990 for-
ward, the company acquired increasingly larger retail-store chains; yet continued
to distribute food to unaffliated stores. By 1998, SuperValu handled 15 percent
of the nations food distribution. In 2006, the retail side expanded massively with
the purchase of approximately half of the retail stores (1,100) and distribution
network of Albertsons, making SuperValu the third-largest national grocery chain
(www.supervalu.com).
Albertsons was a regional grocery chain that grew into the third largest grocery
chain in America. Founded in 1939 by Joe Albertson, the company maintains its
headquarters in Boise, Idaho. Until its 1999 merger with American Stores, Albert-
sons expanded through internal growth and creating new stores. The merger with
American Stores gave it wider access in California and the Midwest. Some of the
acquired stores maintain the original name, such as the Jewel-Osco grocery/drug-
stores in the Chicago area. In 2003, the company had around 2,300 retail stores
and total revenue of $35 billion. The stores were supported by 17 distribution
centers [annual report]. Despite the mergers, Albertsons has seen total revenue
decline since the 1999 fscal year. In 2001, the company replaced the CEO by hir-
499 Chapter 7: Electronic Business
ing Larry Johnstonwho lost out in the GE competition to replace Jack Welch.
Johnston quickly replaced most of the executive team. His stated emphasis was
to reduce costs and streamline the company, but operating/administrative costs
in FY 2003 were higher than they were in FY 1999. Johnston also closed several
hundred storesdeciding to focus only on markets where the chain held the num-
ber one or two position. In 2006, Johnston sold half the company to SuperValu
and the other half to private equity frm Cerberus for eventual liquidation. John-
ston walked away with over $100 million in cash for driving a business into the
ground.
Competitive Treats
The biggest threat to SuperValu (and Kroger and Safeway and the other big gro-
cers) is Wal-Mart. Wal-Mart now sells more groceries than any other chain in
America. Its SuperCenter stores provide a one-stop market for customers, and the
company is rolling out more of them every day (Gose 2002). With Wal-Marts
supply chain effciencies and heavily advertised low-price strategy, customers
fock to the stores. Oh yes, and Wal-Mart employees are not unionized. The big
grocery chains in California have unionized workers who not only demand high
wages, but have gone on strike several times to try and force the wage and beneft
policies. With the collapse and sale of Albertsons, it will be interesting to see if the
unions can maintain their power to command higher wages (Peltz 2004). Grocery
chains gained some breathing room in 2007 when Wal-Mart announced that it
was slowing its expansion into the grocery feld. In 2006, Wal-Mart accounted for
21.1 percent of U.S. food sales, giving it more than twice the market of Kroger, its
nearest competitor. Wal-Mart decided to scale back its expansion plans to avoid
market saturation in rural areas and because of stiff competition in cities (Jargon
2007). On the other hand, British supermarket giant Tesco PLC announced plans
to place stores in Southern California and Las Vegaskey markets for the new
SuperValu.
By 2011, SuperValu operated 1,114 retail food stores and 381 discount food
stores, plus handled distribution to 899 discount stores and 1,900 independent
retail stores. The company runs 21 national distribution centers. The company
distributes and sells all standard grocery and drug-store items including nation-
al brands and private labels. The company had about 142,000 employees, with
88,000 of them members of unions. In 2009, SuperValu hired a new CEO; then
a new chief marketing offcer in 2010 and a new CIO in late 2010. The company
experienced a decline in sales for 2010-2011. Even same-store sales declined in
many marketswhich was primarily blamed on competitors with lower prices
(2011 Annual Report).
In February 2007, SuperValu almost got scammed out of $10 million. Two
e-mail messages purporting to be from American Greetings Corp and Frito-Lay
tried to get SuperValu to change the bank accounts for future payments to these
companies. In early March, SuperValu said it transferred $3.6 million to one of
the bank accounts, but then double-checked the changes and notifed federal law
enforcement on March 6. The FBI offce was able to shut down the fake accounts
and retrieve most of the money. It is not clear if the scammers were eventually
caught (Vijayan 2007).
500 Chapter 7: Electronic Business
Technology
Transactions processing is a key element to holding down costs in grocery stores
particularly when labor is expensive. Grocery stores were the frst to implement
bar codes and checkout scanners in the 1980s. Although bar codes provide better
data, they do not signifcantly increase the speed of the checkout process. Some-
one still has to unpack the cart, move each item by hand over the scanner (some-
times multiple times to get it to read), and then pack the items into bags. Albert-
sons, like other chains, has experimented with self-service checkouts. Custom-
ers with a small number of items run them over the scanner or weigh them and
place them into bags. Usually one clerk oversees four checkout stations. To reduce
theft, the station weighs the bags as items are added and compares the weight to a
known value. But the stations do not really change the checkout process, merely
shift some of the work to the customers.
Payment mechanisms are a challenge for grocers. Proft margins are extremely
tight and retailers make only a few cents on any item. Customers no longer like
to carry cash, but the fees to process credit and debit cards cuts into margins.
Check-processing costs at one time ran as high as 75 cents per check. Jacki Sny-
der, manager of electronic payments at SuperValu observed that in some cases,
the fees on one grocery order exceed $1, more than the supermarket proft on
the same order (Thibodeau 2000). Supermarkets including SuperValu are testing
new systems that use fngerprints to identify customers. The Pay By Touch system
links the identity to the customers credit or debit card and also verifes age for
purchases of alcohol or tobacco (Sullivan 2006).
Albertsons had just completed an installation of Oracles ERP system to run
operations before the sale to SuperValu. The company was also using PeopleSoft
to handle HRM tasks, so Oracles purchase of PeopleSoft will ultimately beneft
the company. Because of the number of stores, SuperValu at least initially is keep-
ing the chains on their existing IT systems. This approach minimizes the problems
of integrating data systems and keeps the stores running effciently, but it makes it
more diffcult to manage the divisions as an integrated organization.
By 2011, new CIO Wayne Shurts said the IT organization was changing focus
from cost-cutting to concentrating on strategic investments. His plans included
moving to Microsoft Offce 365, the cloud-based applications from Microsoft
priced at $10 per user per month. The bundle includes SharePoint and Web con-
ferencing in addition to standard offce tools (Nash 2011). The goal is to make it
easier for corporate directors to retrieve and share information and comments with
other directors and store managers.
Questions
1. Will enough customers use the handheld scanners to make them proftable?
2. If there are 150,000 different items in a store, and LCD tags cost $5 each,
how long will it take to recoup the cost of outftting an entire store with the
LCD tags? Remember that all employees are unionized, so assume average
wages are at least $10 per hour. Write down any other assumptions.
3. Will new checkout technologies be enough to help Albertsons stay
competitive against Wal-Mart? What can Albertsons do to stay alive?
501 Chapter 7: Electronic Business
Additional Reading
Gose, Joe, Supercenter Showdown, National Real Estate Investor, December
2002, Vol 44(12), p. 14.
Jargon, Julie, Wal-Mart Slowdown to Hit Food Sector, The Wall Street Journal,
June 5, 2007.
Nash, Kim S., 2011 State of the CIO: IT Departments Are Fueling Company
Growth Through Strategic Technology Investments, CIO, January 1, 2011.
Peltz, James F., How the Supermarket Strike Was Settled, The Los Angeles
Times, March 8, 2004.
Sullivan, Laurie, Touch Once For Groceries, Computerworld, February 13,
2006.
Thibodeau, Patrick, Older Systems Hinder E-payments, Computerworld,
September 25, 2000.
Vijayan, Jaikumar, Phishers Nearly Pull Off $10M Scam of Grocer,
Computerworld, October 29, 2007.
Case: Amazon
In 1994, with a handful of programmers and a few thousand dollars in worksta-
tions and servers, Jeff Bezos set out to change the retail world when he created
Amazon.com (ticker: AMZN). Shel Kaphan, Amazons frst programmer, assisted
by others, including Paul Barton-Davis, used a collection of tools to create Web
pages based on a database of 1 million book titles compiled from the Library of
Congress and Books in Print databases. Kaphan notes that Amazon was depen-
dent on commercial and free database systems, as well as HTTP server software
from commercial and free sources. Many of the programming tools were free soft-
ware (Collett 2002). In July 1995, Amazon opened its Web site for sales. Using
heavily discounted book prices (20 to 30 percent below common retail prices);
Amazon advertised heavily and became the leading celebrity of the Internet and
e-commerce.
Amazon was often held up as the darling of the dot-com era. Anyone could
sell books online, but Amazon showed that you had to be frst (or close to frst
with more money), to capture name recognition and market share. But, looking at
Amazons sales and losses, it is clear that Amazon never made any profts selling
books. By the mid-2000s, Amazon altered its strategies on book salesincreas-
ing the price of mass-market books and reducing its inventories to focus on the
best-sellers. With the release of the Kindle e-book reader, Amazon signifcantly
jump-started the sale of e-books. By 2010, Amazon was selling 15 percent more
e-books than even paperback books (Hamblen 2011).
Amazon sales continue to growaccounting for a signifcant portion of on-
line sales. Some of the sales come from partnerships with other sellersAmazon
simply handles the Web site and payment methods. Although sales were increas-
ing rapidly through at least 2011, costs were increasing faster. Most of the costs
were investments in new technologies and expanding data centers (Woo 2011).
Amazon also continues to sell digital music and in 2011, it expanded its offerings
of digital video. Customers who join the Prime club who pay an annual fee to get
502 Chapter 7: Electronic Business
reduced shipping costs will also get online access to thousands of videos. But, in
both music and movies, Amazon remains a small player compared to the Apple
and Netfix.
Selling Relationships
As a premier site on the Web, Amazon realized that it could leverage its huge
name recognition and trust. The company gradually signed deals with both large
companies and small retailers. Customers go to the Amazon site and search for a
product. The Amazon database retrieves the product descriptions and prices and
displays them in a consistent format. Amazon handles the payment details and
sends the order to the partners for fulfllment. Some customers never know they
are dealing with a third party. By 2004, 25 percent of Amazons sales were for its
partners. But some of the deals did not go as well as others. In 2004, Toys R Us
sued Amazon and Amazon countersued. The primary complaint was that Amazon
had promised Toys R Us an exclusive right to sell toys on the Amazon site. But,
Amazon signed on many small companies that also sold toys. David Schwartz,
senior VP and general counsel for Toys R Us stated that We dont intend to pay
for exclusivity were not getting. Amazons initial response was that We be-
lieve we can have multiple sellers in the toy category, increase selection, and offer
products that (Toys R Us) doesnt have (Claburn May 2004). By 2007, Amazon
was simply the largest marketplace on the Web.
Small merchants accelerated a shift to Amazons marketplace technology. For
example, John Wieber was selling $1 million a year in refurbished computers
through eBay. But increased competition and eBays rising prices convinced him
to switch to direct sales through Amazon. Similar small merchants noted that al-
though the fees on Amazon are hefty, they do not have to pay a listing fee. Plus,
eBay shoppers only want to buy things at bargain-basement prices (Mangalindan
2005).
Information Technology
Initially, Amazon built its Web site separately from its order-fulfllment system.
The separation existed partly for security reasons and partly because the technol-
ogy to connect them was in its infancy. One of the most important features offered
by Amazon was the affnity programwhere customers are shown lists of other
items they might want to purchasebased on an analysis of purchases by other
customers. It proved to be a useful technology for books, music, and movies
identifying related products that customers might otherwise miss.
In 2000, Amazon decided to overhaul its entire system. The company spent
$200 million on new applications, including analysis software from E.piphany,
logistics from Manugistics, and a new DBMS from Oracle. The company also
signed deals with SAS for data mining and analysis (Collett 2002). But, one of
its biggest deals was with Excelon for business-to-business integration systems.
The system enables suppliers to communicate in real time, even if they do not
have sophisticated IT departments. It provides a direct con-nection to Amazons
ERP system either through programming connections or through a Web browser
(Konicki 2000).
The technology and sales did not come cheaply. In 2003, Bezos noted that $900
million went to business technology; $300 million was spent on the fulfllment
centers; and $700 million on marketing and customer acquisition (Murphy 2003).
That last part largely represents selling books at a loss or offering free shipping
503 Chapter 7: Electronic Business
while trying to attract customers. Those numbers add up to the $1.9 billion debt,
but the company also lost another $1 billion.
New Services
Amazon requires huge data centers and high-speed Internet connections to run
its systems. Through vast economies of scale, Amazon is able to achieve incred-
ibly low prices for data storage and bandwidth. Around 2005, the company de-
cided that it could leverage those low costs into a new business selling Internet-
based services. The company offers an online data storage service called S3. For
a monthly fee of 15 cents per gigabyte stored plus 20 cents per gigabyte of data
transferred, any person or company can transfer and store data on Amazon servers
(Markoff 2006). Through a similar service (EC2), any company can use the com-
panys Web servers to deliver digital content to customers. Microsoft reportedly
uses the system to handle some large fles for downloads. The company essen-
tially serves as a Web host, but instead of paying fxed costs, you pay 10 cents per
virtual server per hour plus bandwidth costs. Amazons network can handle bursts
up to 1 gigabit per second. The system creates virtual servers, running the Linux
kernel, and you can run any software you want (Gralla 2006).
Amazon also runs the A9 search engine, so it began selling keyword advertis-
ing. Similar to Google, A9 provides advertising links to other Web sites and shares
the revenue. The company also provides mapping and other services that can be
integrated into your Web site.
Perhaps the most unusual service is Mturk. The name derives from an 18-cen-
tury joke where a mechanical chess-playing machine surprised European lead-
ers and royalty by beating many expert players. The trick was that a human was
hidden under the board and moved the pieces with magnets. Amazons trick is to
use human power to solve problems. Companies post projects on the Mturk site
and offer to pay a price for piecemeal work. Any individual can sign up and per-
form a task and get paid based on the amount of work completed. Amazon takes a
10 percent commission above the fee. For example, the company Casting Words
places audio fles on the site and pays people 42 cents to transcribe one minute of
audio fles into text (Markoff 2006).
Adam Selipsky, vice president of product management and developer relations
at Amazon Web Services observed that Amazon is fundamentally a technology
company; weve spent more than one and a half billion dollars investing in tech-
nology and content. We began by retailing books, but it was never in our business
plan to stay with that (Gralla 2006).
Amazon has been increasing its online cloud-based services. The main of-
ferings include the S3 service to store fles, but also the Elastic Compute Cloud
(EC2) and Amazon Web Services (AWS) which enable anyone to buy Web ser-
vices or any type of computer server and pay just by the amount of processing
time used and the data transferred. The company also offers the Relational Data-
base Service (RDS) which provides a cloud-based relational query system. In an
interesting twist, Netfix moved some of its main IT operations to Amazons EC2
and AWS services. Netfix noted that it reduced costs by moving off expensive
IBM hardware and they were growing so quickly that it was easier to use Amazon
to confgure and manage the servers and network bandwidth (Kanaracus 2010).
504 Chapter 7: Electronic Business
Questions
1. Who are Amazons competitors?
2. Why did Amazon create most of its own technology from scratch?
3. Will Amazon ever become proftable enough to recoup its initial
investments?
Additional Reading
Claburn, Thomas, Amazon.com And Toys R Us Are On The Outs,
Information Week, May 31, 2004.
Collett, Stacy, The Webs Best-seller, Computerworld, September 30, 2002.
Gralla, Preston, Computing in the Cloud, Computerworld, December 21, 2006.
Hamblen, Matt, Amazon.com Touts More e-Book Sales than Paperbacks,
Computerworld, January 28, 2011.
Kanaracus, Chris, Netfix Turns From Oracle, IBM to Amazon to Save Cash,
Computerworld, November 24, 2010.
Konicki, Steve, Amazon Taps Excelon To Redo Supply-Chain System,
Information Week, October 30, 2000.
Mangalindan, Mylene, Threatening eBays Dominance, More Online Sellers Go
It Alone, The Wall Street Journal, June 22, 2005.
Markoff, John, Software Out There, The New York Times, April 5, 2006.
Murphy, Chris, Amazon, The Services Firm, Information Week, June 10, 2003.
Woo, Stu, Expenses Eat at Amazons Proft, The Wall Street Journal, January
28, 2011.
Summary Industry Questions
1. What information technologies have helped this industry?
2. Did the technologies provide a competitive advantage or were they quickly
adopted by rivals?
3. Which technologies could this industry use that were developed in other
sectors?
4. Is the level of competition increasing or decreasing in this industry? Is it
dominated by a few frms, or are they fairly balanced?
5. What problems have been created from the use of information technology
and how did the frms solve the problems?
505
What You Will Learn in This Chapter
How can information systems be used to support teams of workers?
How many different ways are there to communicate with team members?
Which method is best for each type of message?
How can several people work on the same documents?
How does an organization remember past events?
Where can you fnd a system that provides these groupware capabilities?
What if you do not have a server and want to collaborate?
What could you accomplish if fve people work on the same screen at the same time?
How do you collaborate and share data if everyone uses different software?
Chapter Outline
Teamwork
8
Chapter
Introduction, 506
Communication, 507
e-Mail, Instant Messaging, and Voice
Mail, 509
Web Pages and Blogs, 511
Scheduling and Project Management,
512
Conferences and Meetings, 513
Peer-to-Peer Network Complications,
515
Mobile Systems, 516
Collaboration, 516
Documents and Changes, 517
Version Control, 518
Wikis and Online Applications, 520
Information Rights Management, 521
Workfow, 522
Group Decision Support Systems, 523
Knowledge Management, 525
Organizational Memory, 526
Service Processes, 527
Microsoft SharePoint, 528
Communication and Scheduling, 528
Collaboration, 532
Workfow, 535
SharePoint Confguration, 537
Peer-to-Peer Collaboration, 540
Sharing Documents, 540
Immediate Interaction: Microsoft
SharedView, 542
Sharing with Multi-Touch Panels, 544
File Formats and Standards, 545
Cloud-Based Collaboration, 546
Summary, 549
Key Words, 550
Web Site References, 550
Review Questions, 551
Exercises, 551
Additional Reading, 554
Cases: Package Delivery, 555
506 Chapter 8: Teamwork
FedEx
Introduction
How can information systems be used to support teams of
workers? Companies are increasingly approaching problems and decisions
with teams, often built from members drawn from across the company. Workers
can be members of several teams at the same time, and teammates might work in
different parts of the country or around the world. Sharing information is a major
element of teamwork, and networks are needed to transfer data and share resourc-
es. But beyond simple sharing, Figure 8.1 indicates that workers need to work
collaboratively on a collection of project documents. Over the past few years, the
standard personal productivity tools have gained features to support collaboration
and sharing. Additional tools are available to stay in touch with teammates, dis-
cuss strategies, schedule meetings, and share research. As a manager, you need to
use these tools on a regular basis to become more effcient.
Teamwork is not an invention of the past couple of years. Most teams have
developed methods to handle the collaboration needs of the group. Many orga-
nizations still use paper-based systems. Paper documents are photocopied and
circulated for review. Individuals suggest changes and corrections, which are
forwarded to one person. Meetings are held in personpeople sometimes fy
thousands of miles for meetings, everyone takes notes, and some people dominate
the group discussions. Many people still rely on e-mail to send versions of docu-
ments. Someday, people will look back and consider these systems to be quaint
and ineffcient.
Teamwork revolves around two fundamental concepts: communication and
collaboration. Teammates need to communicate on many topics, and several com-
munication methods are available today. One challenge is to choose the right com-
munication method for each problem. Collaboration entails working together. To-
day, that means sharing electronic documents and tracking the revisions made to
each document. More than simply combining changes, it also involves discussing
why the changes were made. Collaboration also involves scheduling tasks and
maintaining project schedules.
Software tools have existed for several years to help with the basic commu-
nication and collaboration tasks. The strengths of todays tools are the integra-
How does technology help teams work together? Everyone has heard of FedExthe
company that invented overnight delivery of small packages. But FedEx is not alone;
it must compete with several other large companies to earn your business. Being on
time and at a reasonable price are important attributes to success. FedEx achieves its
success through communication and teamwork. Downstream workers have access to
information about incoming packages and can alter their schedules if necessary to
provide better service.
Since 2000, with several mergers, FedEx has grown beyond overnight deliveries.
The company now controls several package delivery and shipping carriers. It also
acquired Kinkos in 2004. Information systems are used to integrate these operations
and work closer with customers. Ultimately, to FedEx, teamwork entails identifying
customer needs and fnding new ways to solve problems.
507 Chapter 8: Teamwork
tion and focus on teamwork. Today, you can automate the business processes by
automatically triggering messages and monitoring the schedules and the fow of
documents through the company. One goal of these systems is to track the deci-
sions, documentation, and discussions by everyone involved in a decision. If this
knowledge is collected and indexed carefully, it can become the foundation of the
organizations memory. If you need to solve a diffcult problem, you could turn to
this knowledge base to fnd similar problems, or suggestions from workers who
faced the same problems.
Communication
How many different ways are there to communicate with team
members? Which method is best for each type of message? Com-
munication is a critical element in teamwork. You need to schedule meetings, dis-
cuss options, share and revise documents, and identify opinions. Because com-
munication is so important to teams, several technologies are available. You can
choose between simple meetings in the hall, phone calls or voice mail, e-mail and
instant messaging, and online conferences, or full-blown team meetings. How do
you choose the proper communication method?
As shown in Figure 8.2, one of the issues in organizing your daily work life is
to manage the interruptions. Phone calls, e-mail messages, people walking into
your offce, and IM requests all break your concentration. One question you have
to answer is to identify which method works best for you (and your teammates).
Having multiple channels of communication gives you fexibility. Your goal is to
prioritize each technology and method so that you accomplish your goals, yet still
Figure 8.1
Teamwork. Businesses increasingly rely on teams of workers that require
coordination and shared documents. Several tools exist to help workers collaborate
on common documents, schedule meetings, and track changes.
1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30 31
Dept Costs Labor
Mrkt 445 87
Prod 227 45
HRM 554 32
Projected Sales
0
200
400
600
800
1000
West East North South
New
Maint.
Tools
Alpha Project
Goals:
Problems:
Departments:
508 Chapter 8: Teamwork
Trends
Personal computers originally provided support for basic personal tasks
writing documents, computing totals, and drawing charts. In the 1990s,
companies realized the importance of networks for sharing data. In the pro-
cess, companies realized that networks can change the way managers work.
Instead of relying on rigid management hierarchies, small teams can be cre-
ated to solve problems as they arise. Communication across networks makes
it possible for teammates to be located anywhere within the company. Be-
yond the benefts of communication, can information systems do even more
to support teams?
In the 1990s, Lotus Notes revealed the demand for collaboration; but it
largely relied on e-mail to transfer copies of documents. In the 2000s, peo-
ple tried to use Web sites and blogs to communicate and work together, but
these tools are diffcult to use with multiple contributors and have problems
handling offce documents.
One of the biggest changes in Offce software in the past couple of years
has been the introduction of powerful tools to help groups of workers com-
municate and collaborate. These features were expanded and integrated into
Offce 2007 which provides SharePoint as a central communication point
and SharePoint Workspace/Groove for peer-to-peer sharing. A couple of
third-party companies have begun to offer collaboration tools, but they do
not yet achieve the integration Microsoft has provided in Offce.
Instant Message/Chat E-Mail
Phone Call
Physical Visit
Video conference
Figure 8.2
Communication interruptions. Which type of interruption is the least disruptive for
you? Need to fnish your work. Need to help the team.
509 Chapter 8: Teamwork
have time to work with the group. If possible, you might try to get the group to
agree on the priorities of the main methods. Most organizations have a culture that
establishes these priorities, but sometimes you need to discuss them so that every-
one treats the channels with the same priority.
e-Mail, Instant Messaging, and Voice Mail
E-mail is a relatively common means of communicating. It has the fundamental
advantage of being asynchronous, which means that the sender and receiver do
not have to be connected at the same time. The recipient can pick up and reply to a
message at any time. In a group context, e-mail is even more important because it
is easy to send messages to the entire group. Moreover, the messages can be saved
and organized so that they create a thread or history of a discussion. E-mail is also
used to send documents as attachments.
As shown in Figure 8.3, e-mail systems such as Lotus Notes and Microsoft
Exchange were originally advertised as groupware tools because of the support
provided for attachments. The e-mail systems essentially become moving data-
bases of documents. One of the drawbacks to this approach is that multiple copies
of the documents are transferred continually with each message, which makes it
Figure 8.3
Problems with e-mail groupware. E-mail messages with attached documents are sent
to team members. But, people end up with multiple copies, they do not receive the
same messages, and it is hard to identify the correct version.
Design Team
Client HQ
New York
Finance & Management Team
Consulting HQ
California
Design Project
Singapore
Multiple copies
Different messages
Old versions
Which version is current?
Design
documents
changes
design
changes
contract
changes
modified
designs
510 Chapter 8: Teamwork
diffcult to track versions and identify the current documents. Plus multiple people
might be altering the same documents at the same time, so someone has to merge
the fnal changes into a single document. E-mail is still an important tool for com-
munication, but its drawbacks make it diffcult to use as a standalone groupware
system.
Texting and other instant messaging tools have become popular in the past few
yearsparticularly with students. However, the technology can also be a time-
saver for groups of workers. Each team member can add the others onto the buddy
list. The ability to see if someone is online can save considerable time. If you
encounter a problem while working, you could immediately see who might be
available to answer questions. Yet if you are busy and receive an IM request, you
can still choose to ignore it until you have time for a break. But, it is easy for some
people to get carried away with text messages; which can make it diffcult for oth-
ers to concentrate on diffcult tasks.
Voice mail systems were created so that you can leave phone messages for peo-
ple who are out of the offce or talking to another person. Current voice mail sys-
tems have many advanced options, such as the ability to send the same message
to multiple people, receive notifcations when a message is retrieved, and archive
messages for later use. The biggest drawback to voice mail is that some people
leave long messages that you have to listen to before they get to the real point of
the call. Long e-mail messages are annoying, but at least you can quickly scan the
message to fnd the important elements. It is also diffcult to search stored voice
mail messages to fnd particular topics.
E-mail, voice mail, and IM are all push communication technologies. As a mes-
sage sender, you choose when to place the message and contact the receiver. The
other person did not necessarily ask to be contacted, so you are interrupting his
or her work. Of the three methods, e-mail is the least intrusive since the recipient
has to retrieve the messages and open each one. Because e-mail is less intrusive,
you have to remember that any particular message might never actually be read.
Reality Bytes: Google Apps
Applications to support teamwork are becoming more important every day. The
problem is that the applications might not have all of the features people want.
Google has been pushing to become a big player in the online market for collabora-
tion with its Web-based Google Apps. In 2010, Google had more than 2 million busi-
ness customers, including some large companies and several government agencies.
The price is attractive to many organizations at $50 per user per year. Google runs all
of the servers, provides 25 GB of e-mail storage per user and promises 99.9 percent
uptime with 24/7 customer support. But, Google Apps are not the same as traditional
desktop software. Aisle 7, a small health and wellness marketing company switched
to Google Apps in early 2009. Although the company has only 32 users, only 10 peo-
ple initially used Gmail. Within three months. Only two people were using Gmail.
Aisle 7 also said that over the course of using Google Apps for a year, the company
experienced four instances where the servers were down for several hours each. The
company eventually switched to Microsofts online service.
Adapted from Shane ONeill, The Trouble with Going Google: 4 Reasons Why I
Got Out, Computerworld, August 11, 2010.
511 Chapter 8: Teamwork
It could be buried in a stack of junk messages, or even lost or destroyed. Most
systems enable you to ask for receipt confrmation when a message is opened. But
these systems are not always automatic. The user can often override this request
and tell the computer not to send the confrmation message. Voice mail messages
suffer from the same issues and have similar controls. The point is that as the
message sender, you need to understand the limitations of the tools. If you need
confrmation of a message, it is your responsibility to follow up and make sure the
message was received and understood.
Web Pages and Blogs
Web pages were initially created to share information among researchers. As a
common platform, you can make fles available to anyone on your teamregard-
less of where they are located or what equipment they are using. Most people are
familiar with Web browsers and pages. Several tools help you create Web sites
and update documents. Despite these tools, it is challenging to create Web sites
and keep updating the pages. As shown in Figure 8.4, Web pages are generally
seen as a client-pull technology. You create the Web pages and place them on
the site. Team members can view or retrieve the documents, but there is no good
mechanism for making changes or replacing the contents. In one sense, Web pages
are a broadcast technology, where you can provide the same data to many people.
Recognition of this feature makes it clearer when you should use Web sites for
communication.
Web logs or blogs were created primarily for individuals to use to create diaries
on the Internet. The technology was largely developed to overcome the diffcul-
ties in creating and updating Web sites. A blog consists of a site framework that
enables others to read your comments. A simple editing tool makes it easy to write
daily or hourly comments and immediately post them to the Web. The process is
simplifed so you can focus on the content. It is also designed to save all of your
Figure 8.4
Web pages and blogs. One-way communication that is easiest to create with a single
author. Comments can be saved and easily searched by coworkers.
Web server
Author
Coworkers
Web site
Blog
One-way communication.
Easiest with one author.
Users search for data.
512 Chapter 8: Teamwork
earlier comments so people can trace the history. These tools could be used in a
business or teamwork setting. They would provide a record of the teams actions
and decisions. Each person could record current problems, solutions, and describe
issues for discussion. Later, if questions arise, you can search the logs to fnd pro-
posed solutions or learn exactly why a particular decision was made. Of course,
you would restrict access to the logs. The big question is whether the team mem-
bers will take the time to record their thoughts and relevant issues on a regular
basis. Blog software is easy to use and you can fnd shareware implementations
that can be installed for little or no cost; so it is relatively inexpensive to test the
technology.
Scheduling and Project Management
Scheduling is a challenge with any team project. It is even more complicated when
people work on several teams at the same time. Scheduling a meeting or confer-
ence is diffcult and often requires several messages back and forth just to fnd a
common time. Electronic calendar tools make this process a little easier. Figure
8.5 shows that teammates keep personal calendars that are shared with each other.
Each person can check to see if there is an open time slot or use advanced tools to
help fnd the best time for a meeting. Most e-mail systems support shared calen-
dars, but participants generally need to use a common e-mail client. For example,
Microsoft Exchange mail server provides tighter integration with the Outlook cli-
ent software. If you use one of these systems, you need to learn how to mark some
items as private, and you need to check the calendar throughout the day as the
schedule changes.
Figure 8.5
Scheduling. When calendars are shared, scheduling software can examine calendars
for each participant and look for an open meeting time. Schedules can change
throughout the day, so many people carry PDAs or cell phones to watch the schedule.
Calendar Server
(Microsoft Exchange)
08:00 Meeting
08:30
09:00 Project A
09:30
10:00 Meeting?
10:30
11:00 Dentist
08:00 Project B
08:30
09:00 Project A
09:30
10:00 Meeting?
10:30
11:00 Project C
08:00 Project B
08:30
09:00
09:30
10:00 Meeting?
10:30
11:00 Meeting
513 Chapter 8: Teamwork
However, these tools can also make it harder to plan. If your schedule is con-
stantly changing, you can waste time jumping between projects. For example, you
might have a big project presentation scheduled for tomorrow, so you spend time
organizing your notes. Then the meeting gets shifted because a higher priority
event occurs. You have to rush around trying to collect and organize data for the
new meeting.
Project management tools were created to help manage and control groups of
workers on large projects. These tools are discussed in more detail in Chapter 13.
The basic concept is that you defne each task that needs to be accomplished and
how these tasks depend on each other. For example, in construction, you must frst
lay the foundation before you can frame a building. If an earlier task gets delayed,
it pushes back all of the dependent tasks. Project management software graphi-
cally shows the tasks and their dependencies. As tasks are completed or delayed,
the schedule is updated and everyone can see the changes.
Conferences and Meetings
Face-to-face meetings are expensive. Even if everyone on the team works in the
same building, a meeting requires everyone to stop their work, organize their pre-
sentations, and set aside most other communications during the meeting. If people
have to travel to a meeting, the costs are considerably higher. Of course, some-
Figure 8.6
Online Conferences. You pay a third-party server (Microsoft LiveMeeting or Cisco
WebEx) to broadcast the meeting to hundreds or thousands of participants. Some
interaction is supported, but large meetings work best with one-way communication.
Conference Server
Encoding Server
Internet
Microsoft Live Meeting, Cisco WebEx
Microsoft Communicator
514 Chapter 8: Teamwork
times the major point of a meeting is to create a deadline that forces everyone to
organize their work and meet the project milestones.
As shown in Figure 8.6, several electronic systems have been developed to sup-
port online conferences and meetings. At the high end, videoconference systems
provide real-time voice and video connections so people in different locations can
hear and see each other. Videoconference systems require video cameras, micro-
phones, and television displays at each location. For more realistic conferences,
some systems use multiple cameras at each location or provide remote control
over the cameras. The primary drawback to the systems is the bandwidth required
to transmit realistic video data. Early systems used proprietary connections to en-
sure suffcient bandwidth. Newer systems can run across Internet connections, but
require special confgurations of routers to ensure the continuous availability of
the required bandwidth. The problems multiply if the video signals have to be
sent to multiple locations, so most systems operate point-to-point between two
locations.
As bandwidth connections improve, lower-cost systems are being developed
that enable you to set up videoconferences using personal computers and Web
cameras. Be sure to test the systems frst because low resolution cameras or slow-
speed links can cause more distractions than benefts. While these systems do
not give you the remote control capabilities of the big systems, they can support
meetings from your desk. They are particularly useful for meetings with two or
three participants. For example, systems such as Skype support HD Web cams to
provide more realistic images. Cisco and other vendors are using the term telep-
resence to denote high-speed, high-quality connections. But, each side needs a
connection with at least 1 mbps transfer rates. For additional fees, the systems
can support multiple video connections at the same time. Remember that although
broadband connections typically support the speed needed for incoming data, the
outgoing data speed can be much lower.
If you do not need video, it is relatively easy to set up a telephone conference.
Most phone systems have provisions to connect several people into one conversa-
tion. If your company system does not support these connections, you can pay a
fee to an external company to host your phone call. Each participant simply calls
a special number at the same time to join the conversation. Note that if you have
several people in the same room participating in a phone call, you will have to use
a special conference telephone. Polycom and Cisco are two of the leading ven-
dors. The phone has a speaker and robust microphone to pick up everyones con-
versations. More important, it contains circuitry to eliminate audio feedback. Ad-
vanced versions of the phones also support full duplex communications, which
means that you can interrupt someone speakingbecause the phone transmits and
receives at the same time.
In part because of the bandwidth problem, several companies have set up spe-
cial servers with high-speed network connections to enable you to run large con-
ferences online. Microsofts Live Meeting and Ciscos WebEx are two examples.
Essentially, Microsoft or Cisco acts as a hosting company. Your frm pays a fee to
use their serviceseither monthly or one-time, based on the number of partici-
pantswhich translates to bandwidth demand.
The systems are designed to handle as many as a few thousand participants.
The process is oriented to a broadcast approach. A video and audio feed can be
viewed by everyone. For reasonably sized groups, you can integrate telephone
conferencing to handle interactive questions. The system also includes a standard
515 Chapter 8: Teamwork
chat tool if you do not want to deal with the telephone costs. Both systems sup-
port Web interaction. The presenter can share applications or the desktop with
other participants. Team members can be given control to run an application or
annotate a document. You can link in Web sites, where each participant can click
on links and fll out forms. A polling tool enables you to quickly create questions
and let the audience vote. The system also includes the popular electronic white-
board where each person can contribute and draw in a different color. Of course,
you will probably want to limit these interactive features if you are presenting to
hundreds of people.
Microsofts system also includes a feedback mechanism through a seating
chart. At any time, a participant can click the seating chart to request that the pre-
senter slow down or speed up, or to ask a question. The audience notes are dis-
played to the presenter on a color-coded status board. If you see many requests to
slow down (red squares), you know you are going too fast. A useful feature of the
system is that it records the presentation so you can save it on your Web site and
customers can replay it later.
Peer-to-Peer Network Complications
Chapter 3 explains that most companies use network address translation (NAT)
in their routers to isolate their internal networks from the Internetpartly to im-
prove security and partly to conserve the limited number of IPv4 addresses. In
summary, each computer within the companys network receives a unique IP ad-
dress that cannot be accessed by anyone outside the company. As shown in Figure
8.7 although security offcers like NAT, it makes it considerably more diffcult
to establish computer connections to individuals outside the companyinclud-
ing traveling employees, customers, and business partners. In most cases, the best
Company 1
Company 2
NAT
NAT
Communication
Server (xed IP)
Figure 8.7
NAT complications. Computers cannot connect directly to each other with network
address translation. Instead, a communications server with a fxed IP address
handles the connections. A company can run its own server (such as Microsoft
Communicator), or pay a third party such as Skype. The servers support voice, video,
and data sharing.
516 Chapter 8: Teamwork
solution is to establish a server with a fxed IP address that centralizes the com-
munication links. The server has a fxed IP address and does not use NAT, so it is
accessible to people both inside and outside of the company. This approach pres-
ents problems for small businesses because it requires the purchase, installation,
and maintenance of more hardware. Small businesses will probably want to use
third-party companies to handle communication needs. NAT is the second reason
Microsoft Live Meeting and WebEx have grown in importance. Other companies,
such as Skype, offer online voice communications for the same reasons.
To improve security and reduce costs, larger organizations will probably want
to install servers to handle communications themselves. For example, Microsoft
provides the Communicator server and client software that integrates with Offce.
The server also centralizes the management and security issues, making it easier
for the corporate IT department to monitor and control the connections and use of
the technology. Users who have accounts on the Communicator server can make
voice calls using their computer or even a telephone. It also supports video con-
nections, instant messaging, and data transfers. Communicator is integrated with
Offce, so users can quickly determine which team members are online, send chat
messages, or make phone calls with the click of an icon.
Mobile Systems
Messaging and conferencing technologies are fairly well established for tradition-
al environments and meetings. Of course, new features are added every year, so
you need to keep up with the changes to see which options might be useful for
your particular situation. On the other hand, the telecommunications world has
changed markedly in the past decade. People now rely on cell phones, tablets,
and wireless Internet access, and want the ability to connect as they travel. As the
cellular networks improve, mobile devices are gaining the ability to handle voice,
data, and even video connections. For example, the iPhone offers a proprietary
video chat system, but it initially works only over WiFi connections. As availabil-
ity of 4G speeds increases, more people will be interested in using the technology
over cell phone data connectionsbut beware of the bandwidth caps and costs.
Collaboration
How can several people work on the same documents? This ques-
tion forms the heart of collaboration. One teamwork solution is to assign separate
Reality Bytes: Government Teamwork
In 2010, volcanic ash from Iceland drifted over Europe and shut down air traffc
for several days. (High ash concentrations can damage engines.) Jens Stoltenberg,
Norways prime minister was one of the millions of people strandedhe was stuck
in a New York airport. So he pulled out his Apple iPad and cell phone and worked re-
motely. He commented that There are good means of communication, I have close
contacts with my offce all the times, and there are a lot of activities in Norway
where we try to reduce the consequences of the volcano in Norway.
Adapted from CNN Online, Stranded Leader Runs Country by iPad, April 17,
2010.
517 Chapter 8: Teamwork
issues to each person. Working independently, each person creates documents that
are then reviewed by the rest of the team. But some projects are not easily divided,
and sometimes groups of people have to work together simultaneously.
Networks and e-mail systems make it possible to send documents to each per-
son. But what if you need to identify the changes made by each person? Or what
if you need to change directions and revert to an earlier version of a spreadsheet?
And how do you handle issues in a hierarchical system where each person reviews
a document and approves it before it can be forwarded to the next authority? With
paper-based systems, these issues are generally handled by markups and hand-
written margin notes. Microsoft Offce contains several features that support elec-
tronic collaboration.
Documents and Changes
Sharing documents is relatively easy with LANs and the Internet. Keeping track
of when changes were made and who made them, or whether you have the current
version of a document, is more diffcult. One approach is to continually e-mail
new versions of documents to everyone in the group, but it is diffcult to ensure
everyone has the current versionor even knows where the current version is
located. Ultimately, the best approach is to store the documents on a central serv-
er. These tools are described in the following sections, but you might not have
them available; or some people might not be able to access them. Even if you do
have centralized tools to handle documents, you might want to track individual
changes.
Figure 8.8
Shared documents. By tracking changes, you can record the suggestions by each
team member. The toolbar makes it easy to accept or reject the changes as they are
merged into the fnal document.
518 Chapter 8: Teamwork
Over the past few years, Microsoft has introduced several changes to the Offce
software suite. Some of the most important changes have been made to support
teamwork. One of the most useful features is the ability to track changes in Word
documents. Figure 8.8 shows an example. To see the power of this option, begin
by creating a new document and typing a couple of sentences. Then choose the
Review/Tracking/Track Changes option. Now add a new sentence and delete or
replace a few words from an existing sentence. As you make the changes, Word
adds markup notes. You can send the document to other people on the team and
all changes they make will be marked. When you get the document back, you can
quickly see the changes that were made. The Reviewing toolbar contains icons to
help you fnd the changes and accept or reject the changes with a single click. The
markup annotations are commonly used for Word documents. For spreadsheets,
you need a few more steps because the annotation is different.
The protect document options provide additional control over the document.
You have the ability to control what changes (if any) other people can make. For
instance, if you need to maintain consistency with other documents, you can pre-
vent people from adding styles. You can also limit which team members can edit
your document or allow them to edit certain paragraphs or cells in a spreadsheet.
Another option is to not allow people to change the actual document but give them
the ability to add comments. Adobe Acrobat has similar features that enable you
to specify the items that can be changed by other users. You can password-protect
the document and limit users to entering form data or allow them to modify the
document.
Excel uses the protect document option under the Review ribbon bar to restrict
editing to specifed people. The Sharing feature also tracks the changes that ev-
eryone makes to the spreadsheet. Once you have enabled sharing, you can use the
Track Changes option to highlight recent changes. The system also keeps a history
of all changes, so you can rollback changes to a prior versiona useful feature if
someone makes a major mistake or accidentally deletes important information.
The ability to track changes and restrict changes is a powerful tool for team-
work. At some point in creating work you need to lock down the changes. Even
if everyone initially contributes to a document, you need to freeze the changes so
everyone can work forward from the same point. If people keep going back and
changing costs or plans, it alters the rest of the project planning. The ability to
perform these tasks electronically makes it easier to share documents. You no lon-
ger have to worry about having multiple copies foating around and trying to fnd
them or trying to identify what changes were made.
Version Control
Version control is a powerful tool both for teams and for individual documents
because it automatically saves every revision. Most documents need multiple revi-
sionswhether they are text documents, spreadsheets, or artwork. Have you ever
created a spreadsheet, made dozens of changes, and then realized that you were
better off with the frst version? Multiply this situation by the number of team
members and throw in a changing environment. Your manager or client walks in
and says that last weeks version was much better. Version control systems save
multiple copies of every document. As shown in Figure 8.9, each revision is saved
independently along with comments and the name of the person who modifed the
document. At any time, team members can revert back to an earlier version. You
can also open an earlier version and copy just a few elements and paste them into
the current version.
519 Chapter 8: Teamwork
Most version control systems work from a database. You check out a fle when
you want to change it. When you are fnished making changes, you check in the
fle and add comments about the changes. The comments can be almost anything,
but you want to add enough detail so others understand what was changed. The
members of the team should discuss the types of comments and level of detail
that you expect to see in the version control system. Ideally, the version control
system should be integrated into your fle server so that versions are automatically
maintained, or at least the team members are reminded to check out/check in the
documents.
Version control can be provided in multiple ways: (1) Embedding the versions
within the fle, (2) Windows keeps versions whenever a fle is saved, or (3) Using
a central database server to save versions. Microsoft Word used to support embed-
ded versions, but the option was dropped with Offce 2007. Excel still supports
a history of changes when you create a shared workbook. Embedded versions
are easy to create, but can be problematicthere are horror stories of companies
sending out Word fles to clients without removing the prior versions. Windows
supports versioning through its System Protection architecture. By default, it is
enabled for the main system drive, but you need to manually activate it for ad-
ditional drives or partitions. With System Protection enabled, Windows automati-
cally keeps a shadow copy of a fle whenever you save a new version. You can
browse to the fle, right-click it, and choose Restore previous version to pick the
version you need. SharePoint, described in another section, has a more powerful
system for version control, where all copies are archived in a central database and
can be retrieved and managed with version control tools.
Figure 8.9
Version control. Each revision of the document is saved individually along with
comments. At any time, team members can rollback the changes and revert to an
earlier version. Or, they might simply refer to an earlier version and copy sections to
be pasted into the current version.
Region Sales Forecast
North 235 312
South 334 416
East 116 268
West 645 879
Region Sales Forecast
North 235 312
South 334 416
East 116 315
West 645 879
Region Sales Forecast
North 235 294
South 334 418
East 116 145
West 645 806
Monday, initial version, Bob Jackson
Tuesday, new East forecast from marketing
Thursday, marketing implements a new
forecasting formula
Region Sales Forecast
North 235 312
South 334 416
East 116 315
West 615 798
Monday, CEO throws out marketing
formula, reverts to old and modifies West
520 Chapter 8: Teamwork
Wikis and Online Applications
You have probably used the Wikipedia, the free online encyclopedia created by
Jimmy Wales and Larry Sanger. The key feature of the encyclopedia is that any-
one can create and edit content. What you might not realize is that the underlying
Wiki software is available for organizations to use for their own purposes from
MediaWiki. Once you install the software, your employees can use Web brows-
ers to create shared content. Drafts can be created and edited by multiple people.
Links can be built between projects. Employees can return later to search for in-
formation. Effectively, the system can be used much as a giant bulletin board or
Web site, but it is easier to create and edit text, images, and video. Depending on
the situation, you could even open up the Wiki to your customers, so they can
share their stories about how to use your products and services. As another exam-
ple, the HRM department might use a Wiki to create and manage job descriptions.
Managers can share the defnitions instead of creating new ones from scratch. Em-
ployees could add elements over time, making the descriptions more dynamic and
more accurate.
As shown in Figure 8.10, if you need to share more formal documents created
by word processors, spreadsheets, and slide shows, you could consider using the
online applications, such as those provided by Google. These Web sites enable
users to create and share documents on a Web server, where workers use brows-
ers. The Web site maintains the underlying software, so you simply purchase a
monthly subscription for each employee. More importantly, the fles are stored
in one location that can be shared with anyone else in the organization. Because
it uses basic Web technologies, authorized employees can read and edit the fles
from almost anywhere in the world. The application providers (e.g., Google or
Microsoft) provide automatic backup and recovery services. Their servers handle
In-house Wiki
(Job Descriptions)
Web-based applications
Documents and
Spreadsheets
Data and documents are
shared on a Web server.
Figure 8.10
Wikis and online applications. Wikis make it easy for people to create work on
information together. Web-based applications are designed to share complex word
processor and spreadsheet documents.
521 Chapter 8: Teamwork
most of the traffc, so users can work with fairly simple client computers and mod-
erate-speed Web connections.
Information Rights Management
What would happen if your marketing forecast containing your top customer list
and expectations was delivered to your competitors? Or what if your employee
list with salaries, bonuses, and manager comments was distributed throughout the
company? Obviously, these are dangerous outcomes. How do you prevent them
from happening? As explained in Chapter 5, you can store the documents on a
server and assign access controls so only certain users can read or change them.
But how do you prevent one of the authorized employees from copying the fle to
his or her laptop or e-mailing it to someone else? The standard solution is to sim-
ply trust your employees. But what if you need a more secure solution?
Information rights management (IRM) is one answer to these questions.
The technologies are still evolving and few standards exist. The latest versions
of Microsoft Offce contain some tools to help you control access to documents.
As shown in Figure 8.11, essentially every chosen document is protected through
encryption, and the encryption keys are stored on a central server. The creator of
the document gets to specify the list of people who can open or edit a document.
These people are authenticated against the server list, and the server issues the
appropriate decryption key to open the document with the specifed permissions.
Regardless of how the document was obtained (from the server, by e-mail, or a
copy on a USB drive), the user must frst be authenticated against the informa-
tion rights server before the decryption key will be issued. Furthermore, you can
Document
Document
Protected
Document
(Encrypted)
Workgroup
server
Permission
list
Information
rights server
UserID
authentication
Decryption
key
Figure 8.11
Information rights management. Each document is encrypted and the decryption keys
are stored on a special server. Users must be connected to the network to exchange
authorization identifers and obtain the decryption key. The document is unlocked but
users are allowed to perform only the specifed tasks.
522 Chapter 8: Teamwork
specify a list of permissions that limit what each user can do with the document.
For example, you could prevent the use of cut-and-paste, or disable printing to
make it more diffcult for authorized users to make copies or spread the document.
The power of information rights management is that the permissions are en-
forced regardless of how the document was obtained. The main drawback is that
you need a server to identify the users and provide the decryption keys. Microsoft
provides a trial service to enable you to test the system, but ultimately, you would
have to pay to install a Microsoft server to implement their system. To activate
the Microsoft system, choose File/Permission within an Offce document. You
will need a Microsoft Live account or your own IRM server. With independent
servers, companies can create detailed customized permission schemes. The IRM
scheme also enables you to set an expiration date for content. After the specifed
date users will not be allowed to decrypt the fle.
Workfow
Workfow or business process management (BPM) is the concept that some
actions have to be performed in a sequence. In particular, documents need to be
delivered to and reviewed by various people in sequence. For a simple example,
consider a purchase order. You need to purchase some equipment or software for
your job. You begin by flling out a requisition form detailing the equipment and
how it will be used. You forward the document to your supervisor, who might ask
for some revisions or additional data. Once approved, it is forwarded to another
Figure 8.12
Business process management. A large purchase requires approvals and evaluations
by several groups. Each event triggers tasks by others. An automated system can
track the process and send messages to those involved as the process moves forward.
Purchase $59,000
Power $6,000
Network $7,000
Room $12,000
Estimate $84,000
Purchase
Purchase Request
Manager review
Cost analysis
1
2
Management
approval
3
523 Chapter 8: Teamwork
manager or perhaps to the MIS department. With additional revisions and chang-
es, the document is forwarded to purchasing and accounting. These departments
create purchase orders and obtain responses and information from vendors. Some
of the vendor information might be forwarded to you for verifcation or approval.
Ultimately, the item is ordered, delivered, and installed. Remember that this was
a simple purchase example. Team projects can be considerably more complex
with more interactions and more approvals.
In the past, organizations created workfow systems using paper documents and
internal procedures. Each document contained sign-off lines to indicate how the
document was supposed to be circulated and to highlight the approvals. As shown
in Figure 8.12, electronic workfow systems are being developed that provide sim-
ilar features for electronic documents. Of course, you could just e-mail the docu-
ment to everyone for approval, but standard e-mail messages do not provide the
desired sequencing or the ability to track the current location of requests. Work-
fow systems work with e-mail but add the desired sequencing that you provide by
flling out a sequenced list of addresses. Each person receives the message with
attached documents. When fnished with the document, the message is forwarded
to the next person on the list. Ideally, the workfow system would provide feed-
back indicators to everyone on the list, so that you could check on the progress of
individual items or get a list of items that are likely to show up on your desk in
the next couple of days. Microsoft has embedded workfow features into Offce
and SharePoint, but more sophisticated controls are available through specialized
vendors such as Legato. Chapter 6 explains that workfow processes are also sup-
ported within ERP packages, because transactions involve approvals and over-
sight. Some systems support complex rules with conditions and multiple routing.
Some even provide programming languages to handle complex conditions and
interactions with other systems.
Group Decision Support Systems
How do groups make decisions? How can dozens of people present their ideas
and questions? How can you keep track of the various statements and problems
raised? Note taking at meetings is the traditional answer to these questions, but in
some cases, there is a better answer. Specialized tools such as a group decision
support system (GDSS) were created to answer these questions. Most versions
of a GDSS use a special meeting room, where each participant is seated at a net-
worked computer. A facilitator operates the support tools and keeps the discussion
moving in the right direction. Before the meeting, the primary decision maker
meets with the facilitator to establish the objective of the meeting. They set up
sample questions and design the overall strategy.
Typical meetings begin with a brainstorming session, where participants are
asked to think of ideas, problems, and potential solutions. They type each of these
into categories on their computers. The basic ideas and suggestions are stored in
a database and shared with the group through the networked computers. In some
ways, the sessions resemble online forumswhere people respond to comments
and ideas.
In terms of discussion and comments, the facilitator can choose individual
items and project them on a screen for the entire group to analyze. Participants can
write comments or criticisms of any idea at any time. This system is particularly
helpful if many participants come up with ideas and comments at the same time.
524 Chapter 8: Teamwork
The computer enables everyone to enter comments at the same time, which is
faster than waiting for each person to fnish speaking.
Another feature of using the computer for the entry of ideas and comments is
that they can be anonymous. Although each comment is numbered, they are not
traced back to the original author, so people are free to criticize their supervisors
ideas. Anonymity reduces embarrassment and encourages people to submit riskier
ideas.
At various points, the facilitator can call for participants to vote on some of
the ideas and concepts. Depending on the software package, there can be sev-
eral ways to vote. In addition to traditional one-vote methods, there are several
schemes where you place weights on your choices. The votes are done on the
computer and results appear instantly. Because it is so easy to vote, the GDSS
encourages the group to take several votes. This approach makes it easier to drop
undesirable alternatives early in the discussion.
One useful feature of conducting the meeting over a computer network is that
all of the comments, criticisms, and votes are recorded. They can all be printed at
the end of the session. Managers can review all of the comments and add them to
their reports.
In theory, a meeting could be conducted entirely on a computer network, sav-
ing costs and travel time if the participants are located in different cities. Also, if
it is designed properly, a GDSS can give each participant access to the corporate
data while he or she is in the meeting. If a question arises about various facts, the
computer can fnd the answer without waiting for a second meeting.
Perhaps the greatest drawback to a GDSS is that it requires participants to type
in their ideas, comments, and criticisms. Most people are used to meetings based
on oral discussions. Even if they have adequate typing skills, a GDSS can inhibit
some managers.
Along the same lines, in a traditional meeting, only one person speaks at a time,
and everyone concentrates on the same issues at the same time. With a GDSS,
your focus is continually drawn to the many different comments and discussions
taking place at the same time. People who type rapidly and fit from topic to topic
will fnd that they can dominate the discussions.
In terms of costs, maintaining a separate meeting room with its own network
and several computers can be expensive. Unless the facility is used on a regular
basis, the computers will be idle a great deal of the time. When you factor in the
costs for network software, the GDSS software, and other utilities, the costs mul-
tiply. One way to minimize this problem is to lease the facilities that have been
established by a couple of universities and some companies (e.g., IBM).
The use of a GDSS also requires a trained facilitatorsomeone who can lead
discussions, help users, and control the GDSS software on the network. Hiring an
in-house specialist can be very expensive if there are only a few meetings a year.
Again, using facilities from an outside agency can reduce this cost, but it means
that someone outside your company is watching and controlling your meeting. Al-
though most facilitators are scrupulously honest, there might be some topics that
you do not want to discuss with nonemployees.
One way to overcome these limitations is to alter the approach to meetings. In-
stead of requiring everyone to get together at the same time in one room, meetings
could be held via network discussion groups. Each participant could read messag-
es, add comments, and vote on issues electronically at any time from any location.
Again, the Internet offers possibilities to provide these facilities, but it could be
a few years before organizations and managers can accept the changes required.
525 Chapter 8: Teamwork
Knowledge Management
How does an organization remember past events? When an event
arises similar to one you dealt with in the past, do the employees use the knowl-
edge gained from the prior experience? What happens if several key managers
leave your company? These questions are critical to reducing costs, maintaining
continuity, and improving the organization. Every organization operates on some
type of business processes. Some frms are highly structured and spell out de-
tailed steps to follow in almost any situation. Other companies evolve implicit
procedures over time. Many organizations make the same diffcult decisions every
month or every year. Diffcult decisions can require the participation of dozens
of employees and analysis of gigabytes of data. It would be nice if the organiza-
tion could keep the knowledge gained from every decision and apply it to similar
RealityBytes:TheU.S.PatentOffce
Many people have criticized the U.S. Patent and Trademark Offce (USPTO) in the
past few years. The offce has issued several dubious patents that many people argue
should not have been granted because other systems already existed to do the same
thing. Patents are only supposed to be granted for new, non-obvious inventions.
Once a patent is granted, the owner gains a huge beneft in any court fght. Anyone
challenging it has the burden to prove that the prior work existed and was signifcant
enough to overturn the patent. The patent examiners are also overwhelmedfacing
a backlog of more than 600,000 applications in 2006. Patenting software applica-
tions takes four years from the date of submission to resolution. The area of patents
for computer code is also troublesome because much of the early work was never
published since patents for software have existed for only 20 years, there are few da-
tabases, and the examiners have little experience with computer code. Several people
and organizations have proposed projects that could help patent investigators. The
overall goal is to create a knowledge management system that would create a giant
library of existing practiceslargely by collecting code and tagging it with search-
able notes. Manny Schecter, an associate general counsel for IBM observed that the
[they] need a tool that will enable sifting through the code in such a way thats use-
ful to the patent examiner. We should be able to have it done this year. John Doll,
commissioner of patents, noted that theres a lot within the open source community
thats valid prior art, but because of how its stored, its not accessible to examiners.
We have a hope that if we have a standardized system, we can fnd it in the future.
Others have suggested using a Wiki approach to enable the development community
to contribute knowledge, but Doll noted that the problem we have is we have a stat-
ute and were restrained from opening the examination for anyone other than a pat-
ent offce examiner. However, he also suggested that it might be possible to allow
outside comments between the time the application has been made public and before
the patent is awarded. In the meantime, the USPTO is likely to continue granting pat-
ents for work that essentially copies things done 30 years ago. The complications are
the major reason software was not originally considered patentable, and why Europe
does not grant software patents.
Adapted from Eric Hellweg, The Patent Offce's Fix, Technology Review, January
13, 2006.
526 Chapter 8: Teamwork
problems in the future. In the past, maintaining organizational knowledge was a
key management factor in retaining and promoting key employees. But in medi-
um-size and large organizations, turnover, distance, and the challenge of fnding
experts can make it diffcult to maintain and share the knowledge. So, some com-
panies have attempted to create knowledge management (KM) systems.
A KM is designed to store any type of data needed to convey the context of the
decision and the discussion involved in making the decision. While the system
might contain rules, it is primarily a giant database of easily accessible data for
experts. KM systems are designed to organize information and to assist people
in collaborative projects and research. The system can be relatively unstructured
and often consists of many individual cases. Decision makers can search the sys-
tem for cases with features similar to their current issues. The cases are cross-
referenced so that a decision maker might research one aspect of a case and fnd a
related issue. The links make it easy to explore the related issues, tying together a
variety of concepts and identifying related problems or consequences.
Because the feld is relatively new, the defnition of KM is somewhat nebulous
and many software vendors promote tools as useful for KM. One of the diffcul-
ties is that the decisions and knowledge required can be different for each orga-
nization. And organizations may approach decisions differently, so it is unlikely
that a single tool will be useful to every company. Instead, each company needs
to evaluate specifc decisions to determine whether it will be useful to explicitly
collect the information and process knowledge that was involved in making the
decision.
One of the biggest challenges with KM systems is creating an organizational
environment that encourages decision makers to store their knowledge in the sys-
tem. Initially, the system will have little data, and the early decision makers will
have to spend a great deal of time organizing their discussions and creating the
fles and links necessary to make the system valuable in the future. Companies
need to give managers enough time to consolidate their information and provide
incentives to encourage them to help build the new system.
Organizational Memory
Organizational memory represents the knowledge held within the company and
the processes and procedures used to perform the primary tasks. Imagine what
would happen to an organization if all of the managers retired on the same day
and all of the procedure books and documents were destroyed. All of the business
processes would have to be reinvented. Sometimes reinventing new processes can
result in more effcient systems (known as process reengineering). But it takes
time to re-create all of the knowledge.
Now, think from a more positive perspective. How can information technology
be used to improve organizational memory? Perhaps some events occur only rare-
ly and no one remembers them. Or, perhaps employees try to re-create the wheel
for every new event. If you can store the organizational memory in a searchable
database and make it easy to use, employees can turn to it to obtain fast, accurate
answers and even solutions to current problems.
One of the challenges to KM lies in getting everyone to use the system. Many
times it is hard enough to solve a current problem. Most workers will complain
about the lack of time to enter all of the issues into the computer. For that reason,
KM has to become part of the groupware project. Employees need to store the in-
formation so that they can share it with teammates. Organizing it for future use is
527 Chapter 8: Teamwork
almost a secondary consideration. By using the system to gain immediate advan-
tages (collaboration and instant access to data), employees will have an incentive
to store the informationcreating the organizational memory in the process.
Service Processes
Service frms probably have the most to gain from the use of a KM system. Pro-
duction systems typically already have engineers and support frms testing new
ideas and tracking problems. This production knowledge is often saved explicitly
or discussed as a professional discipline. Service frms such as lawyers, doctors,
and fnancial institutions, have less specifc processes. Often the service is depen-
dent on one or two people within the frm.
As shown in Figure 8.13, documenting the processes makes it possible to im-
prove the quality of the service. For example, a major premise of the ISO 9001
(and related) quality standard is that all processes need to be documented. You
also need to assign measures that enable you to identify problem areas and mea-
sure your progress when you make changes. Theoretically, you could write all of
the documentation and assessment on paper forms and stash them in a fle cabi-
net. A more useful approach is to store all of the documents and assessment mea-
sures and comments in a KM system. The electronic system makes them available
throughout the company so that everyone can fnd the appropriate process, can see
the reasons and interactions for the process, and can suggest improvements.
Employee Client
Region Sales Forecast
North 235 312
South 334 416
East 116 315
West 645 879
Processes and
workow
Steps:
Client Interview
Project denition
Data collection
Forecasts
Assessment Measures
Quality
Productivity
Process evaluation and continual improvement
Figure 8.13
Service process improvement. A major step in quality improvement is to document
each step and provide an assessment measure. Ongoing evaluation of the processes
and measures shows you what areas need improvement and measures your progress.
528 Chapter 8: Teamwork
Microsoft SharePoint
Where can you fnd a system that provides these groupware ca-
pabilities? The benefts of the tools are relatively strong, but will it be expen-
sive and require huge amounts of training to get workers to use these tools? In
some cases, the answer is yes. Depending on your needs, you can buy specialized
products in most of the groupware categories. On the other hand, Microsoft has
integrated groupware tools with Offce using the SharePoint product. As shown in
Figure 8.14, SharePoint is a set of utilities that reside on a departmental server de-
signed largely to share documents over the Web. Currently, Microsoft offers two
version of SharePoint: (1) SharePoint Server is a free add-on with Offce and
Windows Server, and (2) the enterprise version which must be purchased sepa-
rately. The discussion and capabilities described here are based on the free ver-
sion. Although the tools may not be perfect, they are relatively inexpensive and
easy to use. Consequently, you can install them and get employees using them
fairly quickly. In terms of the cost, keep in mind that you will probably have to
install a departmental server.
Most of the SharePoint tools use standard Web protocols, so authorized users
can use them even when they are traveling. A special Web site has to be created
to support the tools. Generally, this Web site should be run on a company server,
using standard security precautions. If you want higher security, you can run the
Web site as a secure site and encrypt the data transmissions. Small companies
might consider obtaining the service from their ISPs. Participants are required to
log in to the system, and security controls can specify detailed access rights.
Communication and Scheduling
It is always amazing to learn how diffcult it is to contact everyone on a team.
People work on many projects, at different times, in different locations. Conse-
quently, even simple information can be hard to share. Basic announcements are
useful for these situations. Announcements are short messages that are displayed
Figure 8.14
Microsoft SharePoint overview. SharePoint Server provides several useful tools to
support teams and collaboration. It requires running a server, but it also integrates
well with Offce.
Communication
Contacts E-mail
Chat Discussion
Survey Lists
Project Management
Tasks Schedule
Calendar
Collaboration
Libraries Shared documents
Tracked changes Version control
Wiki
Workfow
Routing
Alerts
529 Chapter 8: Teamwork
Technology Toolbox: Collaborating with SharePoint
Problem: You need to collaborate on a project with several workers.
Tools: Several groupware and collaboration systems have been created in the last de-
cade, but SharePoint is probably the easiest to confgure and use since it is integrated
with the standard Offce suite.
The drawback to SharePoint is that you really need a departmental server running
the latest version of Windows Server software. You also have to ensure that everyone
has an account either on the server or on Active Directory. These issues are relatively
minor in a business setting, but they can be a hurdle in an educational environment.
Once you have the server confgured with the SharePoint extensions, you use the
administration tools to create a new team site and add members. You can specify the
role of each participant (browser, contributor, administrator). The system makes it
easy to e-mail each person to notify them of the site. When you confgure the server,
be sure to setup the e-mail server so participants can set alerts for changes.
You can confgure the home page of the team website with the Modify options.
For example, you can choose which items (Web parts) will be displayed and where
they are located. The main page is essentially a portal for the team that organizes all
of the work. Each person can also customize the home page with additional options.
For example, you can have the page display all of the contacts or provide links to
messages. Each day when you log on, you can check for urgent messages or examine
the progress on the task list. Programmers can create additional Web parts and cus-
tomize the data displayed on the site. Microsoft includes some pre-built parts such as
weather or stock feeds from MSN. By customizing the home page for each project,
workers can focus on the most important tasks and monitor progress. Additional fea-
tures and the standard tools are only a couple of clicks away for any team site.
Quick Quiz:
1. Why would you want to confgure the home page differently for different proj-
ects?
2. Is there a limit to the number of people you would want to place on a SharePoint
team?
3. Research the two products and list the additional features provided by Share-
Point Portal.
530 Chapter 8: Teamwork
to everyonegenerally they are displayed prominently on the frst page. Lists can
be created to display timetables for tasks, contact names, or any other category
needed by the group.
The power of sharing lists through a Web site is that members of the team can
see the lists at any time. As authorized members make changes, everyone has ac-
cess to the current data. Moreover, the lists can be organized and searched by vari-
ous categories, such as deadline, project sponsor, or participant. Some standard
lists exist in SharePoint, such as contacts and schedules. Additional lists can be
created at any time. SharePoint also maintains e-mail contact lists for teammates
and for any other core contacts that you need to share. This address book is easily
accessible by everyone, and a single click launches your e-mail editor. If you need
more powerful communication capabilities, including the ability to conduct online
meetings, you will want to add the Microsoft Communicator server. If you have
a messenger service (e.g., Live Messenger or Communicator) installed on your
computer, while you are logged into the SharePoint system, it will show you a list
of other team members and tell you if they are online. You can click on the name
for each person online and send a quick message.
As shown in Figure 8.15, SharePoint includes a discussion system. It runs with-
in the standard system without relying on external tools such as Communicator.
Figure 8.15
Discussion. You can create multiple discussion threads so all comments on a topic are
grouped together. The system maintains the group memory so teammates can check
on the reasons for various decisions.
531 Chapter 8: Teamwork
Most people are familiar with Web-based discussion groups. Discussion adminis-
trators establish topics and can specify the roles of the other team members, such
as the ability to read or reply to comments. Discussion groups are useful on team
projects to discuss issues that arise. The strength of the computer-assisted discus-
sion is that everyone has access to the comments, and the entire record is avail-
able if questions arise later. It also makes it easy to search for specifc problems.
Discussions can be created on any topic. Common business uses include overall
comments on scheduling, sharing research information, and discussing problems
that arise. You can also attach a Word document or spreadsheet to the original
message. Team members can make changes to the document and write comments
in the discussion list to explain the changes. However, the attachments can be a
little diffcult to fnd, so use this approach when you want to emphasize the dis-
cussion, not the document.
As shown in Figure 8.16, SharePoint also maintains a calendar that is tied to
the task list. You can use the calendar as a simple project management system.
The calendar shows scheduled events. You can defne recurring events such as
regularly-scheduled meetings that always meet at a certain time. The process of
creating events is similar to that used in Microsoft Outlook. In fact, you can in-
tegrate the SharePoint calendar with your Outlook calendar. You might want to
download the SharePoint events onto a laptop so you can check the calendar while
you travel.
The calendar is also tied to a task list that makes it easy to assign and monitor
tasks by employees. By scheduling tasks and assigning them to various workers,
you can easily see which tasks are on schedule and which are falling behind. You
can use the calendar and the task completion list to see if some employees need
additional help. The system does not offer all of the features of a true project man-
agement system, but it displays the basic schedules and is easy to use.
Surveys are useful for some business applications. In particular, they come in
handy when designing new systems. Generally they are used to obtain a quick
Event Calendar Recurring Event
Figure 8.16
Project events. The internal calendar integrates with the event list. You can create
tasks and assign them to team members. Recurring events are useful for regularly
scheduled meetings.
532 Chapter 8: Teamwork
perspective on individual opinions. Paper surveys are a pain. Web-based surveys
are easy to change, easy to fll out, and can instantly report the data. As shown in
Figure 8.17, SharePoint includes a basic survey-building tool. You simply write
the questions by selecting a format, entering the question, and identifying the pos-
sible responses. When you post the survey to the SharePoint site, the other mem-
bers of the team enter their selections. The results are immediately available. One
advantage of the system is that the entire process is done through Web forms. Note
that the surveys are not available to people unless they are registered in the group,
so the technique does not work as well for public surveys. However, SharePoint
does support anonymous access, and the confguration system includes templates
for building Web sites. So you could use a SharePoint site to interact with public
responses, but it takes some effort to confgure. On the other hand, professional
survey design software is relatively inexpensive and has more features for creat-
ing and analyzing surveys.
Collaboration
Until recently, most organizations shared fles through shared directories on LANs
or via e-mail. Document libraries are simply Web-based folders that hold a related
collection of documentssuch as all work on a particular project. The fles are
accessed across the Web, so they are accessible to team members anywhere in the
world. Furthermore, the group leader can establish a template so that all docu-
ments have the same look.
As shown in Figure 8.18, once the site is set up, accessing the documents is
easythrough the familiar File and Open commands. Generally, you will create a
Figure 8.17
Create a survey. You add individual questions to the survey. They can have a variety
of formats. After flling in the template for each question, users can enter data over
the Web, and you can instantly see the responses on another Web page.
533 Chapter 8: Teamwork
link to the directory in My Network Places so that you can fnd the documents
with one click. In a team environment, it is important to store your fles in a docu-
ment libraryinstead of on your personal machine. That way, everyone in the
group can read and contribute to the work. Once the documents are stored in the
shared library, some other powerful tools and options can be used to coordinate
the team, as described in the next sections. Note that direct access to the docu-
ments generally requires that each team member have the most recent version of
Offce installed. You will usually want to protect the document and track changes
so that everyone can see the changes that were made by others.
SharePoint can also handle version control. Moreover, version control systems
support check in and check out of documents, so that only one person can edit
a document at a timeminimizing the problem of needing to determine which
change to keep. It also tracks who made the changes and which team member is
currently using the document. If you want complete version control including the
ability to automatically track changes, you will also need Visual Source Safe, Mi-
crosofts version control software. As shown in Figure 8.19, you confgure version
control by setting the properties for the document library. You access the confgu-
ration options within the document library: Settings/Document Library Settings/
General Settings/Versioning Settings. Other options enable you to specify a de-
fault template for new documents to encourage teammates to apply a consistent
style so documents look the same. Furthermore, you can require that documents
be approved by the owner of the group site before they are made available to
everyone.
Figure 8.18
Shared documents. You can use the upload link to transfer a fle to the server for
sharing. You can also use the New Document link to add a Word document directly to
the folder. You can open and save any existing document directly over the Web.
534 Chapter 8: Teamwork
Once version control is confgured, the process is automatic. When a team
member edits and saves a document, SharePoint automatically creates a new ver-
sion. From the document library, you can choose the drop-down action list to se-
lect versioning. As shown in Figure 8.20, you will see a list of the versions along
with dates and optional comments. From this version list, you can open prior ver-
sions to copy desired sections. Or you can delete an entire version, including the
latestcausing the system to revert to the prior version. However, in general, you
should avoid deleting versionsyou never know when the changes or data might
be useful. Instead, simply copy the older version, make the desired changes, and
save it as the new version.
Sharing documents presents additional problems, particularly concurrent
changes. What happens if two people alter a document at the same time? When
the versions are saved, which changes should be kept? One solution to this prob-
lem is to use Check-out/Check-in to lock the document. When you check out a
document, no one else will be able to edit it until you make your changes and
check it back in. If you plan to make major changes to a document and need to en-
sure that no one else alters it until you are fnished, you should use the check-out
option. Other users will be notifed that you have the document open and will be
allowed to read it but not make any changes.
Figure 8.19
Confgure library options. Use the server options to set up version control. Additional
options are used to specify default templates so all contributed documents follow a
standard style. You can require that fles be approved before they are made available
to the team.
535 Chapter 8: Teamwork
Workfow
Although it is not as sophisticated as specialized business process management
systems, SharePoint provides a couple of tools to help with workfow. These tools
integrate the features of communication and collaboration. Routing documents
and messages is a useful workfow tool. For example, your manager probably
wants to review recommendations that you make, purchasing managers are re-
sponsible for approving the purchase of major items, and important documents
have to be approved by the legal department. Projects tend to have discrete steps.
Sometimes the steps are as simple as obtaining an approval and comments from
someone before proceeding.
As shown in Figure 8.21, it is straightforward to establish a workfow process
in SharePoint. Simply select the document from the library and choose the Work-
fow option. In this case, workfow means that the document and your message
will be e-mailed to a list of team members in order. The actions offered to each
person depend on the type of workfow that you choose. The two main types are
shown in the fgure. To access the other two, you need to change the site proper-
ties. The four types are: (1) Approval, (2) Collect Feedback, (3) Collect Signa-
tures, and (4) Disposition Approval. The Approval method sends the document
to each person and gives them options to (a) approve, (b) reject, (c) forward the
message to someone else to handle the approval, or (d) request changes. If one of
the recipients rejects the document, the process is interrupted and it is returned to
the sender. The Feedback option asks each person to enter comments. When the
last person has responded, all comments are returned to the originator. Collecting
signatures requires that the company have a digital signature system in place, and
it is integrated into and requires the use of Offce software (such as Word), not just
Figure 8.20
Version control. Choosing the version option from the document library screen shows
you the prior versions, who edited them, and the comments that were added. You can
open prior versions to copy sections or simply revert to the prior version.
536 Chapter 8: Teamwork
Technology Toolbox: Meeting Space and IM
Problem: How can you meet with a few people online to discuss a document?
Tools: Several online meeting systems have been created to help you conduct a
meeting for a small group. Microsoft Meeting Space is a free tool that is built into
Windows Vista. You will also want to use Instant Messenger (IM) or Communicator.
More sophisticated systems are available as stand-alone packages or as Web servic-
es, but they can be expensive. IM and Communicator support both voice and video
connections as long as you have microphones and webcams.
The easiest way to start a meeting is to fnd the participants and connect through
IM frst. Otherwise, you can start a meeting and e-mail them an invitation. IM needs
to be confgured by each person with an e-mail account. Microsoft servers help users
fnd each other. Use Communicator if you need more privacy and security.
Setting up a meeting is as easy as having the host start Meeting Space, and enter
a meeting title and password. If the IM connections have already been made, simply
click the users name in the display list. Otherwise, click the link to invite people and
follow the instructions to save and e-mail the invitation fle.
Once the meeting connections have been established, you can start a program
and click the Share option so that others can work on the document or drawing. Ev-
eryone sees the changes, but only one person has control at a time. The fle and the
software remain on the computer of the person who shared it so it works even if only
one person has the software installed.
You can also share documents or PowerPoint fles as notes. Everyone can see
them, but only one person can change them at a time. Remember that you need rela-
tively fast connections (upstream and down) to transfer voice and video. If the con-
nection becomes overloaded, you can stop the video transmission or switch to tele-
phones.
Quick Quiz:
1. What problems are you likely to encounter if more than four or fve participants
try to use online meeting software?
2. Why is voice communication important in an online meeting?
3. Is a video connection critical to online meetings?
537 Chapter 8: Teamwork
the Web browser. The Disposition option is a request sent to a list of people asking
if expired content can be deleted.
More complicated workfow rules can be created with InfoPath and Microsoft
Project. All of these tools integrate with some minor programming. For example,
a list can be created to describe the state of a document (draft, approved, fnal).
Then various conditions and triggers can be applied to specify conditions for each
state and how the document must be handled. For instance, two specifc people
must approve a document before it can leave the draft state and move to the next
steps. Or, a document must have three completed and approved fgures before it
is considered to be complete. These rules require some effort to set up, but once
established, the system enforces the basic procedures of the business. Moreover,
team members can check on the progress of a project to see what steps remain, or
identify which team member is holding up a particular document.
Another powerful workfow technique is to add alerts to the shared items. As
shown in Figure 8.22, you can set an alert so that you are notifed when a document
is changed. For example, you might need to obtain your supervisors approval be-
fore continuing with a document. Save the document in the shared folder, notify
the person that it is available, and then attach an alert to the document. When the
document is revised, you will be notifed by e-mail automatically. You can avoid
bothering your manager, or wondering if he or she has gotten to the document yet.
Note that you should inform everyone about these capabilities, partly so that they
can take advantage of them, but also to minimize privacy issues. You can attach
an alert to almost any object in SharePoint, including discussions.
SharePoint Confguration
Because SharePoint has so many options, it takes some time to learn to use Share-
Point effectively. Once a site is confgured, the basic options are generally acces-
sible through tabs or drop-down menus. Figure 8.23 shows some of the options
confgured for this particular site. Many of the options can be added or removed
by editing the site properties. Additional templates provide other functionality. For
example, the Site Directory template indexes all of the subsites and workspaces so
Figure 8.21
Workfow. SharePoint supports basic workfow options that will cause documents
to be e-mailed sequentially to a list of team members. The four primary options are:
approval, collect feedback, collect signatures, and disposition approval.
538 Chapter 8: Teamwork
Figure 8.22
Change alert. Almost all shared documents and lists support alerts. Whenever a
document or folder is altered, an e-mail message will be sent to you. You can use
alerts to track the progress of documents as they are revised by various people.
Figure 8.23
Document options. As you customize the site, additional options and actions become
available in the tabs and drop-down menus. Users should explore the various options
to understand the power and value of each choice.
539 Chapter 8: Teamwork
Reality Bytes: Teamwork Tools
Several online tools have arisen to help people work as groups. Many people are fa-
miliar with the basic fle-sharing tools of Google and Microsoft. But more advanced
tools exist to support brainstorming, editing, and reviewing.
Tool Site
Associations/Brainstorming
Mind Maps www.mindmapping.com
Bubbl www.bubbl.us
Mind Meister www.mindmeister.com
Spinscape www.spinscape.com
Shared Workspaces and Drawing
Show Document www.showdocument.com
Twiddla www.twiddla.com
Document Creation and Review
Writeboard www.writeboard.com
Google Docs docs.google.com
Zoho www.zoho.com
Microsoft 365 www.microsoft.com/en-us/ofce365/
online-software.aspx
Review Basics wwww.reviewbasics.com
Web Site Creation
Wikidot www.wikidot.com
Wikispaces www.wikispaces.com
Project Planning
Wrike www.wrike.com
WizeHive www.wizehive.com
Basecamp www.basecamp.com
Meetings
Adobe https://acrobat.com/welcome.html
Microsoft Live Meeting www.livemeetingplace.com
Cisco Webex www.webex.com
Go to Meeting www.gotomeeting.com
Log Me In www.logmein.com
Adapted from Logan Kugler, Online Collaboration on the Cheap: 20 Free and Low-
Cost Tools, Computerworld, June 3, 2010.
540 Chapter 8: Teamwork
users can select sites by hierarchy, department, or through a search. You also use
the site properties to control security and access permissions.
It is also possible to substantially alter a SharePoint site. In addition to basic
templates and color schemes, you can use the SharePoint Designer to integrate
additional functionality into any site and to develop new templates and options.
SharePoint is built on top of Microsoft ASP .NET, which is a substantial Web
server programming language. Using Visual Studio, programmers can develop
custom modules and integrate them into SharePoint, or retrieve SharePoint data
and perform analyses. The process requires a trained programmer, but it means
that almost any type of confguration is possible. For example, you can use forms-
based authentication to enable external business partners to contribute to your
SharePoint site. SharePoint also provides Web Parts that are modules to integrate
some specifc complex actions into SharePoint. For example, the Excel Web Part
uses SharePoint (.NET) code to programmatically build new Excel worksheets.
Users can enter data on forms and your code can transfer that data to a custom
worksheet, which can then be added to a document library. These techniques will
take time to develop, but they can be used to automate relatively complex tasks.
Peer-to-Peer Collaboration
What if you do not have a server and want to collaborate? Share-
Point has many powerful features, but it requires setting up a special server to
hold the documents and handle the Web communications. Similarly, the open-
source collaboration tools rely on setting up an account with a third-party Web
site and adding everyone as users. A central server has some signifcant strengths;
such as version control, automatic backup, searches, and being easy to fnd. How-
ever, sometimes you do not need that much power, and do not want to spend the
money and time creating a central system. Also, you might want to use a tool that
supports immediate interactionwhere everyone can make changes and work on
a document simultaneously. However, remember that in any peer-to-peer situa-
tion, you are constrained by the limitations of NAT. If a person you want to con-
nect with is outside of your local network, you will need a server at least to fnd
the other computer and establish the connection. Microsoft has released several
specialty servers (Communicator Server, One Note Server, and so on), specifcally
designed to create these connections. If your company does not run these servers,
you will need to pay a third-party (e.g., Skype or Microsoft Live) to establish the
connection.
Sharing Documents
You can always resort to using e-mail (or USB drives) to share documents if you
do not have access to a server. But sometimes you want to share fles directly. As
shown in Figure 8.24, Microsoft provides a second sharing tool that has features
similar to those in SharePoint server. Confusingly, in 2010, the tool was renamed
as SharePoint Workspace. The main sharing session is still named Groove. All
participants need a copy of SharePoint Workspace installed on their computers.
Participants also need to be able to connect their computers. If everyone on the
team works for the same company, you should be able to select people from the
company network. Otherwise, you will need a server to coordinate users across
networks.
The system works by creating a shared workspace on each computer. A com-
puter can handle multiple workspacesfor different projects or teams, but creat-
541 Chapter 8: Teamwork
ing too many will slow down communications. One user initiates a new work-
space and invites other people to participate in the session. At that point, Groove
creates a folder on each of the machines to store shared documents. Any document
created on one computer is replicated to the folders on all of the other machines.
Users who are traveling and not connected to the network can still work on all of
the fles. When the computer is reconnected to the network fles on all machines
are synchronized by exchanging all of the changed data. Similar to SharePoint,
Groove also supports shared calendars, a discussion system, and a meeting tool.
It also provides alerts to notify you when a fle has been changed. Groove lacks
some features, such as version control. However, it includes a SharePoint Files
tool that makes it easy to publish the documents to a SharePoint document library.
One possibility is to use Groove to work on preliminary versions of documents
with a few people on your team, and then publish major versions to the SharePoint
server to make them available to a larger team.
Groove also supports several tools for direct communication. For example, it
contains a discussion tool that tracks comments and replies. A shared calendar can
store tasks and meeting dates. More interestingly, Groove supports an interactive
notepad and sketchpad. These tools are shared in real time with participants who
are currently connected. For example, with the sketchpad, multiple people can be
drawing items at the same timeand all changes will be displayed on everyones
screen.
If you are familiar with the Microsoft One Note application, you should know
that it also supports a couple versions of sharing. One Note is a unique appli-
cation that is designed to provide features similar to a paper notebook. You can
Workspace
Replica
Synchronized
when connected
New Workspace
Files
Discussion
Calendar
Workspace replica
Figure 8.24
Microsoft Groove. Groove creates workspaces on each team members computer.
The fles are replicated onto each machine and synchronized when the computers are
connected. Groove also supports discussions, alerts, calendars, and meeting notes.
542 Chapter 8: Teamwork
create notes by typing, using a pen on a tablet PC, drawing or importing fgures,
adding almost any type of fle or Web site, or adding audio or video notes. You
create pages on which you can put almost any content, and then you organize the
pages to make them useful. One Note also makes it easy for you to search your
typewritten notes. The Shared Notebook feature makes it relatively easy to share
a collection of pages with team members. The key step is that you must create a
master copy and place it on a folder that is accessible to all team members. They
can download and work on the notebook, and their changes will be synchronized
with the master copy. If you have a small offce, you can use a shared folder on a
desktop to hold the master copy. In larger companies, you should consider using
SharePoint to hold the master copy. It is easier for users to fnd the documents and
SharePoint maintains version control.
Immediate Interaction: Microsoft SharedView
Immediate interaction is a second type of peer-to-peer sharing that is more excit-
ing. Simple communication tools, such as instant messenger, count in this catego-
ry, but more powerful tools exist. For example, Microsoft SharePoint Workspace
supports live connections for notepad and sketchpad. Microsoft One Note also
supports Live Sharing. Another Microsoft product for interaction is SharedView,
which can be downloaded for free. All of these tools enable multiple people to
connect to a computer and work on a document at the same time. Changes made
by one person are immediately displayed on everyones computer. Of course, it
can get confusing if everyone tries to type or draw at exactly the same time, so
people usually take turns. The point is that everyone can see the changes imme-
diately. This process makes it easier to spot mistakes, fnd new directions, or so-
lidify ideas.
Shared Document
Each person sees the same
document or application.
Even if they do not have the
software installed on their
machines. Any person can be
given control to type text or
control the application.
Figure 8.25
Meeting Space. The host starts a meeting and invites others to join. The host starts
an application on his computer and shares it with the others. Everyone sees the same
document and can be given control to make changes and run the application.
543 Chapter 8: Teamwork
These tools work the same way, so this discussion will focus on SharedView
because it is free and is relatively powerful. When you use these tools, you will
also probably want to make a connection with a voice or video communication
tool such as Messenger or Skype so that you can talk to the other people while you
are making changes.
As shown in Figure 8.25, once the computers are connected through the meet-
ing software, you can share applications, or even your desktop. As a host, you
start SharedView and log in. Then you start a new session, which generates a ses-
sion name and password. The tool also creates a simple invitation with a link to
your session that you can e-mail to other people. The link routes them through
Microsofts SharedView server to make the connection.
The entire purpose of SharedView is to enable multiple people to work on the
same document at the same time. The nice part is that you can share any applica-
tioneven if it is not installed on the other computers. You can even share the
desktop, so someone else can run your entire computer. Okay, that choice is a little
scary, so be careful who you grant permission to run your desktop. It is useful if
your project involves multiple applications or if you need help from an expert. Try
sharing a drawing application such as Word, PowerPoint, or Paint. Figure 8.26
shows a simple example using Microsoft Word. Note that track changes is enabled
to make it easier to see what changes are being made. Each person can draw, add
text, or bring in images or other fles. Everyone gets to see the changes as they are
made. Remember that there is only one copy of the documentthe fle is stored
Figure 8.26
Microsoft SharedView. Up to 15 people can work on a single copy of a document,
application, or desktop. Only one copy exists, but everyone sees the same screen.
You are sharing the screen, keyboard, and mouse.
544 Chapter 8: Teamwork
on the hosting computer. The other computers are working with a simple screen
copy. You can always e-mail the fnal fle to everyone. SharedView also lets you
share any saved fle as a handout which can be retrieved immediately by the other
participants.
SharedView works with a relatively small number of people, but if you get too
many people working at the same time everyone will interfere with each other.
However, note that the system limits control to one person at a time. The person in
control has the ability to make changes to the document. The host can select who
is in control, but everyone sees the resulting changes. This tool can actually be
useful even if everyone is in the same room. Although only one person can enter
text or make changes at one time, it is easy to switch among the participants to let
people take turns.
Sharing with Multi-Touch Panels
What could you accomplish if fve people work on the same
screen at the same time? Several companies are developing computers that
use an entirely new form of interaction. It is known as a multi-touch panel. Es-
sentially, several video cameras beneath the display observe touches and gestures
by multiple fngers, which includes multiple people, at the same time. Professor
Jeff Han astounded people with his presentation in February 2006 at an annual
technology conference. Search for it on YouTube. The applications were mainly
graphical and geographical, but the ideas offer profoundly new ways of interact-
ing with the computer. Basically, users touch the screen and manipulate objects
using various motions. From a team perspective, the interesting part is that several
people can work on the same display at the same time. As shown in Figure 8.27,
Figure 8.27
Microsoft Surface. Multi-touch screens create a new interface for interacting with
objects on the screen. They also enable several people to work on objects at the same
time. (Photo courtesy of Microsoft).
545 Chapter 8: Teamwork
in 2007, Microsoft announced a coffee-table-size computer called Surface based
on a similar technology. Essentially, users can sit around the display table, and
work on a project together. The system can even recognize (some) objects when
they are placed onto the display table. The technology might remain expensive
for a few years, because it requires fast computation speeds to make it look good.
Other vendors, such as PQ Labs, are now offering glass overlays that can be at-
tached to a standard large panel LCD monitor to enable multi-touch interaction.
Because the technology is new, few people have had the opportunity to work
with it. The bad news is that it will take a few years to develop good business
and data applications. The good news is that you could invent a new way of hav-
ing people work together, build the system, and sell it for tons of money. The
initial applications are likely to be graphically oriented, because they are easier
for people to understand and to have several people contribute at the same time.
But, the basic groupware tools described in this chapter could be modifed to work
with this hardware. People could work on different elements at the same time. For
example, one person could work on fnancial data in a spreadsheet while another
works on a presentation slide. Data from the spreadsheet could be dragged over
to the presentation when it is complete. Or, perhaps two people could search for
information at the same time and combine the results to do a quick comparison.
One drawback that will slow the development of software is that all of the oper-
ating systems (Windows) are built to work with only one mouse and one keyboard
at a time. The application focus controls where typed data is entered, and Win-
dows and other applications currently support only a single focus point. Eventu-
ally, this limitation can be overcome, but it will take time for developers to change
the old applications.
File Formats and Standards
How do you collaborate and share data if everyone uses differ-
ent software? To put it another way, why is this chapter so reliant on Micro-
soft technologies? The answer to the second question largely comes down to the
fact that Microsoft Offce has about a 95 percent market share (Business Week,
July 3, 2006) and at least 80 percent in businesses (Forrester, 2009: http://www.
networkworld.com/news/2009/060409-forrester-microsoft-offce-in-no.html).
The underlying issue is that if you want to share documents, everyone needs to
be able to read the fles. Microsoft has largely relied on proprietary fle formats.
Even though some programs exist to convert fles into other formats, the conver-
sions are never perfect; and they are likely to lose the sharing properties in the
process. To collaborate with shared documents, all participants need to be able to
read and write the fles in the exact same format. Historically, this compatibility
could be accomplished only if everyone used the same softwareand even the
same versions.
When programmers develop software, they need to design a way to store the
associated data. Historically, most companies have developed proprietary binary
fle formats that are optimized for their specifc purposes. Proprietary formats had
the side beneft of encouraging everyone to adopt the same software to avoid the
conversion hassles. The problem of transferring binary fles is bad enough when
everyone uses the same basic hardware. Binary fles store data in the underlying
format of the processor on which they were created. These formats vary for differ-
ent types of computer processors. The World Wide Web was actually designed to
solve this particular problem. Physicists wanted a way to share their research, so
546 Chapter 8: Teamwork
Web pages are defned as simple text fles that can be read by any type of comput-
er, along with the markup language (HTML) to display pages consistently. How-
ever, HTML is not powerful enough to handle complex documents, so the world
is still searching for a method to share word processing documents.
The International Organization for Standardization (ISO) approved the Open
Document Format (ODF) in 2006 as a world-wide standard for storing common
offce documents. Conceivably, if enough vendors adopt this format, it will be eas-
ier for competitors to offer new tools, particularly collaboration tools, that work
with documents created from any software. Support for most of the ODF stan-
dard is built into Microsoft Offce (use File/Save As and pick the Open format).
But these formats simply enable people to read documents with other software.
Standardized support for collaboration notes and security are weak. Microsoft has
made its fle formats more accessible, but it is not clear that other companies will
adopt the features.
Cloud-Based Collaboration
Another way to share documents and collaborate is to use one of the online brows-
er-based systems. As browsers gain more power, it has become possible to create
relatively complex applications that run on the browsers alone and store the data
on a Web server. The two leading sites are Google Docs and Microsoft Live. Both
offer free access with a limited amount of storage or you can purchase accounts
with more storage capacity and other options. For example, Google Docs offers
business accounts for $50 per person per year. These accounts could be used by
one person to create common documents (word processing, spreadsheet, or slide
show). However, the real strength comes with the fact that the documents are on a
cloud server. With the documents in a central location, multiple people can access
them. By relying on Web browsers, it is not necessary for users to install software,
and the fles can be reached using almost any device from anywhere in the world.
Reality Bytes: How Do Workers Communicate?
In 2009, Forrester Research conducted a study of 2,001 American workers at me-
dium-to-large organizations in terms of their technology usage. The results showed
that several predicted trends have not yet taken root in mainstream corporations.
Only one-third used laptops for work and one in nine had a smartphone. Almost 20
percent shared a PC with a coworker. In terms of communication, e-mail was the
most frequently used methodwith 60 percent of the workers saying they checked
e-mail at least hourly. Almost three-fourths said they never use instant messaging at
work. Most could simply talk to coworkers or use the phone. Many people blamed
lack of IT support for newer tools. Around 70 to 80 percent of the workers never
use groupware tools, including Web conferencing, Microsoft SharePoint, social net-
working, or videoconferencing. Of those who did use these types of systems, less
than 20 percent said they were experts and about the same number said they were
very satisfed with the tools. At the same time, 45 percent of them said they spend
three or more hours a week looking for important information.
Adapted from Eric Lai, 8 Ways the American Information Worker Remains a Lud-
dite, Computerworld, October 12, 2009.
547 Chapter 8: Teamwork
Figure 8.28 shows an example of a simple spreadsheet created in Google Docs.
The tools provide basic functionality and are built using commands you are al-
ready familiar with. The Google system relies on menu commands, which you
can browse to see what features are available. Partly because of limitations with
browsers, functionality is somewhat limited compared to the PC-based Offce pro-
grams. For example, there is no simple copy-and-paste operation to move a chart
from a spreadsheet into a document. Instead, it has to be saved as an image fle.
On the other hand, sharing a document is straightforward. Choose the Sharing
option in the document list and you can make the document private, public, or
share it with a specifc list of users. You can send a link to the document to people
who need to review or edit it. Google also supports up to 50 people editing the
same document at the same time (10 for presentations). Changes made by each
person are updated and pushed out to the other copies in real time. The names of
each collaborator are listed at the top of the page and you can open a chat window
to share comments.
Microsoft Live also has a set of online editing tools (www.live.com or www.
microsoft.com/live). Live started with a focus on communication tools (Hotmail
Figure 8.28
Spreadsheet in Google Docs. Spreadsheets and documents support standard features
including layout, functions, and charts. Usability and features are somewhat limited
because of the reliance on browser capabilities but it is easy to share access to the
documents.
548 Chapter 8: Teamwork
and Messenger), so the frst page still emphasizes them. Click the Offce link to
get to the main documents site (offce.live.com). Figure 8.29 shows that the tools
use a ribbon-based editing systembut there are fewer options than in the PC-
based tools. However, there is a button to download the fle and edit it with the
PC-based software if you are working with a PC that has it installed. So it is easy
to move back and forth between your local computer and the server-based copies.
Microsoft Live also makes it straightforward to share the online fles with the
public or with a select group of friends. The system also keeps versions and au-
tomatically saves your work. With the 2010 online version, Microsoft introduced
simultaneous editing. Each user must be given edit permissions and open the fle
(spreadsheet) using the Web browser. Changes made by one person are pushed out
and displayed to the other people editing the document. You can test the process
with yourself by opening two separate browser windows and editing the same
document twice.
The primary features between Google Docs and Offce Live are similar, but the
Microsoft layout and commands are closer to the PC-based versions so it might be
Figure 8.29
Spreadsheet in Offce Live. Spreadsheets and documents support standard features
and can be downloaded and edited in the PC-based tools. They also can be shared
with other users.
549 Chapter 8: Teamwork
easier to user. However, as a manager, you should be familiar with and have ac-
counts on both systems in case someone wants you to work with a specifc set of
tools. Both options are useful if you want to carry around a tablet computer. Most
of the early tablets do not have the ability to run common PC-based software,
but do support standard browsers. If you want to rely on a tablet, you need to use
cloud-based computing to create and store fles.
Summary
Working together and sharing data are crucial in todays companies. MIS can help
teams work better with tools designed to integrate data across an organization.
Managers need to know how to use a variety of tools, from data sharing over net-
works, to dynamic linking, to groupware products.
Teamwork begins with communication, and information technology provides
many ways to communicate, from voice mail, e-mail, text messaging, Web pages,
and blogs, to videoconferencing. As a communicator, one of your challenges is to
choose the appropriate communication channel for the specifc type of message.
Teamwork also requires scheduling and task coordination. Electronic calendars
and project management tools help everyone identify bottlenecks and keep proj-
ects on schedule. Meetings take big blocks of time from all managers, but they are
often critical to communication and the success of a project. Electronic meeting
systems make it possible to meet regardless of location. They also provide records
of the meetings that can be reviewed or searched later.
Collaboration requires sharing documents and knowledge. Shared document
features enable you to track changes made by all teammates. They also provide
version control so you can recover elements deleted from earlier versions. Work-
fow software helps you control the sequence of events and when people will re-
ceive each document. Information rights management provides tools to limit the
distribution of documents and control what people are allowed to do with each
document. Ultimately, an important goal of teamwork systems is to collect all of
the information used to make decisions and hold it as the organizations memory.
This knowledge management system can then be used for future decisions and
problem solving.
Microsoft SharePoint and Groove provide several tools to integrate the el-
ements of the Offce suite as well as provide communication and collaboration
tools. SharePoint makes it easy to share documents across the Web. It also main-
tains contact lists, events, and task items. All of the features are shared with team-
mates. Discussions can be created quickly on general topics or on specifc docu-
ments. Surveys can record votes on critical issues. When you need more interac-
tive tools, you can add communication and meeting tools as well as tools such as
SharedView that enable multiple people to work on documents at the same time.
Cloud-based tools including Google Docs and Microsoft Live make it easy to
share documents with multiple peopleusing only Web browsers. The tools work
for basic documents, spreadsheets, and presentations. The cloud servers make the
fles accessible to almost anyone and maintain backups and even version control.
Both tools also support simultaneous editing of documents so multiple people can
make changes at the same time.
550 Chapter 8: Teamwork
Key Words
Web Site References
Teamwork Tools
Microsoft Live Meeting www.microsoft.com/livemeeting
Webex (Cisco meeting) www.webex.com
Version control comparison better-scm.berlios.de/comparison/
comparison.html
Microsoft SharePoint www.microsoft.com/sharepoint
Knowledge Management
KMWorld www.kmworld.com
Knowledge Board www.knowledgeboard.com
KMNews www.kmnews.com
KMResource www.kmresource.com
A Managers View
Teamwork is an increasingly important aspect of management. Integration
of business units so they work together is another important issue. Effec-
tively managed, the techniques can cut costs, improve quality, and improve
response time. Communication and collaboration are key elements to the
success of any team. Groupware tools support messaging and sharing docu-
ments. Business process management tools help automate collaborative pro-
cesses by adding triggers and rules. Ultimately, storing all information on
decisions contributes to the organizational memory, and the knowledge man-
agement system can help the company make better decisions.
business process management (BPM)
check in
check out
concurrent changes
full duplex
group decision sup-
port system (GDSS)
Groupware
Information rights man-
agement (IRM)
knowledge management (KM)
protect document
replicated
synchronized
telepresence
track changes
Version control
Videoconference
Workfow
551 Chapter 8: Teamwork
Review Questions
1. What communication channels are available to teams? What are the strengths
and weaknesses of each method?
2. Do current communication and groupware tools reduce the need for business
meetings? Explain.
3. How does network address translation present problems with collaboration?
How are these problems solved?
4. Why is it helpful to use collaboration tools when sharing documents instead
of just e-mail?
5. Why is version control important to teams?
6. How is information rights management different from typical computer
access controls?
7. What is workfow processing and how is it supported by collaboration tools?
8. What are common features of a group decision support system?
9. What features are important in a knowledge management system?
10. What are the major features of Microsoft SharePoint?
11. How does peer-to-peer collaboration differ from Microsoft SharePoint?
12. Why are fle formats so important in collaboration?
13. What are the benefts to using cloud servers for collaboration?
14. What benefts would large multi-touch panels provide for small groups?
15. Briefy explain the main capabilities of the following tools:
a. Microsoft SharePoint server
b. Microsoft SharePoint workspace/Groove
c. Microsoft SharedView
d. Google Docs
e. WebEx
f. Skype
Exercises
1. Can smart phones be used for video conferences? Can they be used with
phones on other systems (e.g., AT&T v. Verizon)? Why or why not?
2. Research and compare the meeting capabilities and costs of at least two
products (e.g., Microsoft Live Meeting, Cisco WebEx, Skype). What types of
meetings (e.g., size) is each best suited for.
3. Research the costs of installing several Microsoft collaboration servers,
including Communicator, Groove, and SharePoint.
552 Chapter 8: Teamwork
4. For each of the following business situations, identify the collaboration
method you would use and briefy explain why.
a. A salesperson wants to demonstrate a complex software package to a
customer group in a different city. The customers can meet in one room.
b. A corporate vice-president wants to give a two-hour presentation of
new products to a local audience of at least 100 people, plus at least 300
company employees in multiple cities, and make it available to authorized
reporters.
c. A design team consisting of a group of four artists and a programmer, each
in a different city, need to create a new design for a large Web site.
d. Students in a club need to write a short document and create a slideshow
for an upcoming event.
e. A group of students and faculty in an investment club need to share data
and research with each other and keep records so students can follow the
work next year. Outside directors also want to be able to see selected data
and reports.
5. Most organizations have a process for submitting and approving a business
travel request. If possible, interview someone from a company or the
university about the steps involved in creating and processing a travel
request. Then describe the steps to create that process in SharePoint server.
6. Describe a business situation in which you would need to implement
information rights management controls. Describe the specifc rights you
would assign.
7. How is Skype similar to but different from Microsoft Messenger?
Technology Toolbox
8. As a team project, if you have access to a SharePoint server, have one person
create a small document that describes a computer that he or she might
wish to purchase. Set change subscriptions on the document for each team
member. Then over the next few days, have members make changes to the
document, with suggestions for different components. As team members are
notifed of changes, they should check the suggestions and either accept or
reject them by adding additional comments.
9. Use a SharePoint server to discuss a recent movie. Include links to other
review sites and if possible upload image fles or movie clips. Create a
calendar to assign tasks to each team member. The fnal result should be
a formal review of the movie. Be sure to include your instructor as a team
member.
10. With at least two people, choose an industry and assign a frm in the industry
to each person. Set up a Groove workspace. Have each person retrieve
sales and proft data for the assigned frm. Use the workspace to build a
spreadsheet that combines the data from each frm to draw charts displaying
revenue and profts for each frm.
553 Chapter 8: Teamwork
11. Set up Windows Meeting Space and create a meeting with at least three
people. Together, build a short PowerPoint slide show to come up with a new
marketing campaign for an automobile manufacturer (pick one).
12. Compare Meeting Space to One Note/Live Sharing. If you do not have
access to the software, use the Microsoft documentation to evaluate the
features of the two products. Which tool would you prefer to use for a small
team project and why? Test both tools if you have access to them.
Teamwork
13. As a group project, assume that each person in the group is a manager of a
different department. Each person creates a spreadsheet to list the salespeople
in his or her department (4 to 10), their hours worked, total sales, and
commissions. Compute the totals for each column. Once the individual
spreadsheets have been created and stored on separate computers, the
group will create a composite spreadsheet that brings in the data from each
individual spreadsheet. Compute the corporate total and draw pie charts for
each column. If possible, use dynamic linking across the network to capture
the data from the individual spreadsheets.
14. Using SharePoint, have one person write a short document. Use workfow
to send it to each of the other team members for feedback. Submit the fnal
document with the feedback to the instructor.
15. Using Groove, (or SharePoint if Groove is not available) confgure a
workspace for a project to evaluate cell phones. Use the tools to discuss the
features and try to agree on a common cell phone that could be purchased by
a company for each of the team members. Hand in the fnal document and
recommendation, with the discussion comments.
16. Using SharedView (with PowerPoint) or SharePoint workspace/Groove to
create a listing of the name and major of each person in the group. Create
a small diagram as a map that shows your current location compared to the
campus library.
17. Connect as many people as possible using a single instant messenger or chat
room system. As a topic, discuss a current movie. What problems do you
encounter? Should you limit these types of meetings to a certain number of
people? What would be the maximum?
18. If your team has to work from home on a project for the entire semester that
involves drawings, documents, and discussions or meetings, which tools
would you choose and why?
Rolling Thunder Database
19. If you have access to a SharePoint server, set up a team site to discuss
production issues. Generate queries to show production delays over time.
Put the data into a spreadsheet and graph it. Create a discussion group for the
spreadsheet and discuss possible reasons for any issues.
554 Chapter 8: Teamwork
20. (team) If you have the Groove client software, set up a workspace and build
a spreadsheet to display and chart U.S. retail sales of bicycles for at least
six years. Each person should keep notes on which sites were searched
and where data was found. Comment on any differences in data found and
produce a best-estimate chart.
21. Describe the hardware and software Rolling Thunder should install so that all
employees can coordinate schedules and conduct 15-minute meetings every
day.
22. Choose a system that would help Rolling Thunder marketing managers
communicate with retail stores to show new designs and products with the
goal of reducing the number of physical visits by salespeople.
23. Identify documents that Rolling Thunder should protect with an information
rights management system and briefy describe the desired rights.
24. What information would you recommend placing in a knowledge
management system for Rolling Thunder Bicycles?
25. Explain how version control would be useful for designing the bicycles at
Rolling Thunder. Find software that could provide version control.
Additional Reading
Han, Jeff, http://www.youtube.com/watch?v=zwGAKUForhM. The multi-
touch video that astounded the world.
Rosencrance, Linda, Sidebar: A Collaborative Difference, Computerworld,
January 26, 2004. [Using blogs as collaboration tools.]
Schlender, Brent, Microsoft: The beast is back, Fortune, June 11, 2001, 75-86.
[Outline of Microsofts new ideas for integrating data.]
Verton, Dan, Exostars Collaboration Platform Takes Security to New Level,
Computerworld, June 7, 2004. [External collaboration tool with powerful
security controls.]
Weiss, Todd R., Groove Touts Performance, Usability In Updated Virtual
Offce, Computerworld, July 8, 2004. [Alternative desktop collaboration
software.]
555 Chapter 8: Teamwork
Cases: Package Delivery
Te Industry
The package delivery industry has changed dramatically over the past few years.
In fact, today, it should probably be called the business logistics industry. Several
large mergers have altered the industry. The competition among the remaining
frms is intensifying. The primary players today are FedEx Corp., United Par-
cel Service (UPS), the United States Postal Service (USPS), and Deutsche Post
(which owns DHL and Airborne).
To understand the changes, you need to understand how businesses operate to-
day. The most important issue is that large companies operate in many locations,
within the United States and around the world. This means that companies need
to move supplies, assembled components, and fnished products. Parts are moved
from suppliers to assembly plants, and fnished products are shipped to distribu-
tion centers and retail stores. Few frms today want to move their own products
on their own trucksit just does not pay. And smaller frms could never afford to
own their own feets. Instead, the large frms have focused on effciency, time, and
price to be able to provide a complete level of delivery services around the world.
0
10
20
30
40
50
60
70
80
90
1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010
B
i
l
l
i
o
n
$
Annual Revenue
USPS
Deutsche Post
UPS
FedEx
-0.15
-0.10
-0.05
0.00
0.05
0.10
0.15
1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010
R
a
t
i
o
Net Income / Revenue
USPS
Deutsche Post
UPS
FedEx
556 Chapter 8: Teamwork
Today, that encompasses everything from freight handling (large shipments) to
overnight packages (express delivery).
UPS was at the top of the revenue list in 2003 slightly over $33 billion. DHL
was second with $24 billion, closely followed by FedEx Corp. with $22.5 billion
(Whiting 2003). However, USPS topped all of them with operating revenue of
over $68 billion in 2003; but that includes money from its monopoly position to
deliver letters to households (annual reports). The basic rankings had not changed
much by 2011 Deutsche Post and USPS had similar sales numbers at the top of the
list, followed by UPS and FedEx. Of course, the big difference is that USPS was
experiencing billions of dollars a year in losses.
Services and Information
In many ways, UPS was the leader in driving changes in the logistics industry. The
company was initially formed to deliver merchandise from manufacturers to retail
stores. This third-party service made it possible for manufacturers to increase their
sales without having to build their own distribution centers. Even smaller compa-
nies now had direct access to sales across the United States. And all companies
could use the system to ship short orders in a matter of days.
The industry has changed considerably over time as the frms have introduced
new services and combined others. FedEx introduced the concept of next-day de-
livery. At a time when many people doubted there was demand for such a ser-
vice, the company owned and then perfected the market. When computers became
cheap enough, FedEx introduced package trackingemphasizing that informa-
tion was just as important as the package (FedEx Web site) and (Ulfelder 2002).
The other carriers struggled to provide the same service, but eventually UPS,
USPS, and DHL; as well as a host of other frms moved into next-day shipping. At
the same time, FedEx began to move into ground and freight deliveries, shipping
larger items across the country and delivering packages to stores and individuals
in a few days. FedEx grew largely by acquiring other frms. DHL has an interest-
ing historylargely driven by one man: Larry L. Hillblom, who died in a plane
crash in 1995. His focus was air delivery to islands and nations in the South Pa-
cifc, and for years, DHL dominated that international market.
Overall, the international market is a challenge for any shipping company, or
even any company that wishes to ship packages around the world. Each nation
has different customs requirementsin terms of forms, taxes, and even items that
are banned. To make it more complex, most nations have their own defnitions of
items and terms. Complicating it even more, the rules tend to change over time.
Now, if you are a manufacturer shipping only a single item to a single nation on
a regular basis, you will eventually learn the procedures. But if you want to ship
different items to multiple countries, how can you gain the knowledge you need?
Ultimately, the major shipping companies (not including USPS), have created
huge online knowledge systems that automate most of the steps in shipping over-
seas. You simply fll out the declarations properly and their systems produce the
necessary forms. UPS and FedEx have special facilities to notify customs agents
when packages are arriving and produce detailed information on request. In 2003,
the United States Department of Homeland Security (Bureau of Customs and
Border Protection) proposed a regulation that all carriers have to notify offcials
of inbound cargos several hours before they arrive. The notice would have to be
electronic so that the bureau could run computerized analyses on shipping data to
spot potential terrorist threats or illegal shipments. DHL, UPS, and FedEx gener-
557 Chapter 8: Teamwork
ally already meet this requirement. The DHL system is based on Open Harbors
global trade-management system that has over 8 million trade rules (Chabrow and
Bacheldor 2003). Ultimately, it is likely that other major nations will require the
same advance notice, and all of the carriers and software vendors are building
systems to meet these demands. The key point is that shippers now offer much
more advanced services. They are not simply ferrying packagesthey are taking
responsibility for the entire process.
Many companies today use these shipping frms as the frst line of their logistics
service. Even internal shipments between factories can be handled and tracked by
UPS or FedEx. Particularly with the integration of freight, package, and overnight
deliveries, companies can fexibly select and monitor their shipments. UPS and
FedEx have divisions and special software to help companies use it as a complete
transportation system. They can schedule deliveries for different times and days.
They can even have UPS and FedEx integrate shipments. For example, if you buy
a computer from Dell, the monitor might have been shipped from Asia, unloaded
in a UPS warehouse, and then shipped directly to youwithout frst having to go
to a Dell warehouse. And it would be shipped to arrive at the same time as the rest
of the computer, which was shipped from the Dell assembly plant.
In 2006 and 2007, all carriers were hammered by rising fuel prices, both for
trucks and airplanes. Faced with increasing costs, IT needs became lower pri-
oritiesparticularly since no astounding new technology appeared. Rob Carver,
CIO, noted that for budget money it is not a stellar IT year, and that although the
FedEx security team likes features on Windows Vista, they see no need to switch
desktop operating systems when Windows XP is working fne (Preston 2007).
Competition
The major frms have consolidated to the point where they now offer essentially
the same types of services. The declining costs of technology have made it pos-
sible for all of the frms to compete with information systemsfor example, they
all offer package tracking. The rivalry is ferceparticularly between FedEx and
UPS. Both compete on the basis of global reach, quality, and price. Currently,
DHL/Deutsche Post is not in the same league within the United States, but domi-
nates in Europe and Asia. So, all frms have to focus on effciency, and effciency
often requires automationreducing the number of workers where possible, and
cutting times as much as possible. All of them have benefted from the increased
level of shipping in the past decade. Will that trend continue? Or will it level off,
forcing frms to compete harder to steal market share from each other? Informa-
tion technology has played an enormous role in many aspects of the competition.
From providing information for package tracking, to the knowledge bases for in-
ternational shipping, to route scheduling, automation, and cost cutting.
Teamwork
These companies are huge, and they operate around the world. Moving packages
and information quickly and effciently in this environment requires tremendous
teamwork. A large portion of the information technology is devoted to ensuring
that everyone down the line knows exactly what is coming. When customers enter
package data on the main Web site, the local driver knows what to pick up. Sched-
ulers communicate in real time with drivers to alter routes as needed. The pack-
age data is provided to the central hub, which optimizes the plane loadings and
fights. Data is sent to customs as well as to the local destination hubs, so drivers
558 Chapter 8: Teamwork
know the loads and routes for the next day. All through the process, customers are
treated as team members and have access to the information. Customers include
the shipper as well as the recipient. Firms that ship products can be notifed of any
problems before they become a disaster.
Additional Reading
Chabrow, Eric and Beth Bacheldor, Rules Could Force Shippers To Modernize,
Information Week, July 28, 2003.
FedEx Corporate History, http://fedex.com/us/about/today/history/.
Preston, Rob, Down To Business: Whos In For Innovation? No, Whos Really
In? Information Week, May 12, 2007.
Ulfelder, Steve, Dateline: A Timeline Of Technology Advances At Fedex And
UPS, Computerworld, September 30, 2002.
Whiting, Rick Logistics & Transportation: Ship To Sure: Tracking In Real
Time, Information Week, September 22, 2003.
Case: FedEx
The history of FedEx (ticker: FDX) is outlined on its Web site. Federal Express
began with a paper that Frederick W. Smith wrote in 1965 while at Yale Uni-
versity. After serving in the military, Smith purchased Arkansas Aviation Sales
in Little Rock in 1971. It offcially began operations on April 17, 1973, with 14
small aircraft and delivered 186 packages to 25 cities. Deregulation of air cargo
in 1977 enabled Federal Express to fy larger jets and the company grew rapidly.
In 2004, the company had a daily lift capacity of more than 26.5 million pounds
and the feet traveled 500,000 miles a day. The endpoint delivery vans logged 2.5
million miles a day (company Web site). The company reached $1 billion in sales
in 1983a mere 10 years after start-up.
Mergers
In 1989, Federal Express purchased the Flying Tigers networklargely oriented
to fights in the Pacifc region, and giving Federal Express expertise in interna-
tional shipments. In 1995, Federal Express acquired Evergreen International Air-
lineslargely because the acquisition gave it rights to deliver in China. In 1998,
Federal Express expanded into ground deliveries by purchasing RPS (Roadway
Package System, renamed Caliber System in 1996). The purchase of Caliber
Systems also gave Federal Express Viking Freight. Federal Express expanded its
freight system in 2001 by purchasing American Freightways. In 1999, FedEx ac-
quired Caribbean Transportation Services, focusing on shipments to Puerto Rico.
FedEx now has a full spectrum delivery system, from air shipping to large freight
transfers to package delivery.
In 2000, FedEx acquired TowerGroup and World Tariff. This acquisition pro-
vided important knowledge and experience in handling international shipments.
It provides customs clearance and electronic fling for all of the other divisions
of FedEx, enabling FedEx to provide end-to-end transportation around the world.
The more surprising merger happened in February 2004 when FedEx acquired
Kinkos Offce stores. For several years, FedEx had a relationship with Kinkos,
559 Chapter 8: Teamwork
so that customers could drop off packages at the local stores. All 1,200 stores in
10 countries are digitally connected, making it possible to print documents na-
tionally. The company evolved from neighborhood print shops into local business
centers for mobile professionals and small businesses. The company also handles
commercial print jobs.
Operations
The essence of package delivery seems easywhen you look at one package:
pick up a package, transfer it to a plane, fy it to the nearest airport, put it on a
delivery truck, and drop it off at the destination. The problem is that drivers have
to pick up many packages, all of them have to be sorted, planes have to be loaded
properly and fown to airports where you have landing rights, then packages have
to be unloaded, re-sorted into delivery trucks, and the drivers have to get to mul-
tiple destinations. Now, you have to do all of that fast and at the lowest possible
cost. And the mix of packages and destinations can change every day.
Scheduling and optimizing package handling and deliveries is a key element in
the operations. In 1978, FedEx put voice radios in the trucks to assist and direct
drivers. Only two years later, in 1980, the company launched a revolutionary pro-
prietary wireless data network called Digitally Assisted Dispatch System (DADS).
Dispatchers could send text messages to drivers. By reducing chatter and enabling
drivers to check the messages when they needed, the system improved effciency
30 percent in the frst day (Ulfelder 2002). In 1986, the company adopted the
wireless handheld SuperTrackers that capture data with bar code readers. The sys-
tem is the foundation for tracking packages at every step, and uploads data to the
Customer Oriented Service and Management Operating System (COSMOS).
Tracking the package at every step in the process is critical to the operations.
It provides information for the operations at the next stops, it provides data to the
customers, and it makes it almost impossible to lose a package. On average, every
FedEx package is scanned 23 times. Once a package is picked up and scanned,
the data is transferred to the central computer. At the shipping hub, the computer
routes the package to the proper conveyor belt. The package is loaded into an ig-
loo container that fts the sloping sides of the plane. The container has a scan that
represents all of the items held inside. While being routed to the proper container,
each package is weighed and the billing corrected if necessary. The weights are
also used to balance the loading of the plane. As the 160 planes land each night at
the FedEx hub in Memphis, workers unload them within 20 minutes. Packages in
the Memphis hub travel through a giant convey system to be routed to new planes
or trucks to the nearest of 22 airports. The system scans 1,000 bar codes per min-
ute. The hub alone generates about 900 MB every two and a half hours (Brewin
and Rosencrance 2001). The main FedEx hub in Memphis is a key element in the
operations effciency. FedEx can move 325,000 letters an hour through the hub,
along with 125,000 small packages per hour. The average transit time is seven
minutes (Brewin April 2004).
In 2003, FedEx rolled out a completely new handheld system. Dropping most
of the proprietary technology, the PowerPad was developed by Motorola to run
the Microsoft Pocket PC operating system. More important, the system uses the
GPRS cellular wireless service from AT&T. It is designed to completely elimi-
nate paperwork, saving couriers 10 seconds at each stop. Which adds up to $20
million in annual savings when you factor in the 3.5 million packages delivered
a day (Brewin November 2002). GPRS has data rates between 20 and 40 kbps,
560 Chapter 8: Teamwork
which exceed the 19 kbps on the older FedEx network (Brewin March 2002). The
PowerPad reduces errors by automatically checking Zip codes. It can print labels
through a label printer in the truck that is connected by Bluetooth radio. It even
checks the weather at the destination so that the driver can notify the shipper of
any potential delays. The PowerPad contains a third radio transmitter so that it can
connect via WiFi to the networks at the FedEx hub.
FedEx runs several fully automated sorting hubs. Packages are delivered at one
end, then passed on conveyor belts through weighing stations and sorted by ZIP
code to be delivered at the other side of the DC onto waiting trucks. Ken Spangler,
CIO at FedEx Ground, notes that automation is required to handle the 7,500 pack-
ages an hour. He also noted that Over the last fve years, we have been on a mis-
sion to get faster and faster. We re-engineer and speed up our lanes an average of
twice a year, and sometimes more frequently than that. Over 80,000 ZIP-code-to-
ZIP-code lanes are at least a day faster now (King 2011). An interesting twist to
the FedEx DC is that vendors are required to provide a standard interface, instead
of proprietary connections. That way FedEx can combine systems from different
vendors to achieve the best results at the best prices. FedEx developers create the
overall software and can control the performance.
Services
Providing global shipping is considerably more complex than simply transfer-
ring a package. Each nation has hundreds or thousands of different rules on tar-
iffs and procedures for importing items. Increasingly, FedEx customers were ask-
ing for information on how to ship globally. FedEx began a project in 1997 and
launched it in August 2000. Originally, the Web-based system arranged shipments
between the United States, Canada, the United Kingdom, Hong Kong, and Puerto
Rico. It was then expanded to 20 nations. The system runs on an Oracle data-
base and provides the rules and appropriate import and export forms needed. It
also lets shippers know about restrictions, embargoes, and licensing requirements.
In February 2001, the Global Trade Manager system began computing govern-
ment fees, duties, value-added tax (VAT), and other charges so that shippers can
quickly estimate the total costs. Robert B. Carter, head of the division, notes that
Global Trade Manager makes it easier to ship internationally, which can be an
intimidating experience. It allows customers to do import/export documentation
in a straightforward fashion.We are giving them [clients] access to technology
they wouldnt otherwise have (Rosencrance 2002).
In 2003, FedEx partnered with Cap Gemini Ernst & Young to offer detailed
logistics services to companies of any size. Many large companies already out-
source freight transportation (67 percent), and 42 percent outsource management
of their distribution centers. But most frms still maintain control over the rest of
the decision aspects of logistics and purchasing (Bacheldor 2003). The new offer-
ing from FedEx and Cap Gemini integrates software for transportation-manage-
ment, fulfllment management, supply chain event management, and business-to-
business hub management. With the integrated tools, customers can examine and
track shipments and warehouse or distribution center handling at the stockkeeping
unit (SKU) or even serial number level. They will be able to see the movement of
all products and obtain reports on all aspects of shipping, even though the entire
process will actually be handled by FedEx. Douglas Witt, president of FedEx Sup-
ply Chain Services, notes that the system is important because lack of visibility is
a major issue for a lot of customers (Bacheldor 2003).
561 Chapter 8: Teamwork
With the global and domestic presence of FedEx, U.S. government police agen-
cies often turn to the company for information about deliveries and customers.
Prior to 2001, FedEx generally declined to cooperate without court ordersfear-
ing retribution against employees and concern about customer privacy. Since the
terrorist attacks of 2001, FedEx now encourages its employees to watch for po-
tentially dangerous activity and it works with the FBI and other agencies. FedEx
provides access to its international customer databases, including credit-card and
payment data. The company also has the legal right to open and inspect any cus-
tomer package at willa power not even granted to police. Fred Smith, the found-
er, ordered the cooperation and sees it as an important service to society. Plus, the
cooperation helps prevent delays in package deliveries. FedEx also created a 10-
man internal police force that is recognized by the state of Tennesseegiving the
company access to police databases and the only private seat on the FBI terrorism
task force (Block 2005).
Strategy
Battling head-to-head with UPS and forging entirely new ways of doing business
have forced FedEx to focus on strategy. Technology plays a key role in its plans.
But Smith is understandably cautious. He shies away from huge projects designed
to alter everything. Instead, he says, We try to do a lot of work on the front end,
divide things into bite-size pieces, do things in a more evolutionary way (Foley
February 2, 2004). Exactly how Kinkos fts into that strategy is not completely
clear yet, but it will probably take time for the value to be realized. FedEx CFO
Alan Graf notes that it diversifes our business. Kinkos is the back offce for
hundreds of thousands of businesses (Foley February 9 2002). Fred Smith notes
only that it will enable both companies to take advantage of growth opportuni-
ties in the fast-moving digital economy. Jim McCluskey, a FedEx spokesman,
adds that it will enable FedEx to push information electronically for its clients
(Brewin January 2004). If nothing else, the stores will raise the visibility of Fe-
dEx even higherproviding a convenient location for small business services and
drop-off points for FedEx shipments. With the stagnant economy, a shift to digital
documents, and a tight battle with UPS, the market for overnight delivery has lev-
eled. FedEx is looking to the ground and international shipping to carry its growth
forward. Furthermore, the company has to focus on costs to improve profts (Fol-
ey January 2004).
In an interesting strategic arrangement, FedEx has two agreements with the
USPS that run through August 2008. FedEx uses its planes to help carry Priority,
Express, and First-Class Mail as well as the USPS international delivery air ser-
vice. The second agreement enables FedEx to place 5,000 drop boxes at U.S. Post
Offces in 340 metropolitan areas (2006 Annual Report).
Faced with the economic slowdown and rising fuel prices in 2006 and 2007,
FedEx made few changes in strategy. However, in 2007 the company announced
that it would spend $3.5 billion in fscal 2008 to build new shipping hubs in China
(Machalaba 2007). Most of the expansion in FedEx has been related to services
in China and India (2006 Annual Report). On the Kinkos side, FedEx has a deal
with Adobe to include a button in Acrobat Reader that sends PDF fles to any
selected Kinkos store for printing. Users can print documents at an offce near a
desired U.S. destination and have them delivered for a fee. Initially, 133,000 cus-
tomers had signed up for the service (Golden 2007).
562 Chapter 8: Teamwork
Teamwork
One of the challenges with growing through mergers is integrating all of the infor-
mation systems. To maintain the existing effciencies, FedEx chose to run the new
divisions independently. But that means managers do not have a single view of
customer data, and customers have to check multiple locations to fnd their ship-
ping information. In 2004, FedEx began development of its Customer Fusion da-
tabase. The package will pull data from all of the independent systems and make
it available from a single point. The product is a computer messaging system that
can talk to all of the individual applications. Larry Tieman, chief architect for the
project, notes that the message bus allows us to loosely couple the business ap-
plication, apply the proper business rules, and build a unifed application layer
(Sullivan 2004).
The company also created an integrated system for international managers in
2001. The international strategic information system (ISIS) uses a Web-based
front-end query tool to integrate data from internal legacy systems for market-
ing, sales, and inventory. It then consolidates information for local agents into
an Oracle database. The agents can then query the database and identify patterns
such as the amount of shipping by industry. A key aspect of the system is to pro-
vide business intelligence data to local agents and FedEx managers. By sharing
the same data and analysis, FedEx can better help the agents meet revenue targets
(Dash 2001).
Because FedEx develops most of its own applications, it is concerned about
software development processes. As it explores options to outsource development
and hire teams from off-shore development frms, the company needs a method
to test software code. In 2006, FedEx developed a program with the University
of Memphis to fnd new methods of testing software, including multistage system
testing, risk-based testing procedures, and an expert system for systems testing
(Krill 2006).
FedEx encourages teamwork learning throughout the IT organization. The
company has a job swap program, where employees can request to trade jobs for
a certain length of time. The swap can include temporary assignments in other
countries. The technique provides employees with a broader picture of the busi-
ness, a chance to see other problems, and to share approaches to solving them
(Pratt 2007).
Questions
1. How does FedEx use information technology to improve teamwork and
deliver packages more effciently?
2. How can FedEx integrate data from its diverse companies to improve
teamwork, without replacing all of the individual systems?
3. Why is wireless technology so important to FedEx?
Additional Reading
Bacheldor, Beth, Better Visibility Along The Transport Chain, Information
Week, September 29, 2003.
Block, Robert, In Terrorism Fight, Government Finds a Surprising Ally:
FedEx, The Wall Street Journal, May 26, 2005.
Brewin, Bob, FedEx Expands Net Reach to Mobile Data, Computerworld,
March 25, 2002.
563 Chapter 8: Teamwork
Brewin, Bob, Fedex: New Courier System Will Save $20M Annually,
Computerworld, November 26, 2002.
Brewin, Bob, Fedex To Use Kinkos Stores To Offer E-Services To Enterprise
Customers, Computerworld, January 2, 2004.
Brewin, Bob, Sidebar: FedEx vs. UPS: The Technology Arms Race,
Computerworld, April 19, 2004.
Brewin, Bob and Linda Rosencrance, Follow That Package! Computerworld,
March 19, 2001.
Dash, Julekha, FedEx Launches Global Business-Intelligence Application,
Computerworld, May 28, 2001.
FedEx Web site: http://fedex.com/us/about/today/history/
Foley, John, FedEx Success Doesnt Come With Big IT Budget Increase,
Information Week, January 12, 2004.
Foley, John, Redefning What You Are, Information Week, February 2, 2004.
Foley, John, Retail Plus: FedEx Buys Kinkos, Information Week, February 9,
2004.
Golden, Mark, Adobe Links Acrobat, Reader To FedEx Kinkos Stores, The
Wall Street Journal, June 6, 2007.
King, Julia, Extreme Automation: FedEx Ground Hubs Speed Deliveries,
Computerworld, June 6, 2011.
Krill, Paul, FedEx Seeks Improved Software Testing, Computerworld,
December 20, 2006.
Machalaba, Daniel, FedEx to Boost Spending As Slowdown Hits Sector, The
Wall Street Journal, June 21, 2007.
Pratt, Mary K., IT Job Swapping at FedEx for Fun and Proft, Computerworld,
September 10, 2007.
Rosencrance, Linda, FedEx Corp., Computerworld, March 11, 2002.
Sullivan, Laurie, FedEx Achieves Fusion, Information Week, June 30, 2004.
Ulfelder, Steve, Signed, Sealed and Delivered, Computerworld, September 30,
2002.
Case: United Parcel Service
The UPS (ticker: UPS) Web site has details on its history and growth. UPS began
in Seattle in 1907 as a messenger service, with most deliveries made on foot by
teenage boys. In 1913, the fedgling company acquired its frst car: a Model T
Ford. Merging with a couple of competitors, the company renamed itself Mer-
chants Parcel Delivery and began focusing on delivering merchandise from the
retail stores. The company also was the primary carrier of special delivery pack-
ages in Seattle for the U.S. Post Offce. In 1919, the company expanded to Oak-
land, California, and adopted its current name: United Parcel Service. After World
564 Chapter 8: Teamwork
War II, retail shopping changed, as customers drove to malls and carried their own
packages. UPS fought to provide common-carrier service in new areas, including
Chicago. Expanding into competition with the U.S. Post Offce raised regulatory
issues, and the company fought many legal battles to win the right to deliver pack-
ages. In 1953, UPS began shipping cargo on existing airline fights. Yet package
delivery had to remain inside a state to avoid regulation by the Interstate Com-
merce Commission (ICC). Fighting for three decades, the ICC fnally granted
UPS permission to deliver packages between Montana and Utahin 1975. By
1985, the company was shipping packages by air to all 48 contiguous states and,
in 1988, started its own airline. In 1993, to track the huge number of drivers and
deliveries, and to keep up with FedEx, UPS introduced the handheld Delivery In-
formation Acquisition Device (DIAD). In 1999, UPS joined the New York Stock
Exchange.
Operations
Fighting competitors from day one, UPS pioneered effciency in deliveryem-
phasizing the need to hold down costs and prices. Although UPS headquarters
are in Atlanta, it runs its operations through its main Worldport hub in Louisville,
Kentucky. The 4 million-square-foot facility handles over 100 planes a night,
pushing 600,000 packages a day through the hub. Because of a limited labor pool
and the desire to hold wages down, the facility emphasizes automation. It runs
on almost 14,000 computer devices, including 30 terabytes of online storage and
5,500 miles of fber-optic cable. It uses 122 miles of conveyor belts to move pack-
ages and sort them by bar code scanners as they fy by (Brewin April 2004). Most
of the individual packages (93 percent) are identifed by special bar codes. When
shippers fll out the shipping labels on the UPS Web site, the system notifes UPS
about incoming packages. Twice a day, this incoming information is used to create
a sort plan that confgures the hub to match the expected packages. The software
Flexible Lineup Editor reorganizes the loading and unloading positions to opti-
mize the package transfers. Packages are only touched twice by humans: once to
be loaded onto the conveyor belts and once to be taken off and put into shipping
containers (Brewin April 2004).
UPS also pays close attention to its drivers and their routes. Drivers are often
monitored in terms of performance, and managers share tips on how to improve.
In 2003, the company added a new software routing tool to plan the routes. Since
most customers provide pickup data early in the day, the computer can plan the
optimal route, speeding up the drivers while they make more stops and travel few-
er miles. UPS CIO Ken Lacy estimates the system will reduce feet miles in the
United States by more than 100 million miles a year, saving about 14 million gal-
lons of fuel (Brewin September 26, 2003).
UPS had thought about creating a massive routing system since at least the
mid-1990s. The catch is that many people thought the problem was too big to
solve. In computer science terms, the problem is called NP-complete because
there is no perfect solution to analyze the entire delivery problem other than to ex-
amine every possible choice. And, with trillions upon trillions of options, no ma-
chine could fnd the perfect solution. Operations research specialists studied the
problem and found ways to narrow it down to just examining feasible solutions
that are close to optimal. With research and faster machines, they managed to re-
duce the time to fnd a solution from 90 days down to three hours. By optimizing
its primary routes, UPS was able to cut a day off its guaranteed delivery times for
565 Chapter 8: Teamwork
some routes, such as reducing shipping time from Los Angeles to New York from
four days to three (Bacheldor 2004).
In 2003, UPS began redesigning its handheld system to the DIAD IV terminal.
The terminal contains a color screen and runs on Windows CE. In addition to the
bar code scanner, it includes a global positioning system (GPS) receiver. It uses
Bluetooth wireless to connect to a label printer in the van. When parked at the
hub, the system connects to the local area network via a WiFi wireless connection.
On the road, it uses a built-in cellular modem, so that drivers can connect to the
network and provide immediate information to customers. Ultimately, the system
will be able to use its Bluetooth radio to connect directly to customer computers.
The GPS system will be particularly valuable in Europe, where drivers handle
less frequent trips. In the United States, many companies require daily deliveries
and pickups to fxed locations. But the GPS system will also help route drivers
for last-minute pickup requests (Brewin September 26, 2003). In 2005, after two
years of development, the DIAD IV was rolled out to all 70,000 UPS drivers. The
company spent $22 million to develop the new devices based on Symbol technol-
ogy and said it would spend $127 million to deploy them globally (Weiss 2005).
At the same time, the company reported that it was experiencing problems with its
package-fow technology. The analytical system was designed to work with GPS
systems to analyze routes and determine the most fuel-effcient directions and
loading instructions. Full implementation was projected to be delayed by a couple
of years and the system was estimated to save $50 to 100 million in fuel costs
each yeardown from the $700 million originally projected (Rosencrance 2005).
By 2006, UPS was delivering an average of 15 million packages a day around
the world. But UPS still focuses closely on keeping up with FedEx. Using the
Internet, UPS is working to collect package data earlier and applying it to loading
trucks. When customers fll out the online form to generate a package label, the
information is sent to one of the UPS hubs. A computer system sets up a delivery
route and identifes where each package should be loaded in the truck, with earlier
deliveries stored in the front of the truck. UPS reports that drivers have gained
enough time to make an additional seven to nine stops per shifton top of the
100 pickups and deliveries they handled before the tool. Integrated with the new
DIAD IV, the system sounds an alarm if a driver forgets a package or stops at the
wrong address (Dade 2006). The technology also enabled UPS to introduce a new
service in 2007delivery intercept. For a $10 fee, senders can use the Web site to
stop the delivery of a package or reroute it to a new destination. UPS suggests the
service might be useful if a sender realizes at the last minute that the wrong data
or package was sent (press release March 26, 2007).
Capital expenditures at UPS were relatively stable over time. In 2006, the com-
pany spent $720 million on buildings and facilities, $1.15 billion on aircraft and
parts, $831 million on vehicles, and $384 million on information technology. In
total, the company spends about $1 billion a year on IT costs, including labor
(2006 Annual Report).
In 2010, the UPS Web site was processing more than 26 million package track-
ing requests a day. But technology is also heavily used in operations to set the
most effcient package loading and to defne routes for delivery trucks. The hand-
held technology introduced in 2008 includes telematics, or information about the
truck including GPS and automotive sensors that include engine RPM, braking,
and speed. The goal is to fne-tune routing as well as track maintenance (2010 An-
nual Report). The new system took 10 years to design and build and focused on
566 Chapter 8: Teamwork
seemingly simple things such as loading trucks more effciently. The automated
system puts tags on boxes so loaders know exactly which order to load them on
the truck. Developers also had to fnd ways to handle poorly-entered data (Mitch-
ell 2008).
Integrated Services
In 2001, UPS purchased the entire chain of 4,000 MailBoxes Etc. stores and re-
named them The UPS Store. The chain provides UPS with local contact points
for individual and small business pickups. But most of the stores are still run as
franchises. The stores are eliminating the need for paper shipping forms. Custom-
ers simply enter the data into a kiosk PC (or have the clerk enter it), and it prints
out the bar-coded label. In 2003, UPS took the interesting step of testing public-
access Wi-Fi in 66 of the retail stores in Chicago. Customers would pay either
an hourly or monthly fee to connect their own laptops to the Internet through the
WiFi connection. The demand for this service is still uncertain (Brewin September
11, 2003).
In 2002, UPS introduced a Web-based shipping solution to large customers
with offces in multiple locations. The system enables employees to ship a pack-
age by simply entering the details in a Web site. The system automatically bills
the company and provides a comprehensive report to managers. Best Buy is using
the system to make it easy for employees in its stores to ship packages to other
Best Buy locations or to send them directly to customers. Jim Hay, general trans-
portation manager of small package solutions for Best Buy, observes that because
employees do not have to handwrite the labels, this saves 15 minutes per user per
package. The biggest area of savings is in time and (in fewer) lost and misrouted
packages due to poor handwriting or a bad address (Rosencrance March 2002).
UPS began offering a useful service in early 2003 for exporters and importers.
The company launched an electronic payment system called UPS Exchange Col-
lect. Basically, UPS collects the money from the recipient/customer. Sellers are
free to expand to new markets with unknown customers with minimal risk. UPS
drivers will only deliver the product when they receive payment. When the ship-
per sends an item, the recipient is notifed electronically. UPS then collects the
money and delivers the package. The money is electronically sent to the seller.
The system provides huge gains over the current system. Currently, shippers often
wait 90 days for paymentand still run risks that the buyer will not pay. UPS will
transfer the funds within 10 days (Rosencrance 2003).
UPS also provides expertise in shipping products internationallyin terms of
handling forms and getting packages through customs. By identifying and con-
trolling every package that UPS carries, the companys Worldport hub qualifes
as a controlled building for the customs bureau. More important, the product in-
formation database is accessible to customs agents, who can scan it for potential
problems. Any suspect packages are instantly rerouted within the Worldport hub
to the customs offce for detailed inspection (Rosencrance March 11, 2003).
In 2004, UPS introduced new tools for customers to use the system as a com-
plete logistics solution. The Quantum View Manage software makes it easy for
customers to identify all shipping information. In particular, customers can see
all packages as a group, without needing to enter every tracking number. They
can see exactly where packages are located, along with any reasons for delays.
The system can even trigger alerts if problems arise and notify customer service
automatically, or use automated delivery notices to send electronic invoices (Ros-
encrance 2004).
567 Chapter 8: Teamwork
UPS demonstrated the true power of its integrated logistics system in 2004 by
offering a new service to Toshiba. Toshiba outsources all laptop repairs to UPS
Supply Chain Solutions. Broken laptops are sent by UPS to its Louisville hub
where UPS engineers diagnose the problem, fx the laptop, and return it to its
owner. Mark Simons, general manager of Toshibas digital products division,
notes that diagnosing and repairing computers is actually the easy part. Instead,
moving a unit around and getting replacement parts consumes most of the time.
The actual service only takes about an hour (James 2004). UPS has been helping
Toshiba with repairs by performing an initial inspection since 1999. UPS has also
been servicing Lexmark and Hewlett-Packard printers since 1996.
Questions
1. Does it make sense for UPS to move into the computer repair business?
2. How does the Quantum View system provide new revenue or profts for
UPS?
3 .How does UPS use the Internet to reduce costs?
Additional Reading
Bacheldor, Beth, Breakthrough, Information Week, February 9, 2004.
Brewin, Bob, UPS Delivers Public-Access Wi-Fi To Its Retail Outlets,
Computerworld, September 11, 2003.
Brewin, Bob, UPS Invests $30M In IT To Speed Package Delivery,
Computerworld, September 26, 2003.
Brewin, Bob, IT Drives the UPS Machine, Computerworld, April 19, 2004.
Dade, Corey, Moving Ahead, The Wall Street Journal, July 24, 2006.
James, Geoffrey, The Next Delivery? Computer Repairs by UPS, Business 2.0,
July 2004.
Mitchell, Robert L., Project Delivers Savings for UPS, Computerworld, April
21, 2008.
Rosencrance, Linda, UPS Launches CampusShip Shipping Tool,
Computerworld, March 7, 2002.
Rosencrance, Linda, UPS Uses Technology to Speed International Shipments,
Computerworld, November 27, 2002.
Rosencrance, Linda, New UPS Service Speeds Payments Between Exporters
and Importers, Computerworld, March 11, 2003.
Rosencrance, Linda, UPS Launches Quantum View Manage, Computerworld,
February 4, 2004.
Rosencrance, Linda, Planning System Isnt Fully Delivering at UPS,
Computerworld, February 28, 2005.
UPS Web site: http://www.ups.com/content/corp/about/history/index.html.
Weiss, Todd R. UPS Deploys its Fourth-Generation Handheld Delivery
Terminals, Computerworld, May 9, 2005.
568 Chapter 8: Teamwork
Case: DHL/Deutsche Post
DHL has an interesting history. The company was started and driven by Larry L.
Hillblom who loved to fyparticularly among the Pacifc islands. Because of
this love, DHL focused largely on international shipments and became a leader
in Southeast Asia. After Hillblom died in a plane crash in 1995, a huge number
of East Asian and Pacifc Island women came forward and claimed that they had
had children with Hillblom, and that he promised to support them. After hundreds
of lawyers and several court battles, four children were shown to be his heirs by
DNA testing, but several others received settlement money as well (Metropolitan
News-Enterprise 2003). In 2003, DHL was purchased by Deutsche Post. With its
strength in Europe, Deutsche Post and DHL provide a strong international solution
to shipping (company Web site). In 2004, DHL announced a major commitment to
expanding its operations in the United States. In addition to its international ties,
the company wants to focus on competing with UPS and FedEx through highly
visible trucks and a national marketing campaign (Press Release 2004).
DHL has one of the largest customs-clearance systems of any of the shipping
companies. With over 8 million trade rules, the WorldWide Clearance System
(WCS) helps millions of packages clear customs throughout Asia and Europe. The
process is largely automatic for the shipper. Most items are shipped without in-
tervention. If a problem arises, the system fres a message back to the shipper to
handle it. As a result, the customer does not have to constantly monitor the pro-
cess (Rosencrance 2003).
By the time the recession hit in 2008, DHL had mostly pulled out of local de-
livery service in the United States. The company is still big in Europe and Asia
and it still delivers packages to and from the U.S., but it no longer runs head-to-
head against FedEx, UPS, and the USPS in delivering within the United States.
Teamwork
DHL does not have the huge amount of money to spend on IT that UPS and Fe-
dEx do. Consequently, it is rarely a leader. But it has made some smart moves in
communications networks, and by waiting for prices to drop, it now has the ability
to compete with the giants. Alan Boehme, director of business planning in 1998,
noted that the nice thing is Internet technology and the change it enablesin-
expensive communication on an open, standards-based networkis like Davids
rock. Im not going to say that DHL is going to kill the giant, but Internet technol-
ogy is the great equalizer for any business (Sliwa 1998). Actually, even before
the Internet took off, DHL made some smart investments. In 1988, the company
built a TCP UNIX-based network to connect its offces around the world. Their
package tracking data is routed on the internal frame-relay based network. It uses
object-oriented technology to integrate data regardless of whether it came from
the Web site or the automated phone system. The worldwide network also con-
nects programmers and developers so they can share data electronically and work
together even when they are scattered around the globe (Sliwa 1998).
In 2004, DHL expanded its operations to provide radio-frequency identifca-
tion (RFID) technology and support to its customers. By tagging all packages, the
company helps suppliers meet RFID requirements throughout Europe. As world-
wide standards are developed, the company wants to expand the program glob-
ally. Clems Beckmann, managing director of corporate development at Deutsche
Post, notes that Our goal is to become the core logistics supplier for RFID ser-
vices worldwide (Sullivan 2004). In 2007, DHL slowed down the move to RFID
569 Chapter 8: Teamwork
in the U.S. noting a lack of demand for the service and the $1 billion cost. The
company is a leader in Europe, providing RFID tags and data tracking for Metro
AG. The company believes it can add value to shipments of cold perishables such
as seafood, and is trying to convince customers to adopt it (Weier 2007).
Information Technology
One problem that DHL experienced in 2001 was that its pricing was too diffcult
for customers. It could take days for a sales representative to quote a price, and as
long as two to three weeks to get fnal approval from management. Lacking the re-
sources to develop the system themselves, DHL turned to Metreo Inc to automate
the process. Going live in 2002, the system provides sales representatives with
real-time customer data and pricing information based on the customers ship-
ment. Tied to the corporate network, the salesperson can suggest an optimal price
and receive approval almost immediately, sealing the deal before the customer can
be coaxed away by FedEx or UPS (Rosencrance 2002).
In 2002, DHL realized that it needed a new data center to consolidate its op-
erations. Built in Scottsdale, Arizona, the system connects centers in Kuala Lum-
pur, Malaysia and London. DHLs CIO, Steve J. Bandrowczak, noted that DHL
wanted to create a seamless single offering to our customers, like a single invoice
or a single Web interface. In order to enable that global logistics business vision,
we had to consolidate our IT infrastructure, which included the data center, our
network backbone and our key global applications (Rosencrance 2004).
Merging Airbone with DHL in 2003 was a challenge for the IT departments.
Airbornes system were designed to handle high data volumes rapidly and reli-
ably. DHL, headquartered in Belgium, focused on ground transportation and the
complexities of international shipping. DHL also heavily used Indias Infosys to
integrate IT systems, ultimately resulting in layoffs on the Airborne development
team. The Airborne applications, centered in Seattle, were largely based on legacy
IBM CICS and DB2 systems. The DHL Americas systems ran in Scottsdale on
Hewlett-Packard servers running Unix and Oracle databases. In the frst pass, in-
tegration required selecting key applications from each platform to keep the sys-
tems running, but ultimately, operations were moved to Scottsdale. In 2006, the
company began searching for a new integrated system (Whiting 2006).
In terms of development of applications, because of its global nature, DHL
turned to offshore development early on. By hiring programmers in the UK, In-
dia, and Asia, it is able to develop critical applications throughout a 24-hour day.
Colum Joyce, global e-business strategy manager based in Brussels, observed that
for us, large-scale development is not a hothouse environment, its an everyday
reality (Gilhooly 2001). Using the time differences around the world, develop-
ment effectively continues around the clocksomething you cannot do very well
if everyone is located in the same time zone. Plus, the lower turnover rates and
low salaries for skilled overseas programmers help hold costs down. Finally, the
multilingual and multicultural programmers can tailor the applications to specifc
nations.
DHL has generally been behind the curve in adopting technology. For example,
it lags UPS and FedEx in providing wireless tracking devices to its drivers. Only
in late 2006 did the company provide Web-based tools to customers to enable
them to track all of their shipments (Rosencrance 2006).
Similar to many companies, DHL faces challenges in hiring and retaining tal-
ented IT workers. The companys 1,200 U.S. IT workers had a turnover rate of
570 Chapter 8: Teamwork
about 9 percent a year. After surveying workers, CIO Steve Bandrowczak was
told that they wanted greater recognition of their work. So he created the carrot
a day philosophy where workers will be rewarded with items from verbal praise
by a manager at a staff meeting, to an e-mail from a senior IT executive, to gift
certifcates (Hoffman 2005). At the end of 2005, Bandrowczak was named CIO of
Lenovo and in early 2006, DHL hired Maryann Goebel, formerly from GM, as the
CIO for the Americas and Pacifc region.
Deutsche Post faced many challenges as it grew through acquisitions. Each
company that it acquired had different forms of accounting and different ways of
measuring progress. To standardize the accounting and reporting, the company
created the Common Reporting System (CREST). Instead of focusing on cutting
costs, the CREST system emphasized sharing data in a standardized format. It is
based on the SAP platform and uses an Oracle DBMS to handle the data require-
ments. The Web-based application is used across 200 countries and provides con-
sistent basic fnancial data to managers in each area and at corporate headquarters
(http://www.cwhonors.org/viewCaseStudy.asp?NominationID=245).
Questions
1. How do RFID tags help Deutsche Post offer new services to customers?
2. What benefts does Deutsche Post gain by using offshore programmers?
3. How does the Deutsche Post information system make it easy for small
businesses to ship internationally? Why is this important?
4. How can the Internet enable DHL to compete equally with FedEx and UPS?
Additional Reading
Deutsche Post Web site: http://www.dhl.com/publish/g0/en/about/history.high.
html
Gilhooly, Kym, The Staff That Never Sleeps, Computerworld, June 25, 2001.
Hoffman, Thomas, DHL Program Seeks to Hold on to IT Staff,
Computerworld, January 17, 2005.
Metropolitan News-Enterprise, Ninth Circuit Rejects Judicial Bias Claim in
Dispute Between Lawyers for Heirs of DHL Founder, February 7, 2003.
Press Release, DHL Brings Competition And Choice to U.S. Express Delivery
Business With New Campaign, June 14, 2004. http://www.dhl-usa.com/
about/pr/PRDetail.asp?nav=&seq=664
Rosencrance, Linda, DHL Picks Metreo Software to Improve Effciency,
Computerworld, February 13, 2002.
Rosencrance, Linda, Brief: DHL expands Worldwide Clearance System to
Europe, Computerworld, July 23, 2003.
Rosencrance, Linda, DHL Reaps Massive Savings in Data Center
Consolidation, Computerworld, March 15, 2004.
Rosencrance, Linda, Brief: DHL Launches Suite of Web-based Tools,
Computerworld, November 20, 2006.
Sliwa, Carol, Look Out, Goliath, David Has A Rock, Computerworld, June 15,
1998.
571 Chapter 8: Teamwork
Sullivan, Laurie, Logistics Providers Ready RFID Services, Information Week,
June 28, 2004.
Weier, Mary Hayes, DHL Backs Off Plans For RFID On Every Package By
2015, Information Week, March 27, 2007.
Whiting, Rick, DHL-Airborne Didnt Take the Easy Road To Post-Merger IT
Integration, Information Week, June 26, 2006.
Case: United States Postal Service
The U.S. Postal Service (USPS) has been around for centuries. Sometimes hailed,
sometimes maligned, it has struggled to turn a proft. Technically, it is a govern-
ment agency, but it is not funded by Congress. In fact, the USPS provides free
stamps to members of Congress. In exchange, the USPS has a federally mandated
monopoly on delivering mail to individual mail boxes. It is also required to de-
liver frst-class mail to any U.S. address for a fxed price. Letters sent to an ad-
dress down the street cost the same as letters delivered to a rural town in Alaska.
Rate changes must be submitted to and approved by a political Postal board of
governors. With the advent of low-cost long-distance phone calls and e-mail, the
demand for frst-class letters has dropped for several years. In 2005 and 2006,
the quantity of junk mail carried surpassed the delivery of frst-class items (Hall
2007). In response, the Postal Service has continued to increase the price of frst-
class stampsdriving demand even lower. Most of the mail carried consists of
advertising pieces charged at varying rates below frst-class postage, but even
those rates were increased by as much as 40 percent in 2007. Those rates have
increased to the point where some advertisers are testing hand-delivered fyers
(Chabrow 2004 and usps.gov).
In 2010 and 2011, the USPS is still struggling to adapt to a digital world. De-
mand for mail continues to drop, so revenue is declining, and losses are increas-
ing. To compensate, the USPS continues to increase prices and is contemplating
reducing services by dropping Saturday mail delivery. In 2011, the agency sus-
pended its employer contribution to the Federal Employee Retirement System be-
cause it did not have enough money. The Postal Service was $8 billion in the red
for 2010 and risked running out of money before the end of 2011. The agency had
already reduced staffng by 110,000 and cut costs by $12 billion, but it was still
not enough to keep it alive (Wall Street Journal 2011). From 2001 to 2010, frst-
class mail volume dropped from 103.7 billion to 78.2 billion pieces (www.usps.
com).
Technology
The USPS relies heavily on outside contractors to provide information technology
and other infrastructure. For example, for years, the USPS has relied on Lockheed
Martin to provide mail handling systems. Several mail-processing centers are run
by outside contractors. In October 2004, fearing problems with the bankruptcy fl-
ing of MCI, USPS signed a long-term contract with Lockheed Martin to provide
telecommunications services as well. At the end of 2006, after some apparently
bad experiences, USPS cancelled the contract and returned to MCI as its primary
provider (Marsan 2006).
For the most part, the USPS lacks the delivery tools of the giants FedEx and
UPS. Workers still sort and deliver individual pieces of mail on fxed delivery
572 Chapter 8: Teamwork
routes. But, the task of the workers is quite different because they almost always
have to stop at every mailbox every day. Hence, the potential gains from tracking
and scheduling are minor. However, in 2003, the organization spent $20 million
to develop logistics software to aggregate ZIP code data and map out how to load
packages on trucks more effciently (McDougall 2003).
The mail system was the frst to support person-to-person messages across the
U.S. and eventually the globe. Consequently, it was also a primary method of
propagating scams. The Postal Services Postal Inspection Service was created in
1909 to investigate various levels of fraud and scams. Various federal laws were
enacted over the years to make specifc scams a federal crime. You might think the
Inspection Service would have no role in todays Web-based e-mail scams. How-
ever, any activity, such as mailing a check, that uses the mail system falls under its
jurisdiction. If someone orders an item via the Web and it is delivered through the
Postal Service, its inspectors can take chargeas happens often in pornography
and drug cases. The Service has been involved in tracking several major cyber-
scams and attacks (Greenemeier 2007).
With 700,000 employees, the USPS needed a way to train its employees on
procedures and rules. For years, it used an internally-developed system. In 2003,
USPS purchased a commercial testing learning-management system from Thinq
Learning Solutions. Robert Otto, VP of IT, was primarily impressed with the data-
capturing capabilities of the tools that validate an employee has completed the
course. He said that we had a hole in the administrative end of managing our
training (George 2003).
Like any other organization, the USPS needs an accounting system to track
expenses and receipts. In 2004, the Postal Service began a process to replace its
decades-old custom-built applications with off-the-shelf software. In particular,
it chose to install Oracles ERP system beginning with the general ledger. The
USPS had already installed Oracle.s Web-based time-and-attendance application
in 2001. A Retek Inc. retail accounting software package collects sales data from
the 40,000 Postal Service branches and posts them to the Oracle general ledger.
Using the Oracle system, the Postal Service was able to reduce its accounting cler-
ical staff by 1,000 positions, reducing expenses between $300 million to $1.5 bil-
lion annually in 80 districts. The organization planned to implement an SAP HRM
application to handle benefts and promotions data in 2007 (Greenemeier 2005).
In October 2009, the government accounting organization (GAO) evaluated the
technology for the Post Offce Intelligent Mail Full Service Program. This pro-
gram was created in 2003 to use barcodes to track mail. The basic conclusion was
that the program was only partially fnished and that the rest of the project was
unlikely to be completed (GAO-10-145).
Some people have tried to search for ways to keep the traditional Post Offce
alive, but the task seems grim. The Postal Regulatory Commission notes that the
Postal Service wants to close thousands of post offces. John Callan, a mailing
industry consultant organized conference for June 2011 to help fnd a future for
the Postal Servie. He noted that I think we need to stage a serious conversation
about the future, so that the folks on the Hill can understand whats going on and
those of us in the postal industry can learn how we would do something differ-
ently (OKeefe 2011). Other people and government oversight agencies are even
bleaker. The agency relies on frst-class mail to fund its operations, but frst-class
mail volume is plummeting. Two complicating factors are that the union contract
forbids layoffs and Congress will not allow closing a Post Offce for economic
573 Chapter 8: Teamwork
reasons. Through privatization, European postal services have used these tactics
to survive, but they are not yet an option in the U.S. (Leonard 2011).
A few people still fnd the Postal Service valuableparticularly for package
shipping. The prices are competitive and often lower than the alternatives (FedEx
and UPS). The Postal Service also offers electronic postage. It is now relatively
easy to purchase postage online and print an electronic stamp on an envelope
directly from a PC printer (Khechfe 2010, but note he works for a company that
creates electronic postage).
Questions
1. How does the USPS use its Web site to sell services?
2. When was the last time you mailed a letter via frst-class mail?
3. What happens if USPS goes under?
Additional Reading
Chabrow, Eric, Will Feds Pay For Post Offces Funeral Using E-Payments?
Information Week, January 28, 2004.
GAO, Information Technology: U.S. Postal Service Needs to Strengthen System
Acquisition and Management Capabilities to Improve Its Intelligent Mail
Full Service Program, October 2009.
George, Tischelle, USPS Dumps Its E-Learning App, Information Week,
January 6, 2003.
Gilhooly, Kym, The Staff That Never Sleeps, Computerworld, June 25, 2001.
Greenemeier, Larry, Postal Service Emerging From Holiday Deluge With Big
Plans For 2005, Information Week, December 17, 2004.
Greenemeier, Larry, U.S. Postal Service Cracks Down On Cyberscams,
Information Week, June 4, 2007.
Hall, Mark, Neither Snow, nor Rain, nor Heat ..., Computerworld, May 14,
2007.
Khechfe, Amine, Postage Technologyand U.S. Postal ServiceReally
Delivers for Parcel Shippers, December 20, 2010. http://www.
parcelindustry.com/ME2/dirmod.asp?sid=23C6283BD51B46348B616C079E
EB2E21&nm=Miscellaneous&type=Publishing&mod=Publications%3A%3
AArticle&mid=8F3A7027421841978F18BE895F87F791&tier=4&id=947F7
EE1BD3848BF9CBC3C43D7D5D5D2.
Leonard, Devin, The U.S. Postal Service Nears Collapse, Business Week, May
26, 2011.
Marsan, Carolyn Duffy, USPS Quietly Cancels 18-year Network Outsourcing
Deal, Computerworld, December 19, 2006.
McDougall, Paul, Load Em Up, Information Week, September 29, 2003.
OKeefe, Ed, Google Execs, Tech Experts Focus on Future of Postal Service,
The Washington Post, May 4, 2011.
Wall Street Journal, Post Offce Suspends Retirement Contributions, June 22,
2011.
574 Chapter 8: Teamwork
Summary Industry Questions
1. What information technologies have helped this industry?
2. Did the technologies provide a competitive advantage or were they quickly
adopted by rivals?
3. Which technologies could this industry use that were developed in other
sectors?
4. Is the level of competition increasing or decreasing in this industry? Is it
dominated by a few frms, or are they fairly balanced?
5. What problems have been created from the use of information technology
and how did the frms solve the problems?
3
Part
Decisions and Strategies
How does information technology help teams share information?
Can computers make decisions? How can information systems
make your company better than the competition?
Business decisions can be complex. Complexity can arise from
several areas, including the use of huge amounts of data, diff-
cult mathematical formulations, uncertain relationships, detailed
linkages to multiple business units, and physical or procedural
constraints. Middle-level managers in all functional areas face
complex problems. Various models have been created to help you
analyze these problems and evaluate alternative answers. Infor-
mation technology provides several tools to help managers col-
lect data, evaluate models, evaluate output, and make decisions.
Ongoing research into artifcial intelligence has led to addi-
tional tools to tackle specifc problems. Expert systems, robot-
ics, and neural networks are sophisticated tools to solve complex
problems.
Strategic analyses represent some of the most diffcult deci-
sions a manager can face. Strategy represents fundamental chang-
es in the operations of the business. Information systems are used
to search for useful changes. Information systems have also been
useful in creating a competitive advantage.
Chapter 9: Business Decisions
Chapter 10: Strategic Analysis
Chapter 11: Entrepreneurship
How do information systems help managers make better deci-
sions?
576
What You Will Learn in This Chapter
How do businesses make decisions?
How do you make a good decision? Why do people make bad decisions?
How do you fnd and retrieve data to analyze it?
How can you quickly examine data and view subtotals without hundreds of queries?
How does a decision support system help you analyze data?
How do you visualize data that depends on location?
Is it possible to automate the analysis of data?
Can information technology be more intelligent?
How do you create an expert system?
Can machines be made even smarter?
What would it take to convince you that a machine is intelligent?
What are the differences between DSS, ES, and AI systems?
How can more intelligent systems beneft e-business?
How can cloud computing be used to analyze data?
Chapter Outline
Business Decisions
9
Chapter
Introduction, 577
It is Hard to Make Good Decisions, 578
Human Biases, 581
Models, 584
Data Warehouse, 589
Online Analytical Processing (OLAP), 590
Decision Support System, 594
Marketing Forecasts, 594
Human Resources Management, 596
Geographical Information Systems, 597
Maps and Location Data, 599
Example, 601
Data Mining, 602
Expert Systems, 606
Specialized Problems, 608
Diagnostic Problems, 608
Speedy Decisions, 609
Consistency, 610
Training, 611
Building Expert Systems, 612
Knowledge Base, 613
Rules, 613
Creating an ES, 614
Limitations of Expert Systems, 615
Management Issues of Expert Systems,
616
Specialized Tools, 616
Pattern Recognition and Neural
Networks, 617
Machine Vision, 619
Language Comprehension and
Translation, 620
Robotics and Motion, 621
Machine Intelligence, 623
DSS, ES, and AI, 623
The Importance of Intelligent Systems in
e-Business, 625
Agents, 625
Support and Problem-Solving
Applications, 627
Cloud Computing, 628
Summary, 628
Key Words, 630
Web Site References, 630
Review Questions, 630
Exercises, 631
Additional Reading, 635
Cases: Financial Services Industry, 636
577 Chapter 9: Business Decisions
Citigroup
Introduction
How do businesses make decisions? Figure 9.1 shows that as a man-
ager, you will have access to huge amounts of data. How do you analyze it to
understand what it means? How can information systems help you make better
decisions? These questions are diffcult to answer, but there is a much bigger un-
derlying question. Why would companies need to hire you as a manager? Ex-
ecutives already have access to databases containing integrated data for the entire
company. ERP systems can provide detailed data on any aspect of the business.
EIS systems can show charts, summaries, and detailed data. Now, what if com-
puter systems can be built to analyze the data and make decisions? What job will
you have?
Analyzing data and making decisions depends somewhat on the discipline you
choose and your background in statistics and operations management. A key as-
pect in many introductory business courses is to teach you the basic models used
within the discipline. It is unlikely that you are an expert in any particular disci-
pline at this point, and you might not be aware of the variety and power of the
statistical tools available to analyze data. Nonetheless, you need to learn how in-
formation technology can be applied to many business decisions. This chapter fo-
cuses on the tools available and illustrates them with relatively simple decisions.
Even if you do not fully understand the discipline-specifc models, you need to
learn what tools are available.
Can computers make decisions? How can information systems help manag-
ers make decisions? Some business problems are straightforward. In these cases,
developers simply create a set of rules or procedures that the computer can be
programmed to follow. As long as the business behaves in a predictable manner,
the rules apply and the computer can handle the details. However, many business
problems are less structured and cannot be solved so easily. In addition, problems
often involve data that is not well defned. For example, it is straightforward to
create a computer system to handle inventory because the computer can easily
keep track of item numbers and quantity sold. Consider the more diffcult prob-
How do you use information technology to make better decisions? Citigroup is one
of the largest banks in the world. And the world part is important: the company op-
erates in 101 countries. Running a global bank requires making thousands of deci-
sionsfrom basic questions about approving loans to structuring mega-deals with
huge corporations. Banks obviously adopted information technology earlyto han-
dle basic transactions. After all, money today is really just numbers in a computer.
Banks, including Citigroup, have been slower to adopt technology to make deci-
sions; but that reluctance has been changing in the last few years.
Citigroup is faced with competitive pressures as well as disruptions from eco-
nomic fuctuations. It has attempted to reduce risk by spreading into multiple busi-
ness areas, including insurance (Travelers), brokerage (Salomon Smith Barney), and
investment banking. The company is one of the largest issuers of credit cards in the
United States. With stagnant growth of the U.S. credit industry, Citigroup has ex-
panded into South America and even China. Evaluating customers to minimize risk
is a key aspect of the credit card industry.
578 Chapter 9: Business Decisions
lem faced by a manager who has to decide where to locate a new plant. Some at-
tributes are measurable, such as distance from suppliers, cost of land, and taxes.
Other features are diffcult to quantify: quality of the labor force, attitudes of gov-
ernment offcials, and long-run political stability of the area.
Many problems involve nonnumeric data and complex interrelationships
among the various factors. Without computers, businesses often call in experts or
hire consultants to help solve these problems. Special software programs called
expert systems (ESs) provide many of these features. From the beginning, re-
searchers and computer designers have known that humans perform some tasks
much better than computers can. These differences led researchers to investigate
how people solve problems and investigate how humans think. The research into
techniques that might make computers think more like humans is known as ar-
tifcial intelligence (AI). There is some question as to whether it will ever be
possible to build machines that can think the same way humans do. Nonetheless,
the research has led to some useful tools that perform more complex analysis and
can solve diffcult problems. These tools attempt to mimic the processes used by
humans in a simpler form that can be processed by a computer system.
The answer to the big question is yes, computers can make decisions in some
situations. In other cases, the computer is a tool that helps you analyze the data.
The level of support provided depends on the type of problem and on your skills
as an analyst. As a manager, it is your responsibility to identify decisions that can
be handled by machine systems and to recognize when these systems do not work.
It is Hard to Make Good Decisions
How do you make a good decision? Why do people make bad
decisions? Most businesses have evolved over time. In many cases, their busi-
ness processes have been built and patched in response to various changes in the
industry. The frms that made better decisions and changes survived, while the
others failed. But the existing process might not be the most effcient. Consider
the apparently simple process of farming. Farmers feed the animals and then sell
Figure 9.1
Tactical decisions often require complicated analysis. Problems utilize forecasts,
optimization, and in-depth analysis. Information systems provide support through
data, modeling, and presentation tools. Managers use information system tools to
build, evaluate, and maintain various models.
Data
Sales and Operations
f x
x
( ) exp =
(
|
\
|
.
|
1
2
1
2
2
0
20
40
60
80
100
1st Qtr 2nd Qtr 3rd Qtr 4th Qtr
Actual Forecast
Models
Analysis and Output
Decisions
579 Chapter 9: Business Decisions
them. The hard part is that the animals can be fed and housed many different
wayseach with different costs. Should the animals be fed high-protein food that
costs more and grows bigger animals faster, or should they be fed simple diets and
take more time to mature? In the 1970s and 1980s, experts created software that
analyzed these questions from the standpoint of minimizing the cost of feeding the
animals. Using optimization methods, they were able to substantially reduce the
production costs. But some experts have found it is possible to do even better by
focusing on profts across the entire industry chain. The same types of problems
apply to any business process, because most companies solve individual problems
frst because they are easier. As tools become better, it is important to expand the
perspective and look at broader decision problems.
Even if you do have a system for making a better decision, you need to con-
vince managers to use it. Many managers distrust new technologies and different
answers, because they see an element of risk. A few companies have established
a culture that focuses on continual improvement and growth. In these companies,
managers are encouraged to explore new ideas and replace the existing processes.
Trends
Through the 1970s, computers were largely used to assist with transaction
processing. Support for making decisions was generally limited to the ba-
sic reports produced from the data. Computers were too expensive and pro-
gramming too diffcult to be used by every manager. As personal computers
became commonplace through the 1980s, managers began transferring data
from the corporate central computers to their personal machines. Spread-
sheets made it easier to analyze data, evaluate models, and create charts.
In the 1990s, networks, improved spreadsheets, and better ties to databases
made it possible to build more complex, interactive models and create fore-
casts.
Along with technology, improvements were made to modeling and ana-
lytical tools. Scientifc advancements made it possible to add more intelli-
gence to software tools. Data mining systems use statistical tools to semiau-
tomatically evaluate data, searching for important relationships and cluster-
ing or classifying groups of data. Expert systems evolved from early work
on artifcial intelligence. Focusing on narrow domains, these tools encode
the rules of an expert to analyze data and suggest solutions. Today, thou-
sands of expert systems are used to improve decisions and provide quick
results 24 hours a day.
The study of human brains yielded clues that led to the development of
neural networks. Today, neural networks are widely used in pattern match-
ing applications. Humans are good at pattern recognition, and neural net-
works dramatically improve the ability of machines to perform these tasks.
Writers and researchers have long wondered whether machines can be-
come intelligent. No one is close to an answer yet, but the new technolo-
gies mean that todays systems are more intelligent and can handle more
complex problems than machines a few years ago. As the range of solvable
problems increases, managers need to understand the capabilities and limita-
tions of each method.
580 Chapter 9: Business Decisions
Reality Bytes: Googles Self-Driving Cars
Following the successes of the DARPA Grand Challenges of the late 2000s, some
companies have expanded research and development of self-driving cars. Interest-
ingly, Google has been one of the leaders. Perhaps driven by ties to Stanford (which
one the second Grand Challenge), and by the importance of mapping in Google. In
2010, Google told the world that it had been using off-the-shelf components to test
run self-driving cars a total of 150,000 mileswith almost no human intervention.
However, a little know aspect of Googles methodology is that humans frst drive the
cars around the test arealargely to provide a more specifc map of the route, stop-
lights, school zones, and so on. Chris Urmson, technical lead for the Google project,
and a leader from the Carnegie Mellon team that won the 2007 DARPA Urban Chal-
lenge, notes that There are things that right now are a challenge for us. For instance,
if most of the world stayed the same but the lanes are shiftedso the physical road
didnt move, but for whatever reason, the department of transportation decided we
should drive a half lane to the leftthat would probably confuse the car today. The
challenge lies in unexpected eventsgetting the software to recognize and react to
them using some level of common sense. Ultimately, the tradeoff is an interesting
question in ethics: Does a machine have to be perfect? The National Highway Traffc
Safety Administration (NHTSA) noted that in 2008 the U.S. experienced 5.8 million
car accidents, with 1.6 million of those resulting in personal injuries and 34,000 in
deaths. If machine-drivers can cut that rate in half, would we still blame the develop-
ers for the remaining accidents?
Adapted from Nick Chambers, Hands-Off Training: Google's Self-Driving Car
Holds Tantalizing Promise, but Major Roadblocks Remain, Scientifc American,
May 23, 2011.
Company A
Company B
Stock Price
130
125
120
115
110
105
100
95
90
1 2 3 4 5 6 7 8 9 10 11 12
Month
Figure 9.2
Sample decision. Do you invest your money in Company A or Company B? Be
careful, it is a trick question.
581 Chapter 9: Business Decisions
Human Biases
Assume you have money to invest in the stock market. Someone shows you two
companies. As shown in Figure 9.2, Company As share prices have risen by 2
percent per month for the last year. The others share price was fat for fve months
but has increased by 3 percent per month since then. Which stock do you buy? But
wait a minute. How can you possibly decide based on the little information you
have? It sounds silly, but people make these decisions with minimal data and no
logical analysis every single day. When people make decisions this way, the re-
sults are going to be inconsistent and dangerous. But it is so much easier to make
a snap decision, and so much harder to do the research and complex analyses to
make the right decision.
Consider a true example: designing a new automobile. The automobile in-
dustry, epitomized by GM in the early 1980s, presents an interesting example of
making decisions. GM demonstrated from the 1940s forward that people buy cars
based on design and appealnot simply a collection of features. In particular,
GM demonstrated that customers can be heavily persuaded by style and advertis-
ing. Assuming you have money, what kind of car would you buy? Sporty, luxuri-
ous, fashy, utilitarian, big, small? What color? How many doors? Now ask a few
friends or relatives what they would buy. Will all of the answers be the same? Not
likely. Now think about the problem from the perspective of an automobile manu-
facturer such as General Motors. What features are car buyers going to demand in
two or three years? This classic marketing problem is diffcult to solve. For years,
GM used its multiple divisions to create separate identities that appealed to dif-
ferent segments of the population. Designers within each division focused on the
preferences and lifestyles of their specifc target. Most of that structure fell apart
in the early-1980s with the introduction of a completely new line of cars based on
the A-body. At that time, the GM divisions introduced a new car model from four
main divisions. As shown in Figure 9.3, all four cars (Oldsmobile Cutlass Ciera,
Pontiac 6000, Chevrolet Celebrity, and Buick Century) were virtually identical.
Buick Century Oldsmobile Cutlass Ciera
Chevrolet Celebrity Pontiac 6000
Figure 9.3
GM 1984 models. Note the body similarities. Even the base color offerings were the
same. How could GM throw away its division strategy and offer virtually identical
models? Source: Wikipedia.
582 Chapter 9: Business Decisions
Figure 9.4
Biases in decision making. Without models, people tend to rely on simplistic rules
of thumb and fall prey to a variety of common mistakes. These errors can be
minimized with training and experience in a discipline. They can also be minimized
by having computer systems perform much of the initial analysis.
Acquisition/Input
Bias Description Example
Data availability Ease with which specifc
instances can be recalled afects
judgmentsoffrequency.
People overestimate
the risk of dying due to
homicides compared to
heartdisease.
Illusory correlation Belief that two variables are
relatedwhentheyarenot.
Ask any conspiracy buf
aboutthedeathofJFK.
Data presentation Orderefects. First (or last) items in a list
aregivenmoreimportance.
Processing
Inconsistency Difculty in being consistent
forsimilardecisions.
Judgments involving
selection, such as
personnel.
Conservatism Failure to completely use new
information.
Resistancetochange.
Stress Stress causes people to make
hastydecisions.
Panicjudgmentsandquick
fxes.
Social pressure Social pressures cause people
to alter their decisions and
decision-makingprocesses.
Majority opinion can
unduly infuence everyone
else:mobrule.
Output
Scale efects Te scale on which responses
are recorded can afect
responses.
Ask a group of people to
rate how they feel on a
scalefrom1to10.Aska
similar group to use a scale
from1to1,000.
Wishful thinking Preference for an outcome
afectstheassessment.
People sometimes place
a higher probability on
events that they want to
happen.
Feedback
Learning from
irrelevant outcomes
People gain unrealistic
expectations when they see
incompleteorinaccuratedata.
In personnel selection
you see how good your
selection is for candidates
youaccepted.Youdonot
receive data on candidates
yourejected.
Success/failure
attributions
Tendency to attribute success to
onesskillandfailuretochance.
Only taking credit for the
successesinyourjob.
583 Chapter 9: Business Decisions
The available colors were even the sameparticularly maroon. In effect, GM was
assuming that millions of customers all wanted the same car.
Designing cars, or any product, is a diffcult decision problem. In good situ-
ations, like GM, you have tons of data available. You have sales data, data on
competitors, surveys, and focus groups. But, the results are meaningless if you
cherry-pick data to match your preconceived ideas. Oh look, here are 5,000
people who want larger engines. If you search hard enough, you can fnd
data to match any opinion you want; but it will not accurately represent the opin-
ions of the population.
In response to these problems, Barabba and Zaltman, two marketing research-
ers working with GM, analyzed decision making at General Motors and no-
ticed that several common problems arose. In summary, they found that people
are weak at making decisions. For example, people place too much emphasis on
recent events, they tend to discard data that does not ft their prior beliefs, they
follow rules of thumb instead of statistical analysis, and they choose outcomes
based on wishful thinking. As shown in Figure 9.4, all of these problems and more
infuenced the decisions of designers at GM. In particular, they found that the de-
signers tended to discuss ideas with their bosses in an attempt to identify manage-
ment preferences that would help get a particular design approved. So cars were
designed to the preferences of a few managers, instead of to the needs of custom-
ers. Despite attempts to improve, the fasco eventually forced GM to eliminate
the Oldsmobile division. The books written by Barabba and Zaltman discuss even
more examples and human biases in decision making.
Before you think that businesses (and GM) have solved the design problem, go
look at current designs. In 2008, the Wall Street Journal examined cars pro-
duced by GM and Ford and found similar overlap in styles within each company.
And GMs overall market share continued to decline at least through 2009, when
Model Building
Understand the Process
Models force us to defne objects and specify relationships. Model-
ing is a frst step in improving the business processes.
Optimization
Models are used to search for the best solutions: Minimizing costs,
improving effciency, increasing profts, and so on.
Prediction
Model parameters can be estimated from prior data. Sample data is
used to forecast future changes based on the model.
Simulation
Models are used to examine what might happen if we make changes
to the process or to examine relationships in more detail.
Figure 9.5
The four primary reasons for building and using models. Descriptive, graphical, and
mathematical models can be used for each of these purposes. However, mathematical
models tend to be emphasized for optimization and simulation.
584 Chapter 9: Business Decisions
the company was forced to fle for bankruptcy protectionwhen the company
sold off or eliminated several other divisions. The main point to remember is that
making decisions without a good model and process leads to poor decisions. Sure,
you might get lucky for a while (like investors in the 1990s), but ultimately you
need a solid decision-making process.
Models
Models are key aspects to any decision; they are simplifcations designed to help
you understand and analyze a problem. Many of the models you will use in busi-
ness decisions were created by academics. You will be introduced to many of
these models in other business courses. As a manager, you are responsible for
knowing that hundreds of models are available to help you make decisions, and
for knowing which model best applies to the problem you are facing. Understand-
ing and evaluating models is an important aspect of a business education.
Models often use drawings and pictures to represent the various objects. How-
ever, at heart they typically use mathematical equations to represent the process
and the various relationships. For example, an operations engineer would model
a machine as a mathematical formula that converts raw materials and labor into
products. Using equations for each step of the production process, the engineer
could search for ways to reorganize production to make it more effcient or to
improve quality.
Models are used to help managers make decisions. Most businesses are far too
complex for any single person to understand all of the details. Consequently, a
variety of models may be created to present a simplifed view of the business. In
particular, one of the original purposes of accounting was to create a standardized
model of the fnancial aspects of business. Another common model of business is
the practice of dividing the company into functional areas. For example, a man-
ager with experience in the fnance department of one company can usually apply
knowledge and problem-solving skills to fnance departments in other companies
and even other industries. The basic goals are summarized in Figure 9.5. Models
help you simplify the world. They help you search for similarities in different
situations. Models also enable managers to predict how changes might affect the
business. As the decision maker, it is up to you to determine which models to use
and to make sure they actually apply to the situation. Once you have selected the
appropriate model, you apply whatever data you have, evaluate the results, and
make the decision.
Prediction and Optimization
An important use of models is for prediction. If a model is reasonably accurate,
it can be used to predict future outcomes. For instance, when you buy a car, you
might want to know how much it will be worth in three years when you want to
sell it. It is possible to estimate how the price of used cars changes over time.
Prediction frst requires that you have a model that describes the situation. Then
data is collected and statistical techniques are used to estimate the parameters
of the model for the specifc problem. Next you fll in values for any parameters
that you already know, and the model provides a prediction. Prediction techniques
such as regression and time series forecasting are used to examine the data, identi-
fy trends, and predict possible future changes. To use statistics effectively requires
a model of the underlying system. For instance, to use regression methods you
585 Chapter 9: Business Decisions
frst identify the dependent variable and a set of possible independent variables.
These choices come from the underlying model.
Figure 9.6 illustrates how a spreadsheet can be used to display the results of
a forecast. Although dedicated statistical packages contain more options, spread-
sheets contain several tools to help with basic statistical regression and forecast-
ing. Once you load the Data Analysis toolpak in Excel, you can run basic regres-
sions, T-Tests, or ANOVA to identify how a set of independent X variable affect
the dependent Y variable. You can use the trend line function to highlight averages
on charts. If you are familiar with statistical functions, you can use the built-in
functions to make comparisons and evaluate data. You can also purchase add-ins
to perform more-sophisticated analysis of your data. When you need even more
power, you can use the import and export tools in the high-end statistical software
packages to extract and analyze your data. You might have to hire a statistician to
help determine which tools you need and to create the initial models. But once the
model and system are confgured, you can run the system to analyze your results
on a regular basis.
Optimization
Optimization evaluates a model in terms of the inputs or control parameters
and searches for the best solution. Optimization requires a detailed mathematical
model. Several tools such as linear programming are used to fnd optimal values.
Some optimization models have resulted in substantial savings in cost or increases
in proft. Tasks that are repeated hundreds or thousands of times can often beneft
through optimization modeling.
0
5
10
15
20
25
Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2
Time/quarters
O
u
t
p
u
t
Moving Average
Trend/Forecast
Economic/
regression
Forecast
Figure 9.6
Prediction model. Several statistical techniques exist for analyzing data and making
forecasts. Two common methods are regression and moving averages. Both methods
require substantial amounts of data. Choosing between the two requires some
expertise in statistical analysis, but many times we display both methods to show a
range of possible outcomes.
586 Chapter 9: Business Decisions
Figure 9.7 shows a simple optimization model with two input variables and
a single output. Optimization typically requires a mathematical model that de-
scribes the complex relationships between the variables. You will often use sta-
tistical techniques to estimate the underlying model parameters, and then turn to
optimization tools to fnd the best operating point. Linear programming is an op-
timization tool that has demonstrated considerable success in solving some rela-
tively complex problems. As the name implies, basic tools assume that all of the
relationships are linear, but modern tools can support a limited amount of nonlin-
earity, including quadratic terms.
The Solver tool that is sold with Excel is a limited version of a commercial
optimization product, but even the basic version is capable of solving moderately-
large problems. If your model grows too large, you can upgrade to the full version
or purchase software from other companies. One of the strengths of the linear
programming (and Solver) approach is that it is designed for constrained optimi-
zation problemswhich are common in business. Operations research and man-
agement classes explain these problems in more detail. The problems are a little
tricky to set up, so you should consult an expert if you lack experience with these
problems. The key is to identify the output goal (perhaps proft maximization or
cost minimization), and then list all of the input variables that affect that result.
Once you have defned the optimization equation, you need to specify all of the
constraints that affect the problem. For example, a production plant has a maxi-
mum amount that can be produced; and people work a limited number of hours
a week producing a defned amount of output per person and machine. Once you
understand optimization, you will recognize that it can be used to solve a vari-
ety of problems, including complex pricing decisions, worker scheduling, product
mix, and input selection.
20
15
10
5
0
1
2
3
4
5
6
7
8
9
10
1
2
3
4
5
input levels
O
u
t
p
u
t
Control variables
Figure 9.7
Optimization model. Optimization requires a mathematical model. Output is defned
in terms of various input variables. The maximum point can be found by altering the
values of the input variables. Special software, such as linear programming tools, can
help evaluate complex models.
587 Chapter 9: Business Decisions
Simulation or What-If Scenarios
Simulation is a modeling technique with many uses. Once a model is created,
managers use simulation to examine how the item being studied will respond to
changes. With simulation, various options can be tested on the model to examine
what might happen. For example, engineers always build models of airplanes and
engines before they try to build the real thing. The models are much cheaper. In
fact, most engineers today start with mathematical computer models because they
are cheaper to create than physical models and can contain more detail. Moreover,
they can perform experiments on models that would not be safe to perform in real
life. For example, an engineer could stress a model of an airplane until it broke up.
It would be dangerous and expensive to try such an experiment on a real plane.
Similarly, a business model could examine what would happen if prices were in-
creased by 20 percent, without worrying about losing real money. Of course, the
model is only useful and valuable if it accurately refects real conditions.
Most simulation models are mathematical instead of descriptive models, be-
cause they are easy to evaluate. Mathematical models contain parameters, or
variables that can be controlled by the managers. For instance, you might use a
spreadsheet to create an accounting model of an income statement and balance
Reality Bytes: Make Decisions by Putting Down the Cell Phone and Going for
a Walk
If you think choosing what to eat for dinner is tough, stay away from combinatorial
auctions. Consider an airline that wants to bid on landing slots at an airport. The slots
can be bid on individually or in bundle of combinations. Data includes the passenger
loads, weather, and connecting fights. Angelika Dimoka, director of the Center for
Neural Decision Making at Temple University, uses these types of complex puzzles
to study the ability of humans to make decisions. She used functional MRI (fMRI)
to examine brain patterns while volunteers worked on these puzzles. At the start,
increasing the amount of data caused activity in the dorsolateral prefrontal cortex
region of the brain to increase. This region is responsible for decision making and
control of emotions. However, as the amount of data increased, activity suddenly
dropped as the humans reached overload. At that point, frustration and anxiety soar
as the emotions take over. Other research into human aspects of decision making
show that unconscious systems guide human decisions and that decisions that re-
quire creativity beneft from patienceallowing the brain to think about the problem
passively. But interrupting the brain with increasing amounts trivia makes it more
diffcult for the brain to operate. It is one of the reasons pilots and frst responders
train for emergencies and maintain checklists of critical tasks. Studies, such as those
by Shenna Iyengar of Columbia University, show that providing more choices and
more data can cause people to give up and simply opt out. For instance, employees
who faced retirement plans with more options tended to opt out more often than
those with fewer choices. The brain needs time to evaluate data, integrate the ele-
ments, and determine which items to ignore. So, collect the data, use analytical tools
and models that were developed for the problems, try to identify the most important
factors, then take a break and let the brain evaluate the choices for a while.
Adapted from Sharon Begley, I Cant Think! Newsweek, March 7, 2011.
588 Chapter 9: Business Decisions
sheet. When you create the spreadsheet, production quantity and price of your
products are controllable parameters that affect the income and profts of the frm.
You could use the model to investigate decisions, like the effect on profts if you
increase production. Costs will increase, but so will revenue from sales. The net
result depends on the specifc details of the frm and the model. Spreadsheets are
often used to analyze small models and graph the results. More sophisticated sim-
ulation packages can support more complex analysis and will automatically create
graphs and pictures to show interrelationships.
More complex models provide more opportunities for simulation. In part be-
cause they are diffcult to solve and understand. In a production system, a more
detailed model might enable you to investigate alternatives such as increased
overtime, hiring another shift, building additional plants, or subcontracting the
work to another frm.
Object-oriented simulation tools developed in the last few years make it easy
to create many simulations. As shown in Figure 9.8, you can place icons on the
screen to represent various business objects. Behind each of these objects, you
specify their behavior. For example, you would need to estimate the average num-
ber of customers that arrive in an hour and how long they are willing to wait
for service. For physical processes like order entry, inventory, and shipping, you
specify the number of transactions that can be handled in a given time. When all
of the details have been entered, the system runs simulations and tracks statistics.
You can change the parameters such as adding clerks to see what happens if you
change the operations.
Customer
Order Entry
Custom Manufacturing
Production
Inventory &
Purchasing
Shipping
Purchase
Order
Purchase
Order
Routing &
Scheduling
Invoice
Parts List
Shipping
Schedule
Figure 9.8
Object-oriented simulation. A simple example of custom manufacturing. Each object
(parts list, purchase order, etc.) and each process are defned in detail by the modeler.
The simulation system generates orders, makes shipments, and orders inventory
according to programmed rules. The simulator collects a variety of statistics that can
be displayed graphically or in summary reports.
589 Chapter 9: Business Decisions
Data Warehouse
How do you fnd and retrieve data to analyze it? ERP and other
transaction systems can provide enough data to bury you. But the transaction sys-
tems are designed to store data, not to search and analyze it. Relational databases
turn out to be relatively slow when you need to analyze several gigabytes or even
terabytes of data. If you do not have an ERP system, you have even greater prob-
lems trying to integrate and clean data from all of your systems. As shown in
Figure 9.9, the answer is to create a separate data warehouse that extracts and
stores the data in a clean, easy-to-analyze format. The process shown in Figure 9.9
is known as extraction, transformation, and loading (ETL). Larger database
management systems have specifc tools and data storage methods to create data
warehouses. Some companies also create specifc data marts that are basically
copies of a small portion of the data warehouse designed to feed a specifc ap-
plication. For instance, a fnancial data mart might be used by the accounting and
fnance department just to monitor investments and bank accounts.
Finding and cleaning the data is the most time-consuming step in most data
analysis projects. Data is often stored in multiple systems and proprietary formats.
Even if the data is stored in a DBMS, someone has to verify the data content and
format to ensure it matches exactly with the other data. Even a number as simple
as sales could be defned differently by various departments. Some departments
might count sales when a customer signs a contract, but others might wait until
the contract has been approved by top management. Sometimes organizations are
not even aware that these differences existuntil they decide to start integrating
the data.
OLTP Database
3NF tables
Operations
data
Predened
reports
Data warehouse
Star conguration
Daily data
transfer
Interactive
data analysis
Flat les
Figure 9.9
Data warehouse. A data warehouse is commonly used as a method to provide data
to decision makers without interfering with the transaction-processing operations.
Selected data items are regularly pulled from the transaction data fles and stored in a
central location. DSS tools query the data warehouse for analysis and reporting.
590 Chapter 9: Business Decisions
Documenting the data is critical because managers have to understand what
each item represents and they need to be able to fnd specifc items. Metadata is
used to describe the source data, identify the transformation and integration steps,
and defne the way the data warehouse is organized. A data warehouse represents
a subset of the total data in the company. In most cases, it is a static copy that is
refreshed on a daily or hourly basis. This type of system is relatively easy to use;
managers do not have to learn data access commands (SQL or QBE). However, it
is less fexible than using a database management system. Decision makers will
be unable to get additional data or to compare the data in some previously unex-
pected way. The success of a data warehouse depends on how well the managers
needs have been anticipated.
Online Analytical Processing (OLAP)
How can you quickly examine data and view subtotals without
writing hundreds of queries? Retrieving data and examining totals from
different perspectives is an important part of making decisions. When the prob-
lem is unstructured and there is no existing mathematical model, it often helps to
look at subtotals of data. Sometimes it is useful to browse through the data and
examine various subtotals. Which customers bought the most? Click: there are
the totals. Which employees sold the most? In December? Click: see the totals
Figure 9.10
Multidimensional cube for item sales. Managers are interested in various
combinations of the dimensions. For example, total item sales of dog items in the last
quarter. OLAP tools rapidly provide answers to questions involving any perspective
of this cube.
CA
MI
NY
TX
Race
Road
MTB
Full S
Hybrid
Jan Feb Mar Apr May
Time
Sale Month
Customer
Location
1420 1253 1184 1098 1578
437 579 683 873 745
1011 1257 985 874 1256
880 750 935 684 993
591 Chapter 9: Business Decisions
or view a chart. This process is a major function of online analytical processing
(OLAP). Most OLAP tools rely on a data warehouse to provide consistent data
and fast access.
The ability to browse through the data is a useful feature of OLAP. Most deci-
sion makers want to see subtotals of data. A key method of organizing OLAP data
is to identify a key fact (often sales) and then collect attributes that presumably
affect the fact. As shown in Figure 9.10, OLAP tools depict this data as a mul-
tidimensional cube. Managers use specifc tools to examine various sections of
the data. To illustrate the process, consider a simple example from the Rolling
Thunder Bicycle company database. Managers are interested in sales of bikes.
In particular, they want to look at sales by date, by the model type (race, road,
mountain, full suspension, and hybrid), and by the location of the customer. The
fact they want to measure is the value or amount of the items sold, which is the
price times the quantity. The OLAP tools enable managers to examine any ques-
tion that involves the dimensions of the cube. For instance, they can quickly ex-
amine totals by state, city, month, or category. They can look at subtotals for the
different categories of products or details within individual states. The tools can
provide detail items that can be pictured as a slice of the cube, or they can provide
subtotals of any section. Each attribute represents a potential subtotal. In terms
Reality Bytes: Face Recognition
The general public is easily misled by science fction and Hollywood. It is easy to
think that computers can do anything, or that breakthroughs are only a few months
away. But, computers still struggle at some tasks that humans perform easily. Most
of these tasks fall into the category of pattern recognition, and face recognition is
just the latest example. Many photo sites use facial recognition technology to help
users identify new photos. For example, Googles Picasa automatically tries to tag
new photos by matching faces to existing photos, which simplifes organization and
makes it easier to share them. But the system often fails. One user, Stacey Schlitten-
hard, noted that All babies kind of look alikethey all have little round faces. If I
label one baby as my son, it will label almost every baby as my son. She also noted
that Picasa once labeled a lollipop as her friend. Yi Ma, an associate professor of
electrical and computer engineering at the University of Illinois, and a researcher at
Microsoft Research in China, notes that I dont think, currently, any facial recogni-
tion system is good enough for security purposesnot even close, actually. He also
believes a reliable system is at least a decade away. On the other hand, in June 2011,
when Vancouver fans rioted after losing the last round of the NHL championship,
several photos of people were published on the Internet. Within days, people on the
Web had identifed most of the rioters and two people who were caught passionately
kissing in the middle of the street. Similarly, someone posted a video of a woman
arguing with a subway conductor in New York and she was quickly identifed by
people who watched the video. In that sense, computerized facial recognition is not
the threat to privacythe prevalence of cameras and the ability to share them on the
Web is removing anonymity in everyday life.
Adapted from John D. Sutter, Why Face Recognition Isn't Scary Yet, CNN On-
line, July 9, 2010; and Brian Stelter, Upending Anonymity, These Days the Web
Unmasks Everyone, The New York Times, June 20, 2011.
592 Chapter 9: Business Decisions
of database queries, think of an OLAP cube as a collection of GROUP BY state-
ments. However, the browsing tools are interactive and show managers the results
instantly. For example, you can use checkboxes to select specifc states. You can
begin looking at total sales of all bikes, and then look at the detail by model type.
With a few clicks, you can choose a specifc slice of the cube, such as one state,
and then look at data for a single month or model type, or rotate the cube and look
at totals by month.
Although most DBMS vendors (including Microsoft, Oracle, and IBM) pro-
vide OLAP cube browsers, Microsoft provides the PivotTable interface that works
with almost any DBMS or spreadsheet. A PivotTable is an interactive interface to
a multidimensional cube. A PivotTable is created on the users machinemost us-
ers will build pivot tables inside of Microsoft Excel. This tool has several options
and provides a great deal of fexibility for the user.
A PivotTable report for Rolling Thunder Bicycles is shown in Figure 9.11. By
clicking on a row or column dimension, managers can see detail or subtotals. They
can also select specifc items to include in the subtotals. Managers even have the
fexibility to drag the dimensions aroundto move them from columns to rows,
or to change the order of the summations. The four windows in the lower-right-
hand corner specify where each item will be displayed, and you can drag-and-
drop the columns across those windows. Additional options provide other statis-
tics, such as averages.
Figure 9.11
Microsoft PivotTable report. Pivot tools make it easy for managers to examine cube
data from any perspective, to select subsets of the data, to perform calculations, and
to create charts.
593 Chapter 9: Business Decisions
The Pivot Chart graphics option makes it easy to create chartsusing the Ex-
cel interface that is familiar to most business managers. As shown in Figure 9.12,
the system uses the same data as the PivotTable, but creates interactive charts to
display the data visually. Once the connection to the data is made, you select the
basic chart type and pick the attributes to be displayed. You, or your manager, can
change the chart type easily, and even drag data columns to look at new relation-
ships. The options are similar to those in the standard Excel charting package. But
remember that the system is interactive, and you can quickly look at any relation-
ship of interest. The data connection is also dynamic, so that as the data changes
in the underlying database, you can refresh the chart or PivotTable to get up-to-
date values without altering the spreadsheet or chart design.
Several vendors provide interactive cube browsers. Microsoft and Oracle have
versions built into their DBMS reporting systems so that you can embed them
on a Web reportgiving managers Web access to these tools. The PivotTables
and Charts built into Excel are convenient and accessible to most organizations
without spending additional money. Even if your data is stored in other Excel
spreadsheets, you can build PivotTables and Charts that extract the data from oth-
er spreadsheets and provide the same interactive data browsing. Additionally, you
can use the statistics, functions, and programming capabilities of Excel to analyze
the extracted data.
Figure 9.12
Microsoft Pivot Chart. A Pivot Chart uses the same type of data as a PivotTable, but
displays the data graphically. It is easy to change the type of chart or to change the
data displayed by clicking options or dragging attributes to different sections.
594 Chapter 9: Business Decisions
Decision Support System
How does a decision support system help you analyze data?
Once you have the data, you often need to analyze it statistically, or by applying
discipline-specifc models. A decision support system (DSS) consists of three
basic components to help you analyze data: (1) data retrieval, (2) model evalua-
tion, and (3) visualization of the results. Today, a data warehouse or OLAP cube
is often used as the data source. The model is often developed by experts (usually
consultants) and evaluated in a spreadsheet. The visualization component gener-
ally consists of charts, but more sophisticated time lines and schedules are used
for complex problems.
To understand the value of a DSS, it is easiest to work with a couple of ex-
amples. Thousands of examples exist, but they often require detailed knowledge
from a specialized discipline. On the other hand, most managers will need some
familiarity with marketing and with human resources management. The examples
are relatively small and you will cover more complex models in other business
classes. The principles are the same, and you can often use the same tools. Along
the same lines, if you want to apply these models to real business problems, you
will have to collect more data and add more features to the models.
Marketing Forecasts
Marketing departments are responsible for market research, sales forecasting,
management of the sales staff, advertising, and promotion. In some frms they also
process orders and manage the design of new products and features. Processing
orders is essentially a transaction-processing task. The others involve tactical or
strategic questions that are more complex, so we will focus on those tasks.
An enormous amount of data is available for market research. Figure 9.13 pres-
ents some of the common data available for marketing purposes. Internally, the
marketing department maintains records of sales and basic customer attributes.
With some frms, there can be a longer distance between the frm and the fnal
customer. For instance, manufacturers typically sell products to wholesalers, who
place the products in individual stores, where they reach the fnal customer. In
these cases it is more diffcult to identify customer needs and forecast sales. There
Figure 9.13
Common marketing data sources. There are three primary sources of marketing
data: internal collections, specialty research companies, and government agencies.
Detailed data is available on the industry, customers, regions, and competitors.
Internal Purchase Government
Sales
Warrantycards
Customerservicelines
Coupons
Surveys
Focusgroups
Scannerdata
Competitivemarketanalysis
Mailingandphonelists
Subscriberlists
Ratingservices(e.g.,Arbitron)
Shipping,especiallyforeign
Census
Income
Demographics
Regional data
Legalregistration
Drivers license
Marriage
Housing/construction
595 Chapter 9: Business Decisions
will be delays in receiving sales data because the retailers and wholesalers typi-
cally place bulk orders. Furthermore, it is more diffcult to identify customer pref-
erences because their purchases are fltered through other companies. Marketing
departments also have access to data that is collected by other frms. In a manufac-
turing environment, marketers might get raw sales data from the wholesalers and
retailers. On the retail side, with the pervasiveness of checkout scanners, it is now
possible to buy daily and hourly sales records from thousands of stores in various
cities. This data contains sales of your products as well as rivals products.
Marketing is often asked to forecast sales. Several different methods can be
used, but a straightforward approach is to begin with statistical forecasts. Consid-
er a simple example shown in Figure 9.14 for a fctional store that sells consumer
products nationwide. The sales estimate is based on economics where sales are
dependent on time and on consumers income. As consumer income increases,
they will be more likely to purchase the companys merchandise. Gross domestic
product (GDP) is often used as a proxy for consumer income.
Notice the seasonal peaks in sales for each fourth quarter. It is important to cap-
ture this holiday sales effect. Since national GDP and household income have this
same effect, you can build a model based on the relationship of your sales to GDP
and time. The process is described in Figure 9.15, and all of the steps can be per-
formed in a spreadsheet. Regression provides the estimate of the coeffcients that
describe the relationship between sales and GDP and time. The R-squared value
is over 90 percent and all of the coeffcients have high t-values, so it is a strong
relationship. If you look closely at the forecast values for the fourth quarters, you
will notice some errors that indicate the model is missing some elements.
GDP
Sales
Forecast
GDP and Sales
3000
2500
2000
1500
1000
500
0
140
120
100
80
60
40
20
0
2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32 34 36 38 40 42 44 46 48
Figure 9.14
Sales forecast. Note the seasonal peaks in the fourth quarter. The points beyond
quarter 40 are forecasts based on time and the relationship to income (GDP). This
forecast requires that GDP predictions be made for each future quarter, but these
values can often be obtained from government forecasts.
596 Chapter 9: Business Decisions
Forecasting the GDP is a little tricky, so most people just use government fore-
casts. But be careful to get nonseasonally adjusted values (which are diffcult to
fnd), so they show the quarterly cycle. Unfortunately, the U.S. Bureau of Eco-
nomic Analysis has been reporting only seasonally adjusted data since 2004. You
can also forecast the quarterly values yourself. The easy way to preserve the cycle
is to forecast the quarters independently (all frst quarters, all second quarters, and
so on). Then plug these values in for the forecast, multiply by the estimated coef-
fcients, and graph the result. It might not be quite as accurate as a full time-series
estimation technique, but any business student can make it work, and it is better
than guessing or wishful thinking.
Human Resources Management
An important HRM task in any organization is the need to allocate raises. Using
a merit pay system, each employee is evaluated on the basis of factors related to
his or her job. Typically, each manager is given a fxed amount of money to allo-
cate among the employees. The goal is to distribute the money relative to the per-
formance appraisals, provide suffcient incentives to retain employees, and meet
equal employment opportunity guidelines. Many of these goals are conficting,
especially with a fnite amount of money available. To set the actual raises, man-
agers need to examine the raw data. On the other hand, a graph makes it easier to
compare the various goals.
A few specialized software packages can help you determine merit raises.
However, as shown in Figure 9.16, it is possible to create a small system using
a spreadsheet. A spreadsheet that can display a graph alongside the data tables
is particularly useful. Assume that the company wishes to give a certain portion
of the raise based on the average performance ratings. The amount of money per
point (currently $100) can be changed. Each person can be given an additional
market adjustment raise. The total departmental raises cannot exceed the allocated
total ($10,000).
Figure 9.15
Forecasting process. All of these steps can be performed by a spreadsheet. To forecast
the quarterly GDP values, simply split them into four columns, one for each quarter.
Then use the spreadsheets linear forecast tool to extend the columns.
Data: Quarterly Sales and GDP for 16 years.
Model: Sales = b0 + b1 Time + b2 GDP
Analysis: Estimate model coeffcients with regression
Coefcients Std. Error T-Stat
Intercept -48.887 13.631 -3.586
Time -0.941 0.294 -3.197
GDP 0.067 0.011 6.326
Output: Compute Sales prediction. Graph forecast.
597 Chapter 9: Business Decisions
The goal is to fll in the market adjustment column so that the raises match the
performance appraisals. As illustrated by the graph in Figure 9.17, the manager
can evaluate both absolute dollar raise or the percentage increase. The total de-
partmental raises should be equal to $10,000. By displaying the graph next to the
last columns in the spreadsheet, it is possible to watch the changes as you enter
the data. This immediate feedback makes it easier to set the raises you prefer. Use
of some type of DSS analytical system is helpful for identifying and minimizing
illegal discrimination in salaries.
As shown in Figure 9.16, you can use the Offce 2010 conditional formatting
feature to create a simple chart to show where each persons salary falls within the
defned range for the job category. The additional chart is somewhat diffcult to
read, but it does provide useful information. Also, if the system has access to data
across the organization, it is possible to statistically analyze the raises assigned by
each manager to ensure raises are given in a non-discriminatory fashion. Such a
system will probably be unlikely to catch small deviations, but if systematic dif-
ferences across managers or individuals appear, HR managers can investigate fur-
ther. The main point of this example is that managers can visually see the effects
of their decisions.
Many, many other problems can be analyzed with decision support systems.
The key to a DSS is that you need a model to analyze. Typically, an expert will
create the model and build a DSS that loads current data. Managers still need to
understand the model and the results, because they are the ones who ultimately
analyze the data and make the decisions.
Geographical Information Systems
How do you visualize data that depends on location? Many as-
pects of business can beneft by modeling problems as geographical relationships.
Merit Pay raise pool 10000
perf. pct salary range (000) current merit market total New
Name R1 R2 R3 perf low high avg salary 100 adjust. raise raise pct salary Pct Range
Caulkins 9 7 6 73% 28.4 37.5 36.4 35.8 733 800 1533 4.3% 37.3 0.98
Jihong 3 6 7 53% 15.4 18.9 16.3 17.9 533 100 633 3.5% 18.5 0.90
Louganis 8 7 7 73% 26.7 30.2 28.9 29.5 733 850 1583 5.4% 31.1 1.25
Naber 9 8 8 83% 19.5 23.2 21.4 19.8 833 1030 1863 9.4% 21.7 0.58
Spitz 3 4 3 33% 17.3 22.4 18.4 17.5 333 600 933 5.3% 18.4 0.22
Weissmuller 5 4 6 50% 32.5 60.4 45.2 53.2 500 2955 3455 6.5% 56.7 0.87
Department 6.2 6.0 6.2 23.3 32.1 23.8 21.7 3665 6335 10000 5.7% 30.6 0.83
Corporate 5.0 6.0 5.0 124.3 124.3 18.9 18.9 Remain 0
Figure 9.16
Merit pay analysis. With a merit system, salary increases should be related to
performance evaluations (denoted r1, r2, r3). Managers are typically given a fxed
pool of money to distribute among the employees. Employee raises should be based
on merit evaluations, current salary, the salary range for the job. Market adjustments
are often paid to attract workers in high-demand felds. A spreadsheet can be used
to model the effects of various policies. In this example, the manager has allocated
$100 for each merit percentage point. The rest of the money will be given as market
adjustments. The effects of the adjustments can be seen in the graph displayed in the
next fgure.
598 Chapter 9: Business Decisions
For instance, to choose the site of retail outlets, you need to know the location and
travel patterns of your potential customers as well as the locations of your compet-
itors. Manufacturing can be made more effcient if you know the locations of raw
materials, suppliers, and workers. Similarly, locations of distribution warehouses
need to be chosen based on retail outlets, manufacturing facilities, and transpor-
tation routes. Thousands of other geographical considerations exist in business,
such as monitoring pollution discharges, routing and tracking delivery vehicles,
classifying areas for risk of crimes and fre, following weather patterns, or tracing
migration paths of fsh for commercial fshing. Geographic information systems
(GISs) have been designed to identify and display relationships between business
data and locations. Arc Info and Microsofts MapPoint are two of many com-
mercial GIS packages available.
A GIS begins with the capability of drawing a map of the area in which you are
interested. It might be a world or national map that displays political boundaries.
It might be a regional map that emphasizes the various transportation routes or
utility lines. It might be a local map that displays roads or even buildings. An oil
exploration company might use a map that displays three-dimensional features
of a small area. A shipping company could use ocean maps that display three-
dimensional images of the ocean passageways. The level of detail depends on the
problem you wish to solve.
0.0%
10.0%
20.0%
30.0%
40.0%
50.0%
60.0%
70.0%
80.0%
90.0%
0
500
1000
1500
2000
2500
3000
3500
4000
Raises
raise raise pct performance
Figure 9.17
Performance evaluation. Using a separate y-axis for the two types of data and
overlaying line plots on the bar chart makes this graph easier to read. If this graph
is dynamically linked to the salary table, the manager can make salary changes and
instantly compare the raises to the performance ratings.
599 Chapter 9: Business Decisions
Maps and Location Data
Most maps today are built from digitized map data. Each item is stored as a geo-
graphic point or line segment; defned by latitude, longitude, and altitude. The
maps are drawn mathematically from a collection of these points. Consequently,
the maps can be drawn to any scale and the tools make it easy to zoom in or out
at will. Most U.S. digital maps are based on data that the Bureau of the Census
created for the 1990 national census, known as TIGER. The Bureau of the Census
has every road and house number entered into a giant database. Because of pri-
vacy reasons, they will not sell house locations, but you can get the range of street
numbers for each city block. The U.S. Department of Defense has digital data
available for many areas, including international locations, and often includes el-
evation data. The U.S. Geological Survey topographical maps are also being con-
verted to digital systems. However, keep in mind that the systems being mapped
are constantly changing, so even digital maps often contain missing, incomplete,
or inaccurate dataas the United States learned when it accidentally blew up the
Chinese embassy in Belgrade because the CIA maps were out of date. Due to the
popularity of online mapping systems, several private companies work to add new
data and fx errors.
Several companies have integrated satellite photos into their mapping systems.
Through a variety of programs, the U.S. government has accumulated and re-
leased low-resolution photos of most areas of the planet. A couple of private com-
panies supplement those photos with images captured from vans driving through
major cities. Computers can match the digital map data with the satellite photos
and the drive-by photos to provide realistic views of many cities.
Once you have the base maps, the objective is to overlay additional data on the
maps. For example, you can obtain census data that displays average consumer
characteristics such as income, house price, and number of autos within each geo-
graphic area. The GIS could be used to plot different colors for each income level.
Next you can overlay the locations of your retail stores. If you are selling a high-
price item such as a Cadillac, you want to locate the stores in areas of higher
income.
Although you can buy base geographical data, how do you know the location
of your retail stores? Or how do you plot the locations of delivery vehicles, or
police cars, or trains? The easiest answer today is to use the global positioning
system (GPS), which is a set of satellites maintained by the U.S. government.
A portable receiver tuned to the satellites will identify your location in latitude,
longitude, and elevation (if it can reach four satellites) within 20 feet. Several
handheld units are available for a few hundred dollars. If you work for the De-
partment of Defense, you can get receivers that will identify your location within
a few millimeters, but you need appropriate security clearances to obtain these
receivers. Currently, the government is broadcasting the higher-resolution signal
to civilian receivers, but sometimes blocks it during emergencies. Civilian models
that combine signals from U.S. and Russian satellites provide even better resolu-
tion, but cost about $8,000. Europe has been trying to raise the funds to build its
own GPS system (Galileo) and China has announced that it intends to create its
own system as well. There is probably not enough money, or orbital space, for that
many satellites; but competition is good and should encourage the U.S. to keep
the system open.
As a model, the GIS makes it easier to spot relationships among items. Visual
presentations are generally easy to understand and are persuasive. A GIS can be an
600 Chapter 9: Business Decisions
Technology Toolbox: Browsing Data with a PivotTable
Problem: You and your manager need to analyze sales based on several attributes.
Tools: OLAP cube browsers are designed to make it easy for you to examine slices
of the cube and examine a fact (sales) based on several dimensions. The big DBMS
vendors sell cube browsers with their packages. However, you can also use the Mi-
crosoft PivotTable that is built into Excel.
The Rolling Thunder Bicycle data provides a good example for a cube. The fact to
be evaluated is the SalePrice. The more interesting dimensions are OrderDate, Mod-
elType, and SaleState. The date presents a common problem: dates are hierarchies.
You might want to examine sales by year, or you might want to drill down and see
sales by quarter or month. Some cube browsers make it easy to create this hierarchy.
Excel does not create it automatically, but you can use a query to convert the date
into the different dimensions. The qryPivotAll query shows you how to compute the
various year, month, and quarter felds.
In an Excel worksheet, use the Data/PivotTable option to begin. Select the Ex-
ternal Data Source option because the data comes from a DBMS. Follow the basic
steps to get data from a Microsoft Access Database and select your copy of the Roll-
ing Thunder database. In the Query Wizard, fnd the qryPivotAll query, and select
all of its columns by moving them to the right side box. Follow the Next and Finish
prompts to return the data to the spreadsheet.
The structure of the PivotTable contains a space for row variables, column vari-
ables, page variables, and the main fact. Drag Year and YearMonth from the feld list
onto the table column location. Drag the ModelType and SaleState felds onto the
row location. Finally, drag the SalePrice onto the main body of the table. You can
place the remaining felds in the page location if you want to make them easy to fnd
later.
The fun part is playing with the cube. Select a Year heading and click the minus
button to collapse the detail. Do the same with the ModelType or SaleState column.
Watch as the totals are automatically updated. Drag the ModelType or SaleState feld
heading to swap the order. Collapse or expand the feld to summarize or drill down
into the data. You can just as easily expand only one year or one state.
Quick Quiz:
1. How is the cube browser better than writing queries?
2. How would you display quarterly instead of monthly data?
3. How many dimensions can you reasonably include in the cube? How would you
handle additional dimensions?
601 Chapter 9: Business Decisions
effective means to convince management that neighborhoods have changed and
that you need to move your retail outlets. A GIS can also be used for simulations
to examine alternatives. For example, a GIS oriented to roadmaps can compute
the time it would take to travel by different routes, helping you establish a distri-
bution pattern for delivery trucks.
Example
Consider the problem faced by a manager in a small retail chain that has stores
located in 10 Florida cities. It sells a combination of hard goods (such as cleaning
supplies, snack items, and drapery rods) and soft goods (mostly clothing). For the
most part, proft margins for soft goods are higher than for hard goods. However,
total sales of hard goods seem to be better than those of soft goodsexcept in
certain stores. The manager has been unable to fnd a reason for the difference, but
a friend who has lived in Florida longer suggested that there might be some geo-
graphical relationship. The basic numbers are presented in Figure 9.18.
Because there are only 10 cities, it might be possible to identify patterns in the
data without using a GIS. However, an actual frm might have several hundred or
a few thousand stores to evaluate. In this case, it is much more diffcult to identify
relationships by examining the raw data. It is better to use a GIS to plot the data.
Different colors can be used to highlight large increases in sales. By overlaying
this data with the population and income data, it is easier to spot patterns. Notice
in Figure 9.19 that there is a correlation between population and total sales. Also,
notice that sales in the northern cities are concentrated more in hard goods than
in the southern cities. Each of the radar charts in the north points to the northwest
(left), while those in the south point to the northeast (right). Once you see this pat-
tern, it becomes clear; yet it is diffcult to see the pattern within the raw data, or
through any other chart.
City 2000 pop 2009
pop
2000
per-capita
income
2009
per-capita
income
2000 hard
good sales
(000)
2000 soft
good sales
(000)
2009 hard
good sales
(000)
2009 soft
good sales
(000)
Clewiston 8,549 7,107 15,466 15,487 452.0 562.5 367.6 525.4
Fort Myers 59,491 64,674 20,256 30,077 535.2 652.9 928.2 1010.3
Gainesville 101,724 116,616 19,428 24,270 365.2 281.7 550.5 459.4
Jacksonville 734,961 813,518 19,275 24,828 990.2 849.1 1321.7 1109.3
Miami 300,691 433,136 18,812 23,169 721.7 833.4 967.1 1280.6
Ocala 55,878 55,568 15,130 20,748 359.0 321.7 486.2 407.3
Orlando 217,889 235,860 20,729 23,936 425.7 509.2 691.5 803.5
Perry 8,045 6,669 14,144 19,295 300.1 267.2 452.9 291.0
Tallahassee 155,218 172,574 20,185 27,845 595.4 489.7 843.8 611.7
Tampa 335,458 343,890 19,062 25,851 767.4 851.0 953.4 1009.1
Figure 9.18
Geographic sales data. We suspect that sales of hard and soft goods are related to
population and income. We also want to know whether there are regional patterns to
the sales.
602 Chapter 9: Business Decisions
Most GIS tools use simpler methods of displaying data. Figure 9.20 shows a
common approach where geographic regions (states) are shown in darker colors
for higher values. The chart was created by creating a query in Access to compute
sales by state for the year 2008. Microsoft Map Point was then used to draw the
map and shade the values by state. Map Point also includes demographic data
from the U.S. Census Bureau at relatively detailed levels that can be added to
the chart. More sophisticated, and more expensive, tools such as ESRIs ArcInfo
can display multiple layers of data using overlays. Google maps (and Microsofts
Bing) provide some simple GIS tools using their online systems. The beneft is
that the tools are free, but the options available are limited. Typically, you can
display only push-pins to highlight specifc locations. However, they do support
some programmatic tools so you can automatically create charts from your Web
server.
Data Mining
Is it possible to automate the analysis of data? Many decision mak-
ers, particularly researchers, are buried in data. Transaction-processing systems,
process control, automated research tools, even Web sites all generate thousands,
Figure 9.19
Geographic-based data. It is diffcult to display this much data without overwhelming
managers. Notice that the sales (radar) graphs use size and shape to highlight total
sales, and the changing sales mix. Income is color-coded in a smaller graph. Notice
in the sales graphs that the northern counties experienced a greater increase in sales
in hard goods compared to the southern counties.
Tampa
Miami
Fort Myers
Jacksonville
Tallahassee
Gainesville
Ocala
Orlando
Clewiston
Perry
17,000
15,800
14,600
13,400
12,200-
1990 2000
20,700
19,400
18,100
16,800
15,500-
per capita income
Red
3. 2
Yellow
2. 3
Blue
1. 9
Green
2. 3
Red
1. 7
Yellow
1. 1
Blue
1. 0
Green
1. 1
Red
2. 1
Yellow
1. 7
Blue
1. 1
Green
1. 4
Red
5. 0
Yellow
4. 2
Blue
3. 2
Green
3. 7
Red
1. 8
Yellow
1. 5
Blue
1. 2
Green
1. 4
Red
2. 6
Yellow
3. 0
Blue
1. 9
Green
1. 6
Red
3. 6
Yellow
3. 8
Blue
3. 2
Green
2. 9
Red
3. 5
Yellow
3. 8
Blue
2. 5
Green
2. 0
Red
1. 4
Yellow
2. 0
Blue
2. 1
Green
1. 7
Red
3. 7
Yellow
4. 8
Blue
3. 2
Green
2. 7
2000
Hard
Goods
2000
Soft
Goods
1990
Hard
Goods
1990
Soft
Goods
603 Chapter 9: Business Decisions
millions, or even billions of pieces of data a day. Sure, you can retrieve the data
into a data warehouse, run queries, or put it into a spreadsheet, but it is still dif-
fcult for humans to comprehend raw data.
Data mining consists of a variety of tools and techniques to automatically re-
trieve and search data for information. Originally, the term was derogatory be-
cause it represents an undirected search for relationships. Statistically, results
obtained from nonscientifc searches can be spurious and not repeatable. On the
other hand, the tools can fnd minute comparisons that are not ordinarily found
through traditional statistical methods. As the food of data increases, more com-
panies are turning to automated and semiautomated tools to help search databases
and make it easier to visualize patterns. Additional models and research can then
be used to investigate and validate the relationships.
Data mining tools exist for numerical and other types of data. The numerical
tools tend to be based on statistical theory. The others sometimes use statistical
theory but are often highly specialized. For example, event analyses look for pat-
terns in data based on timing or sequencesuch as the path viewers take through
a Web site. This chapter focuses on the more generic statistical tools because they
are used in many different companies and tasks. The specialty tools typically re-
quire a detailed background in a specialty discipline, so you can learn more about
them when you study specifc topics.
Figure 9.20
Geographic-based data. Tools such as Microsoft Map Point often display location-
based data by shading geographic regions based on the relative levels of the data.
This map shows sales by state for Rolling Thunder Bicycles in 2008.
604 Chapter 9: Business Decisions
As shown in Figure 9.21, a common theme in the numerical data mining tools
is the search for items that infuence a given fact variable. Much like the data
cube, you might choose the Sales variable as the fact to be investigated. In sta-
tistics terms, it becomes the dependent variable. You then want the system to ex-
amine various attributes or independent variables to see how they infuence the
dependent variable. For instance, you might have data on customer location, in-
come, product category, time and month purchased, marketing budget, and a host
of other variables that could conceivably affect the level of sales. Remember this
goal as you read the rest of this section. Even if you have limited experience with
statistics, remember that most of the tools are trying to identify which independent
variables strongly affect the dependent variable.
Correlation is a key statistical tool that is leveraged in data mining. A data min-
ing system can compute the cross correlation for all dimensions. High correla-
tions provide a useful indicator of how one dimension (variable) affects another.
Correlation typically represents direct effects between pairs of variables. Multiple
regression is an extension of correlation where multiple dimensions (independent
variables) are used to predict values for a dependent variable. The regression co-
effcients have long been used by statisticians to measure the importance of each
attribute. Special data mining tools extend these concepts into nonlinear relation-
ships, automatically searching for relationships between variables. For example,
marketers could mine the sales data to determine which variables had the stron-
gest impact on sales revenue, including price, quality, advertising, packaging, or
collections of product attributes. Regression tools provide numerical estimates of
the coeffcients for direct and indirect effects, along with measures of the accuracy
of the estimate (standard errors).
Clustering is another data mining technique. It tries to fnd groups of items
that have similar attribute values. For example, a car manufacturer might fnd that
younger buyers are attracted to one car model, while older buyers tend to pur-
Sales
Location
Dependent Variable
Fact
Independent Variables
Dimensions/Attributes
Age
Income
Time
Month
Category
Direct eects
Indirect eects
Figure 9.21
Common data mining task. Determine how independent variables affect the
dependent fact variable. Models can have direct or indirect effects. Basic linear
models are easy to estimate, non-linear ones are harder to estimate and more diffcult
to understand.
605 Chapter 9: Business Decisions
chase a different model. These concepts are relatively easy to understand in two or
three dimensions. The tools can search in higher dimensions, looking for group-
ings across dozens of attributes. The results are more diffcult to interpret and act
on, but can provide useful information in dealing with complex datasets. Figure
9.22 shows an example that compares cars on three dimensions: acceleration time,
weight, and miles per gallon. The results show that there were two distinct groups
of cars at that point in time. Heavy cars with low acceleration times (faster), and
low miles per gallon versus light, slow cars that achieved more miles per gallon.
Clustering is a useful tool when you are frst looking at data or when you need
to reduce the number of dimensions. In the car example, you can reduce the analy-
sis to looking at those two groups of cars. Similarly, you might learn that you have
three or four types of primary customers, enabling you to focus your analysis and
decisions on how representatives from each group will react to changes.
One of the classic data mining tools is market basket analysis (or association
rules). Market basket analysis was designed to address the question, What items
do people tend to purchase together? Figure 9.23 shows the classic example that
was purportedly identifed by a convenience store. Managers found that on week-
ends, people often purchased both beer and diapers. This raises the immediate
issue of how you can use the results. You might stock the items near each other
to encourage people to buy both. Or, you might place the items at opposite ends
of an aisleforcing people to walk past the high-impulse items such as chips.
Or, perhaps you discount the diapers to attract more customers and make up the
additional proft by not discounting the beer. The tool is generic and is used by
Figure 9.22
Clustering. Sometimes you want to know which items are similar to others. You
might face distinct groups of customers, or your products might be perceived
in certain clusters. This example compares cars in terms of three dimensions
(acceleration time, weight, and gas mileage) to reveal two distinct groups.
606 Chapter 9: Business Decisions
companies such as Amazon.com and Netfix to show you books that were bought
by other customers. If you are interested in the frst book, you might also like
the books that other people purchased along with that book. Tivo, the television
recording system, uses a similar process to identify programs that you might be
interested in watching. To illustrate the hazards of data mining, many people have
reported interesting twists with Tivo. For instance, if you watch one movie for
children, the system will begin to offer more shows geared toward children. Mar-
ket basket or association analysis is relatively easy to computeparticularly for
pairs of items. Several tools exist to perform the computations for you, including a
couple of open source tools such as Weka.
Do not let the name fool you. Market basket analysis has many more uses than
the example shows. More properly known as association analysis, it works well
with categorical data that does not need to be measured numerically. It basically
estimates the probability that any two (or more) items will occur together. These
items could be purchases, or they could be diseases, events such as Web clicks,
votes, and so on.
Several data mining tools have been built in the past few years. They are rela-
tively easy to use, but you might want to review your statistics to help understand
the results. One catch with the tools is that some of them can take time to run
even with fast machines, some complex analyses can take hours. For example,
market basket analysis is relatively fast with pairs of items, but requires expo-
nentially more computations and time if you attempt to compare more than two
items at a time. A bigger problem is that the results might be meaningless or not
reproducible. They might simply have arisen because of some random occurrence
in the data. The bottom line is that you have to carefully evaluate each piece of
information to make sure it is relevant and important.
Expert Systems
Can information technology be more intelligent? Can it ana-
lyze data and evaluate rules? Imagine your life as a top-notch manager.
Coworkers perceive you as an expert and value your advice and problem-solving
skills. You are constantly answering questions and there are always more prob-
lems than you can handle. You are using decision support systems and integrated
information technology to perform your job better and more effciently, but it is
Figure 9.23
Market basket analysis. What items do people buy together? Data mining tools can
examine each purchase to identify relationships. You can use this information to
increase cross selling.
607 Chapter 9: Business Decisions
Technology Toolbox: Forecasting a Trend
Problem: You need a basic forecast of sales data.
Tools: Many statistical tools and packages exist to build models and estimate trends.
The simplest technique is a linear regression. Excel has tools to calculate and display
the results.
Open the Rolling Thunder database and create a query that computes the total
sales by year and month. The Format function converts the date: Format(OrderDate,
yyyy-mm). Save this query within Access, and close the database. To import the
data into Excel, open a new worksheet and choose the Data/Import/New Database
Query option. This approach will build a dynamic link to the query.
Create a line chart of the data. Right-click the plotted line and select the option to
add a trend line. You should stick with the linear trend, but you might want to test the
other choices. Select the options to display the equation on the chart.
To see the actual forecast values, select the entire column of data for SumOf-
SalePrice, but do not include the title row. Scroll down to the last row in the series
and fnd the small square handle on the lower-right-side corner. Drag this handle to
extend the series for six months. Add the appropriate months in the month column.
Edit the chart and edit the series selections to include the new rows. Notice that the
new points fall exactly on the trend line.
Excel includes more powerful statistical tools, including one that performs multi-
ple regression when you want to examine the effect of many variables. Although this
dataset contains only one variable, you can still use it to test the tool. First, insert a
new column that numbers the months as 1, 2, 3, and so on. Ensure the Analysis Tool-
Pak is loaded and select Tools/Data Analysis and pick the Regression tool. As the Y
range, select the sales column including the title row but excluding the six rows you
forecast earlier. Select the month column as the X range. Be sure to check the Labels
box, and then run the regression. This tool provides the standard regression coeff-
cients, probabilities, and diagnostics.
Quick Quiz:
1. Why is a linear forecast usually safer than nonlinear?
2. Why do you need to create a new column with month numbers for regression
instead of using the formatted year-month column?
3. What happens to the trend line r-squared value on the chart when you add the
new forecast rows to the chart?
608 Chapter 9: Business Decisions
not enough. Can technology help you with more complex decisions and problem
solving? From another perspective, when you encounter new problems with dif-
ferent, complex models, it would be helpful to have an expert assist you with ap-
plying and understanding the models. Yet experts or consultants are expensive and
not always available. Can you somehow capture the knowledge and methods of
experts and use technology to make this knowledge available to workers through-
out the company?
Specialized Problems
Expert systems have proven useful for many problems. The goal of an expert sys-
tem is to enable novices to achieve results similar to those of an expert. The users
need to understand the basic problem, learn the terminology, and be able to an-
swer questions. For example, a typical patient would not be able to use a medical
expert system because the questions and terms would not make any sense.
Think of an expert system as a consultant in a box. The consultant can solve
only certain specifc problems. For example, perhaps a retail store manager needs
to estimate buying patterns for the next few months. The manager might call a
marketing consultant to survey buyers and statistically search for patterns. The
consultant will ask questions to determine the basic objectives and identify prob-
lems. Similarly, a production manager might be having problems with a certain
machine. The manager might call a support line or a repair technician. The advice
in this situation will be quite different from the marketing example, because the
topics (or domains) of the two problems are different. It would be diffcult to cre-
ate one computer program that could help you with both types of problems. On
the other hand, there are similarities in the approach to the two problems. Com-
puterized expert systems are designed to solve narrow, specialized problems. Each
problem can be relatively complex, but it must be reasonably well defned. Many
business problems fall into this category, and expert systems can be built for each
problem.
Diagnostic Problems
Several problems in the world can be classifed as diagnostic situations. These
problems arise when the decision maker is presented with a set of symptoms and
is asked to fnd the cause of the problem, as well as solutions. Consider a frm that
uses a complex machine. If the machine breaks down, production stops until it
is fxed. In addition, maintenance tasks have to be performed every day to keep
the machine running. The company hires an engineer to perform these tasks. The
engineer also knows which adjustments to make if various symptoms appear. This
system has been working well, and the company wishes to expand to other loca-
tions with a franchise system. The problem is that there is only one engineer, and
it would be too expensive to have a highly trained engineer at each location.
One possible solution would be to set up a phone link between the franchises
and the engineer. One person at each franchise would be trained in the basics of
the machine. If problems arise, the person could call the engineer. The engineer
would ask specifc questions, such as What do the gauges show? The answers
will lead the engineer to ask other questions. Eventually, the engineer makes rec-
ommendations based on the answers.
Of course, if there are many franchises, the engineer will be too busy to solve
all of the problems. Also, if the businesses are located in different countries, the
time differences may not allow everyone enough access to the engineer. A bet-
609 Chapter 9: Business Decisions
ter solution is to create a computerized expert system. All the experts questions,
recommendations, and rules can be entered into a computer system that is distrib-
uted to each franchise. If there is a problem, the on-site person turns to the expert
system. The system asks the same questions that the engineer would and arrives at
the same recommendations.
As shown in Figure 9.24, expert systems also have the ability to explain their
recommendations. In more complex examples, while running the ES, the user can
ask it to explain why it asked a particular question or why it arrived at some con-
clusion. The ES traces through the answers it was given and explains its reason-
ing. This ability helps the user gain confdence in the decisions, allows mistakes to
be corrected, and helps the users remember the answer for future reference.
The business world offers many examples of diagnostic situations, such as
identifying causes of defects, fnding the source of delays, and keeping complex
equipment running. The common characteristic is that you are faced with a set of
symptoms, and you need to fnd the cause.
Speedy Decisions
Other situations can beneft from the use of expert systems. Even if a problem is
not exceedingly complex, you could use an expert system to provide faster re-
sponses or to provide more consistent recommendations. Several advantages can
be gained from making decisions faster than your competitors do. If you can iden-
tify a trend in stock prices before anyone else, you can make a higher proft. If you
can answer customer questions faster, they will be more likely to shop with you in
the future. If you can provide a loan to a customer sooner than anyone else, you
will do more business.
Figure 9.24
Expert System example from ExSys. This sample expert system acts as a
knowledgeable dog lover and asks questions about how you view characteristics of
dogs. Based on your responses it makes a recommendation of which breed might be
good for you. The Web site contains many other examples.
610 Chapter 9: Business Decisions
Transaction-processing systems keep much of the basic data that you need to
make decisions. Decision support systems help you analyze that raw data. Both of
these tools enable you to make decisions faster than trying to make the decision
without any computers. However, it still takes time for a human to analyze all of
the information.
Consider the case of a bank loan. In order to get a loan, you go to the bank
and fll out a loan application form. You tell the loan offcer why you want the
loan and provide basic data on income and expenses. Depending on the amount of
money involved, the banker will probably check your credit history, get appraisals
on any collateral, and perhaps get approval by a review offcer or loan committee.
All of these actions take time.
Now, consider the steps involved with a computerized process. First, you need
to tell the bank that you want a loan. Instead of driving to the bank, you could use
the telephone. With a push-button phone, you enter information directly into the
banks computer. The computer would give you a choice of loan types (car, boat,
personal, etc.), and you push a button to select one. You enter the amount of mon-
ey you want to borrow. The next step is to check your credit history. Your income,
expenses, and credit record are available to the bank from national credit reporting
agencies. The bank might also have its own database. The banks computer could
be connected to credit agency computers to collect additional data on your credit
history.
To make the fnal decision, the bank needs a set of rules. These rules take into
account the size of the loan, the value of the collateral, as well as your income,
expenses, credit history, and existing loans. When the bank has determined the
proper rules, the computer performs the analyses. If the bankers trust the rules, the
computer could make the fnal decision. For example, there would be no need for
a loan offcer to be involved in simple decisions, such as making small car loans
to customers with large savings accounts. With an expert system, a bank can cut
the loan-approval period down to a few minutes on the phone.
Many other decisions need to be made rapidly. The frst step in all of these cas-
es is to make sure that the transaction-processing system provides the necessary
raw data. The second step is to create a set of rules for making the decision. The
diffculty lies in fnding these rules. For some problems, there are well-defned
rules that can be trusted. For other problems, the rules may not exist. In this case,
the company will probably still need a human to make the fnal decision.
Consistency
The example of the bank loan demonstrates another advantage of expert systems.
Business decisions are subject to a wide variety of nondiscrimination laws. An
expert system can be used to provide consistent decisions. The rules followed by
the ES can be set up to avoid illegal discrimination. Businesses also have credit
ratings, which are often determined by Credit Clearing House (CCH). CCH
uses an expert system to make the easy decisions, which speeds up the process
by allowing humans to focus on the more complicated cases. It also leads to con-
sistent application of the rules.
Consider the loan example. If each loan offcer makes individual decisions, it is
hard to determine whether they are consistent with corporate policy. Each individ-
ual decision would have to be checked to make sure it was nondiscriminatory. On
the other hand, a committee could spend several weeks creating a set of lending
rules that can be verifed to be sure they are legal and ethical. As long as the bank
611 Chapter 9: Business Decisions
employees follow the recommendations of the ES, the outcome should not be dis-
criminatory. Because there should be few cases where the loan offcer overrules
the ES, managers will have more time to examine each of these circumstances.
Many business decisions need to be performed consistently to avoid bias and
to treat people equally. Loans, pricing, raises, and promotions are some examples.
However, there can be problems with using a computer system to enforce stan-
dards. The main diffculty lies in creating a set of rules that accurately describe
the decisions and standards. For example, it might be useful to have a set of rules
regarding raises and promotions, but think about what happens if an employees
job does not ft the basic rules. Organizations continually change, which means
the rules have to be monitored and changed regularly.
Training
Training employees is closely associated with problems of consistency. All orga-
nizations must train employees. If the tasks are complex and the decisions highly
unstructured, it can take years for employees to learn the rules and gain the experi-
ence needed to deal with problems. Two features of expert systems help employ-
Reality Bytes: Dont Bet Against the Machine
Online poker sites are hot. Many people, particularly college students, see it as a
simple diversion or a way to pick up a couple of bucks. But have you considered
how easy it is for someone to cheat at online poker? Some of the better gaming sites
try to detect obvious cheats, but it can be hard to catch a group of players who work
together to feece an outsider. Players also face a new threat: poker botsautomated
programs that play poker. Some people are aboveboard and build them to search for
new ideas in AI. There is even an international competition for poker bots. Others
build poker bots and put them online without telling opponents. But how good are
the poker bots? Dr. Jonathan Schaeffer, a professor of computer science at the Uni-
versity of Alberta, has spent over 14 years developing a poker bot, and he competes
aboveboard in public tournaments. In 2003, his program went head-to-head against a
top poker player. For the frst 4,000 hands, the computer was leading, but the poker
player eventually analyzed the programs approach and developed a new strategy
to beat it. But how many poker games involve top-level players? Dr. Schaeffer ob-
served that when you look at the low-limit tables, I have not doubt that there are
computer programs that can win at that level consistently. And dont forget that these
programs can play all the time, without getting tired. And they can play at multiple
tables. In 2005, the Golden Palace in Las Vegas sponsored a poker bot competi-
tion. Poker ProBot created by Hilton Givens of Lafayette, IN won after nearly 5,000
hands, earning the $100,000 prize. He also had the opportunity to match his program
against human pro player Phil Laak. Phil trounced the machine in 399 hands, and
also beat the University of Alertas PokiX bot in 290 hands. But most experts believe
that just as in the chess world, the machines will eventually improve to beat humans.
In 2011, the U.S. government shut down most of the online poker sites doing busi-
ness America--primarily because they allegedly violated the U.S.laws against online
gambling. Ultimately, online poker is a fool's game.
Adapted from Shawn P. Roarke, Bots Now Battle Humans for Poker Supremacy,
Fox Sports, July 20, 2005.
612 Chapter 9: Business Decisions
ees learn. First, employees learn what questions need to be asked. In particular,
after using the system for a while, certain groups of questions will occur together.
Second, most expert systems have provisions for explaining their answers (and
the motivation for each question). At any point, an employee can ask the expert
system why it asked a certain question or why it reached a conclusion.
Building Expert Systems
How do you create an expert system? At frst glance, you would sus-
pect that expert systems are hard to create. However, except for one step, which
is hard, tools exist to make the job easier. The area that causes the most problems
when you are creating expert systems is fnding a cooperative expert who fully
understands and can explain the problem. Some problems are so complex that it
is diffcult to explain the reasoning process. Sometimes the expert may rely on
vague descriptions and minor nuances that cannot be written down. Even though
expert systems can deal with these types of problems, it might take too long to
determine the entire process. Also, if you transfer the experts knowledge to a
computer, the expert might worry about losing his or her job.
Most expert systems are built as a knowledge base that is processed or ana-
lyzed by an inference engine. A knowledge base consists of basic data and a set
of rules. In most situations, an inference engine applies new observations to the
knowledge base and analyzes the rules to reach a conclusion.
The basic steps to create an expert system are (1) analyze the situation and
identify needed data and possible outcomes, (2) determine relationships between
data and rules that are followed in making the decision, (3) enter the data and rules
into an expert system shell, and (4) design questions and responses. A knowledge
engineer is often hired to organize the data, help devise the rules, and enter the
criteria into the expert system shell, or supervise programmers as they create an
expert system.
First, compute the monthly income before taxes.
Next, compute the monthly payment of the loan.
If the payment is greater than 5% of income:
Compute total of other loans payments.
Compute payments as percent of monthly income.
If this percent is less than 25%:
If the new loan is less than 10%, make loan.
Else:
If total monthly expenses are less than 40% of income,
make the loan.
Else:
If less than 50% and has been a customer for more than
5 years or if less than 60% and has been a customer
for 10 years and has lived at the same address for 5 years,
make the loan.
Figure 9.25
Sample rules for the bank loan. A portion of the business rules that are used to
determine whether a person should get a loan.
613 Chapter 9: Business Decisions
Knowledge Base
A knowledge base is more than a simple database. It consists of data but also
contains rules, logic, and links among data elements. In most cases, it contains
less structured and more descriptive data. For example, an ES for medicine might
have a list of symptoms that contains items like high temperature and intense
muscle pain. This knowledge base is the reason why the problem must be nar-
row in scope. Even narrow, well-defned problems can require large amounts of
information and thousands of rules or relationships. The real challenge in building
expert systems is to devise the knowledge base with its associated rules.
Three basic types of expert systems are in use today. They are defned by how
the knowledge base is organized: by rules, frames, or cases.
Rules
The heart of a rule-based ES is a set of logical rules. These rules are often com-
plicated. Consider some of the rules that might be needed for an ES to evaluate
bank loans, as shown in Figure 9.25. This example has been simplifed to keep it
short. There will usually be hundreds of rules or conditions to cover a wide variety
of situations. Rules are often presented as If Then else statements. They
can include Boolean conjunctions such as AND, OR, NOT. Figure 9.26 presents a
portion of a decision tree that visually displays the rules.
The diffculty with any ES lies in determining these rules. Some of them will
be easy. Others will be complex. Most of them will come from the expert. Unfor-
tunately, most people do not usually express their thoughts in the form of these
rules. Although a person might follow rules of this sort, they can be diffcult to ex-
press. It is even more diffcult to remember all the rules at one time. For instance,
Payments
< 10%
monthly income?
Other loans
total < 30%
monthly income?
Credit
History
Job
Stability Approve
the loan
Deny
the loan
No
Yes
Good
Yes
No
Bad
So-so
Good Poor
Figure 9.26
Decision tree for sample bank loan expert system. Parts of a knowledge base are
often expressed as a decision tree. Each answer to a question leads to additional
questions and eventually to a decision. Notice that questions sometimes require
numeric answers but can also rely on subjective comments.
614 Chapter 9: Business Decisions
say you have lived in the same place for fve years and a new person moves into
the neighborhood. She asks you to describe the best ways to get to school, the
mall, and the grocery store. Then she asks you for the best shortcuts if one of the
roads is closed. This problem is relatively simple, but can you sit down right now
and provide a complete list of all the rules?
Creating an ES
More commonly today, an ES is built from an expert system shell. This program
provides a way to collect data, enter rules, talk to users, present results, and evalu-
ate the rules. To create an ES, you must know what data you need and all of the
rules. Once you express this knowledge base in the format used by the shells
inference engine, the shell takes care of the other problems. Many ES shells are
available on a wide variety of computers; Jess and Clips are two common systems
that are available free or at relatively low cost.
To understand how to create an ES, consider the bank loan example. A typical
dialogue with the user (the loan clerk) appears in Figure 9.27. Notice that the ES
begins by asking some basic information-gathering questions. The responses of
the user are underlined. Once the basic data is collected, the ES performs some
computations and follows the built-in rules. Notice that the ES follows the rule
that asks for the other loan payments. However, the loan clerk does not know
about this rule, so he or she asks for clarifcation. This ability to ask questions is a
powerful feature of expert systems.
Figure 9.27
Bank loan sample screen. An expert system carries on a dialogue with the user. The
ES asks questions and uses the answers to ask additional questions. The user can
ask the ES to explain a decision or a question. Hence the ES can be used for training
purposes.
Welcome to the Loan Evaluation System.
What is the purpose of the loan? car
How much money will be loaned? 15,000
For how many years? 5
The current interest rate is 10%.
The payment will be $297.02 per month.
What is the annual income? 24,000
What is the total monthly payments of other loans?
Why?
Because the payment is more than 10% of the monthly income.
What is the total monthly payments of other loans?
50.00
The loan should be approved, because there is only a 2% chance of default.
615 Chapter 9: Business Decisions
Once you have collected all of the rules involved in the problem, you enter
them into the ES shell. The shell lets you type in the questions you want to ask
the user. You defne the calculations and tell the shell how to look up any other
information you need (e.g., the interest rates for auto loans). You then enter the
conditions that tell the shell what questions to ask next. If there are many rules
with complex interactions, it is more diffcult to enter the rules into the shell. One
advantage of ES shells is that you generally have to enter only the basic rules and
data. As the user enters the data, the shell performs the calculations and follows
the rules. The shell also automatically answers the user questions. You do not have
to be a computer programmer to create an ES with a shell. With training, many
users can create their own expert systems using a shell. However, there are many
dangers inherent in ES development, so it helps to have someone evaluate and test
the resulting system.
Limitations of Expert Systems
Expert systems are useful tools that can be applied to several specialized prob-
lems. However, several important drawbacks arise in their design and use. First,
they can be created only for specifc, narrowly defned problems. Some complex
problems contain too many rules with too many interactions. It quickly becomes
impossible to express all of the interrelationships. For example, it is currently im-
possible to create a medical diagnostic system that covers all possible diseases.
However, smaller systems are in use that help determine drug dosages and other
treatments such as radiation levels for cancer patients.
Another problem that users and designers have encountered is that it can be
diffcult to modify the knowledge base in an expert system. As the environment or
Reality Bytes: One Smart Machine is Better than Thousands of People
Many people have touted the potential benefts of crowd-sourcing: breaking a prob-
lem into small pieces and using the Internet to assign each piece to thousands of
workers. Amazon developed the Mechanical Turk to facilitate these types of tasks.
Anyone can sign up to complete tasks and receive wagesoften only pennies a
chore. The goal is to handle tasks that are easy for humans but diffcult for machines.
The problem is that people being paid low wages are usually not very good and
machines are getting smarter. The Web site Yelp ran a comparison test. First, re-
searchers developed a multiple choice test to try to identify the best Turkers who
could correctly categorize a business (restaurant, clothing, etc.), phone number, and
address; based on its Web site. The initial test was given to 4,660 applicants, only
79 of them passed. This select group of the best were then given the problem of
classifying business information where three people saw the same site. If a major-
ity (2-3) agreed, the site was then classifed. The researchers then applied a Nave
Bayes classifer data mining algorithm on the same set of problems. The algorithm
was trained using 12 million examples submitted earlier by Yelp users. The computer
algorithm easily beat the humanscorrectly classifying the sites a third more often
than the people. Does that mean machines are smarter than humans? Or just better
than poorly-paid humans with low motivation?
Adapted from Christopher Mims, AI Defeats the Hivemind, Technology Review,
December 20, 2010.
616 Chapter 9: Business Decisions
problem changes, the expert system needs to be updated. The changes are relative-
ly easy to make if they affect only a few rules. However, many expert systems use
hundreds of interrelated rules. It is not always clear which rules need to be altered,
and changes to one rule can affect many of the others. In essence, as the situa-
tion changes, the company is forced to completely redesign the expert system. In
fast-changing industries, it would cost too much to continually redesign an expert
system. In the lending example, a policy change based on monthly income would
be relatively easy to implement. On the other hand, some changes in policy would
force a complete redesign of the expert system. For instance, a bank might decide
to grant loans to almost everyone but charge riskier people higher interest rates.
Probably the greatest diffculty in creating an expert system is determining the
logic rules or frames that will lead to the proper conclusions. It requires fnding an
expert who understands the process and can express the rules in a form that can be
used by the expert system.
Management Issues of Expert Systems
Creating and building an expert system involve many of the same issues encoun-
tered in building any other information system. For instance, the problem must be
well defned, the designers must communicate with the users, and management
and fnancial controls must be in place to evaluate and control the project.
However, expert systems raise additional management issues. Two issues are
particularly important: (1) if an expert transfers knowledge to an expert system,
is there still a need for the expert; and (2) what happens when the expert system
encounters an exception that it was not designed to solve?
The answer to the frst question depends on the individual situation. In cases
where the problem is relatively stable over time, it is possible to transfer expert
knowledge to softwareenabling the frm to reduce the number of experts need-
ed. If this action results in layoffs, the experts will need additional incentives to
cooperate with the development of the system. In other cases, the frm will con-
tinue to need the services of the experts, to make changes to the ES and to solve
new problems. Before starting an ES project, managers need to determine which
situation applies and negotiate appropriately with the experts.
The second problem can be more diffcult to identify. Consider what happens
when workers rely on an expert system to make decisions, and management then
cuts costs by hiring less-skilled workers. The new workers do not understand the
system or the proceduresthey simply follow decisions made by the rules in the
ES. If an exception arises, the ES may not know how to respond or it may respond
inappropriately. A customer then would be left to deal with an underskilled worker
who does not understand the process and cannot resolve the problem.
Specialized Tools
Can machines be made even smarter? What technologies can
be used to help managers? Research in artifcial intelligence (AI) exam-
ined how humans are different from computers. This research led to tools that can
be used for certain types of problems. Some of the ideas come from the early days
of computers, but it has taken until now for machines to be developed that are fast
enough to handle the sophisticated tasks. Ideas in AI have come from many disci-
plines, from biology to psychology to computer science and engineering.
Humans are noticeably better than computers in six broad areas: pattern rec-
ognition, performing multiple tasks at one time, movement, speech recognition,
617 Chapter 9: Business Decisions
vision, and language comprehension. Some of these concepts are related, but they
all represent features that would make machines much more useful. Even with
current technological improvements, most observers agree that it will be several
years before these features are available.
Pattern Recognition and Neural Networks
One of the early issues in AI research was the question of how human brains
worked. Some people suggested that to make intelligent computers, the computers
would have to work the same way as the human brain does. An important conclu-
sion from this research is that humans are good at pattern recognition.
Humans use pattern recognition thousands of times a day. It enables people
to recognize coworkers, to spot trends in data, to relate todays problems to last
years changes. Many problems in business could beneft from machines that can
reliably recognize patterns. For example, what characteristics do good borrow-
ers have in common? How will changes in the economy affect next years sales?
How are sales affected by management styles of the sales managers?
Pattern recognition is used by people to solve problems. It is one of the reasons
teachers use cases to teach students to solve business problems. If you notice that
a problem is similar to a case you have seen before, you can use your prior knowl-
edge to solve the problem. Imagine how useful it would be if an expert system
could recognize patterns automatically.
One current technique that is used to spot patterns is the use of neural net-
works. Initial study indicated that the brain is a collection of cells called neurons
that have many connections to each other. Each of these cells is relatively simple,
but there are approximately 100 million of them. In some respects, a neuron re-
sembles a simple computer. It can be at rest (off), or it can fre a message (on). A
neuron responds to other cells (input) to send messages to other neurons (output).
A collection of these cells is called a neural network. Human neural cells are
actually more complicated, but researchers have focused on this simplifed form.
A common current example is a bank that uses a neural network to spot credit
card fraud. In some cases, Mellon Banks neural network identifed fraudulent
patterns even before the human investigators spotted them. It is faster and more
accurate than an earlier expert system. The original expert system looked at a lim-
ited number of variables and indicated 1,000 suspects a day, which was far more
than actually existed and too many for the investigators to keep up with. The new
neural network system examines more variables, lists fewer false suspects, and
adjusts its methods on its own.
A fnance manager might use a form of pattern recognition to search for pat-
terns in the fnancial markets to forecast future movements. Of course, with thou-
sands of other people searching for patterns, the patterns would not last very long.
Similarly, a banker might use pattern recognition to classify loan prospects.
Neural networks can be built with software. Also, computer chips are avail-
able today that function as neural networks. Neural networks can be measured in
two ways by (1) the number of neurons and (2) the number of interconnections
between the individual cells. It is fairly easy to increase the number of cells, but
the number of possible interconnections increases very rapidly. For instance, if
there are four cells, there are six possible connections. With 10 cells, there are 45
connections. With 1,000 cells, there are half a million connections. In general, if
there are N cells, there are N(N - 1)/2 possible connections. For many purposes,
not every connection is needed, but with millions of cells, a neural network would
618 Chapter 9: Business Decisions
incorporate a large number of connections. Most existing networks use only a few
thousand cells.
Figure 9.28 presents a version of how a neural network converts an array of
input sensors into a hidden layer and then stores patterns on an output layer. One
useful feature of the neural network approach is that it is fairly good at identifying
patterns even if some of the inputs are missing.
What can neural networks do that cannot be done with traditional computers?
The basic answer is nothing. However, they provide a new way of thinking
about problems. More important, with hardware specifcally designed to process
neural networks, some diffcult problems can be solved faster than with traditional
computers. The primary objective of neural networks is the ability to store and
recognize patterns. A well-designed network is capable of identifying patterns
(such as faces or sounds) even if some of the data is missing or altered.
Another advantage that researchers hope to achieve with neural networks is the
ability to simplify training of the computer. The discussion of expert systems not-
ed that changes in the business often mean that knowledge engineers have to rede-
sign the entire expert system. A neural network has a limited ability to learn by
examining past data. Feeding it proper examples establishes the interconnection
weights that enable the network to identify patterns. In theory, neural networks
Output Cells
Sensory Input Cells
Hidden Layer
Some of the connections
3
-2
7
4
Input weights
Incomplete
pattern/missing inputs.
6
Figure 9.28
Neural net for pattern matching. Input cells convert data to binary form. The required
hidden layer recodes the inputs into a new internal representation. The connections
represent outputs from the lower layers. When total input levels exceed some value,
the receiving cell fres. Any cell can be connected to many other cells. Input weights
are determined by training. The output cells are triggered when total input levels
from the connections exceed some threshold. Note that a pattern can be recognized
even if some input cells are wrong or not fring.
619 Chapter 9: Business Decisions
have the ability to learn on their own. In practice, the learning stage is the most
diffcult component of building a neural network. Most times the designer has to
understand the problem and provide hints to the network, along with good sample
data. In many ways, training a neural network uses basic properties of statistics
related to data sampling and regression.
Machine Vision
Machine vision has many uses in manufacturing environments. Machines are
used in optical character recognition, welding and assembly, and quality control.
Mechanical sensors have several advantages over humans. They do not suffer
from fatigue, they can examine a broader spectrum of light (including ultravio-
let and infrared), and they can quickly focus at many different levels (including
microscopic).
On the other hand, traditional computer systems are literal in their vision. It is
hard for computers to compare objects of different sizes or to match mirror im-
ages. It is hard for machines to determine whether differences between objects are
minor and should be ignored or if they are major distinguishing features.
Say you are shown a picture of your instructor, and someone adds or subtracts
features to it, such as bigger eyebrows, longer hair, or glasses. In most cases, you
would still recognize the face. Computers would have diffculty with that problem
because they see pictures as a collection of dots (or lines). How does the computer
know which changes are important and which are minor?
Machine vision systems are improving rapidly but still have a way to go to
become commonplace. For example, companies are working on applications in
facial recognition and facial expressions, body tracking (so you can use your hand
as a computer pointer), visual tracking of handwriting for use in computer tablets,
product inspections for defects, and shape identifcation.
Reality Bytes: Make the Trains Run on Time
Scheduling trains, planes, or healthcare appointments might appear to be an easy
problem. Just fgure out the capacity, compute the time needed to get from point A to
point B, and then route everything. But, the problem is much more complex. To start
with, a complete routing scheme is a diffcult problem even in computer science,
with no simple solution. But, it gets considerably worse when things go wrong
such as a train delayed by weather. A slowdown at one point can interfere with many
other schedules. However, a university research project called Arrival resulted in
new scheduling software that effciently routes trains, even when disruptions hap-
pen. The system can handle almost instantaneous rescheduling as disruptions arise.
It adjusts timetables, platform allocations, and staff scheduling. The system has been
tested in the Netherlands, Germany, and Switzerland. In Berlin, the average wait
time was cut in half from four minutes to two. In a test in Italy, the system created a
25 percent reduction in train delays in Palermo and Genoa.
Adapted from Daily Mail Reporter, Brussels: We Can Make the Trains Run on
Time, July 16, 2010.
620 Chapter 9: Business Decisions
Language Comprehension and Translation
Related to voice recognition is the issue of language comprehension, or the ability
of the computer to actually understand what we are saying. Technically the two
topics are separate, since it might be possible to have a machine understand what
we type onto a keyboard. Language comprehension exists when the machine actu-
ally understands what we mean. One test of comprehension would be the ability
of the computer to carry on a conversation. In fact, Alan Turing, a British pioneer
in the computer feld, suggested the Turing test for computer intelligence. In this
test, a human judge communicates with a machine and another person in a sepa-
rate room. If the judge cannot determine which user is the machine and which is
a person, the machine should be considered to be intelligent. Some people have
tested this concept (using specifc topics). Other people have noted that perhaps
you do not have to be intelligent to carry on a conversation.
The Loebner Prize is a Turing test that runs every year to evaluate how close
programs are coming to meeting the challenge. Several of the challengers have
set up Web sites (e.g., www.alicebot.org, and www.jabberwacky.com) so you
can play with these conversational bots. Why do you care? First, you can buy
this technology to use it in business applicationssuch as building Web sites that
answer basic questions from customers. Second, as a customer, you might want to
learn to recognize when you are dealing with a machine instead of a human.
Language comprehension would be useful because it would make it easier for
humans to use computers. Instead of needing to learn a language such as SQL
to access data, imagine being able to get answers to questions asked in English
(or some other natural language). Of course, any natural language has its lim-
itations. The greatest danger with language comprehension is that the machine
will interpret your question incorrectly and give you the right answer to the
wrong question. Figure 9.29 provides a simple illustration of the complexities
of language comprehension. The frst example involves the use of punctuation. A
misinterpretation of the command can result in deleting the wrong fle. Similarly,
See what happens when you give a computer the frst set of instructions, but
it does not hear the commas correctly and thinks you said the second line:
(1) Copy the red, fle the blue, delete the yellow mark.
(2) Copy the red fle, the blue delete, the yellow mark.
Consider the following sentence, which can be interpreted by humans, but
would not make much sense to a computer that tries to interpret it literally.
I saw the Grand Canyon fying to New York.
Or the phrase epitomized in a grammar book:
The panda enters a bar, eats, shoots, and leaves.
Figure 9.29
There are inherent problems with voice recognition. Punctuation and implicit
meaning are two diffcult areas. Even communication between people has frequent
misinterpretations.
621 Chapter 9: Business Decisions
interpretation of a natural language involves understanding some basic concepts,
such as the fact that the Grand Canyon cannot fy.
Ultimately, translating languages requires an understanding of the underlying
meaning of a sentence and paragraph. Early translation systems can convert a
word from one language into another. For example, check out babel.altavista.com,
or any of the other online translators. Some high-end translation systems have
been developed that do a better job by at least recognizing common phrases and
idioms. Yet even these systems need to be supplemented by human translators.
IBM raised the bar for natural language comprehension in 2011. The company
created the Watson system designed to understand language, using statistics to
help it understand questions and provide answers. As shown in Figure 9.30, to
show off the system, it played several games of Jeopardy against two of the best
human opponents. The Watson system won easily. The use of statistical analysis
is still debated in computing circles. In language, it provides the beneft of letting
the system decide not just an answer but how confdent it is in the answer. Just as
in real life, if a statement is not clearly understood, the computer can ask for clari-
fcation. IBM has suggested that the system can applied to many types of business
and research problems, including medical research.
Robotics and Motion
Modern manufacturing relies heavily on robots, and the capabilities of robots con-
tinually increase. Most existing robots are specialized machines that perform a
limited number of tasks, such as welding or painting. In many frms, there is little
need for a general-purpose robot that can do everything. However, one area that
Figure 9.30
A practice Jeopardy match with IBMs Watson and two of the best human players. In
three days of televised matches, Watson handily beat the humans.
Source: http://www.youtube.com/watch?v=12rNbGf2Wwo
622 Chapter 9: Business Decisions
remains troublesome is the ability of machines to move. Making a machine that
can navigate through an unknown or crowded space is especially diffcult. Some
work is being done in this area. Liability is a major problem when robots attempt
to move among people.
In 2000, Honda built a humanoid robot (Asimo) in Japan. The Asimo robot has
two legs and arms. Its most impressive feature is the ability to walk like a human,
including up and down stairs. It can also shake hands and hand objects to people.
The multi-million-dollar project is the latest step of a 16-year evolution.
In March 2004, DARPA held the frst Grand Challenge contest for automated
vehicles in the Mojave Desert. The challenge was to create an automated vehicle
that could drive itself across 189 miles of desert hitting about 1,000 GPS way-
points in about 10 hours. The Carnegie Mellon $3 million Red Team vehicle (a
modifed Hummer) made it 7.4 miles. In fall 2005, the contest was run a second
timeand fve vehicles fnished the 132-mile course. A huge gain in a year and a
half, and the winning Stanford vehicle was created in less than a year! DARPA an-
nounced a new contest for November 2007, where the vehicles will have to drive
through city traffc. Congress has mandated that 30 percent of Army vehicles be
automated by 2015, and DARPA is attempting to stimulate innovation with these
prizes.
As computer processors decline in size and price, it becomes easier to build
intelligent mobile systems, making it possible to build robots and automated ve-
hicles. Major automobile manufacturers are working on slightly less automated
systems to provide assistance to drivers. For example, crash-warning sensors can
automatically apply brakes for an inattentive driver. Slide-control systems to pre-
vent spinouts on sharp turns have been installed in luxury vehicles for several
years.
Reality Bytes: Dealer Services Corp
Dealer Services Corp. provides fnancing to about 10,000 car dealers. The company
essentially writes separate loans for every vehicle, providing individual conditions
and payback schedules. The system generated huge amounts of data. Technically-
oriented analysts within the company developed their own spreadsheets to analyze
data, but they often had inconsistent or bad data. The company purchased WebFocus
as a tool to provide centralized access to data and business intelligence. The system
largely focused on interactive reporting and charting. When the recession hit in 2008
and 2009, the company managers were able to see results in individual markets and
by dealers to see that inventory was not selling. CIO Chris Brady noted that these
key insights warned the company early that the recession was going to cause severe
problems. So the company tightened lending standards and increased fnancial re-
serves. It was also able to provide advice to dealers, such as stop buying SUVs, they
arent selling. Brady also noted that We defnitely reduced our losses from bad
loans and didnt start to see a negative effect until the very end of 2008.
Adapted from Elizabeth Horwitt, Self-Service BI Catches On, Computerworld,
December 13, 2010.
623 Chapter 9: Business Decisions
Machine Intelligence
What would it take to convince you that a machine is intelli-
gent? The Turing test has been proposed as one method. Many other tests have
been proposed in the past. At one time, people suggested that a machine that could
win at chess would be intelligent. Todays chess-playing computers have beaten
even the top human players. Another test proposed was the ability to solve math-
ematical problems, in particular, the ability to write mathematical proofs. An early
AI program created in the 1950s could do that. Today, for a few hundred dollars,
you can buy programs or even small calculators that manipulate mathematical
symbols to solve equations.
Some people have suggested that intelligence involves creativity. Creativity is
probably as hard to measure as intelligence. Even so, examples of computer cre-
ativity abound. A few years ago, a programmer developed a system that created
music. The interesting feature of the program was that it allowed people to call
on the phone and vote on the music. The computer used this feedback to change
its next composition. Not only was the computer creative, but it was learning and
adapting, albeit in a limited context. Today, you can buy software that creates mu-
sic or plays background to your solo.
Although business applications to much of this current research is somewhat
limited, there are two main reasons for staying abreast of the capabilities. First,
anything that makes the computer easier to use will make it more useful, and these
techniques continue to improve. Second, you need to understand the current limi-
tations to avoid costly mistakes.
DSS, ES, and AI
What are the differences between DSS, ES, and AI systems? The
differences among decision support systems, expert systems, and artifcial intel-
ligence can be confusing at frst. Take a simple problem and see how a computer
system based on each method might operate. A common fnancial problem is to
determine how much money to lend to customers. Any frm that grants terms to
customersnot just fnancial institutionsmust make this decision. Figure 9.31
discusses the differences among a DSS, ES, and AI approach to the inventory
problem.
Reality Bytes: Guessing for Holiday Sales
Holiday shopping is critical for many U.S. businesses. At the high end, hobby, toy
and game stores make 34 percent of their sales in November and December. Even
for other retailers, the season is critical. Almost 20 percent of all retail sales value
arises in the last two months of the year. Department stores hit 25 percent. The one
sector that is lower than then one-sixth time frame is car dealers. The problem is that
retailers need to order products and have them on the shelves well before the season
begins. Consequently, retailers need good forecasts of both the expected sales level
and details on which products are going to be hot.
Adapted from Phil Izzo, Number of the Week: Outsize Importance of Holidays for
Retailers, The Wall Street Journal, December 24, 2010.
624 Chapter 9: Business Decisions
In a relatively simple system, the computer would retrieve data about the cus-
tomer and the prior loans to that customer. Historically, loan offcers used basic
data and personal factors to make the lending decision. In some instances, these
rules of thumb led to problemswith bad decisions and sometimes discrimina-
tion. The DSS could also be used to monitor existing loans and payments. As part
of a transaction-processing system, it can notify managers when customers con-
tinually make late payments and help identify problem loans.
To improve consistency and reduce the decision time, many frms have moved
to expert systems to help evaluate loans. Statistical analysis of prior loans is used
to establish a set of rules that are coded into the ES. In some cases, the ES can
then be operated with push-button phones or over the Internet. In straightforward
cases, the ES can make the fnal decision and approve the loan. In more diffcult
situations, the preliminary results and data can be forwarded to a human loan of-
fcer to factor in personal judgment and factors not considered by the ES.
Of course, the value of the ES depends heavily on the accuracy of the under-
lying rules (and the supplied data). These rules might change over time or as
economic conditions change. A neural network can be used to examine the prior
loans automatically to identify the factors that predict successful and unsuccessful
loans. Once these factors are identifed, they can be coded into the ES to automate
the decision process. In this situation, the AI/neural network takes the place of (or
supplements) the decisions of the human expert.
Decision Support System Expert System AI/Nerual Network
Loan Ofcer
Data:
Income
Existing loans
Credit report
Model:
Lend in all but the worst
cases.Monitorforlateand
missingpayments.
Output:
Name Loan #Late Amt
Brown 25,000 5 1,250
Jones 62,500 1 135
Smith 83,000 3 2,435
ES Rules
What is the monthly
income? 3,000
What are the total monthly
payments on other loans?
450
How long have they had
the current job? 5 years
Should grant the loan since
there is a 5% chance of
default.
Determine Rules
Data/Training Cases
Loan 1 datapaid
Loan 2 data 5 late
Loan 3 data bankrupt
Loan 4 data 1 late
Neural Network Weights
Evaluate new data, make
recommendations.
Figure 9.31
Comparison of techniques for a loan. A DSS can display background data for a loan
offcer and can also monitor customer payments. An ES could help managers decide
if they should make the loan by evaluating more complex rules. An AI such as a
neural network can analyze past loans and determine the rules that should be used to
grant or deny future loans.
625 Chapter 9: Business Decisions
Te Importance of Intelligent Systems in e-Business
How can more intelligent systems beneft e-business? Disinterme-
diation is a primary aspect of e-business. Businesses can interact directly with
customers, with less need for middle levels such as retail stores. However, these
middle levels often existed because they provided more explanations and support
to customers. If you remove that level, how are you going to deal with thousands
or millions of customers? If you have to hire hundreds of workers to answer cus-
tomer questions, you will lose most of the potential benefts of disintermediation.
One of the solutions to this problem is to implement more intelligent systems that
can provide automated support to customers.
In many ways, the Internet adds complexity to the daily lives of customers and
managers. The Internet provides access to huge amounts of dataand it is grow-
ing constantly. The growth adds more data, but it also means that the availability
and use of information is constantly changing
Agents
A recent application of AI techniques has arisen in the context of the Internet. A
key issue of the Internet is searching for data. Although the Internet dramatically
improves communication, there are problems with maintaining the interpreta-
tion of the information from various systems. Originally, most data on the Web
was stored as standard pages of text using HTML. Search engines would simply
scan these pages and build searchable indexes.
Increasingly the Internet is being used to store and transmit objects composed
of data, pictures, spreadsheets, sounds, and video. From a pure transmission
standpoint, any object can be decomposed into raw data bits and sent between
computers. Where we run into problems is searching for the objects. Consider a
simple example where you want to fnd a new printer, so you search the Internet
for prices. Today, many vendors store the product descriptions and prices in a da-
tabase, and then build the HTML page on demand when you go to the site. Since
the page is not static, the search engines do not index it.
One solution to this problem is to create software agents. Agents are object-
oriented programs designed for networks that are written to perform specifc tasks
in response to user requests. The concept of object orientation is important be-
cause it means that agents know how to exchange object attributes, and they have
the ability to activate object functions in other agents. The tasks could be simple,
such as fnding all fles on a network that refer to a specifc topic. One key feature
of agents is that they are designed to communicate with each other. As long as
your agent knows the abilities or functions of another agent, they can exchange
messages and commands. General Magic was a pioneering company that cre-
ated a standard programming language for agents. With this language, agents can
transfer themselves and run on other computers. Agents also have a degree of
intelligence. They can be given relatively general commands, which the agents
reinterpret and apply to each situation they encounter.
Consider an example illustrated by Figure 9.32. You have been working hard
and decide to take a vacation. You want to go to a beach but do not have much
money to spend. You are looking for a place where you can swim, scuba dive, and
meet people at night. But you also want the place to have some secluded beaches
where you can get away from the crowds and relax. You could call a travel agent
and buy a package deal, but every agent you call just laughs and says that next
626 Chapter 9: Business Decisions
time you should call three months ahead of time instead of only three days ahead.
You suspect that a beach resort probably has last-minute cancellations and you
could get in, but how do you fnd out? Thousands of possibilities exit. If all of the
resort computers had automatic reservation agents, the task would be fairly easy.
You would start an agent on your computer and tell it the features you want. Your
agent sends messages to all of the automated resort agents looking for open spots
at places that matched your features. When your agent fnds something close, it
brings back details and pictures to display on your screen. When you decide on a
resort, the agent automatically makes the reservations.
You might argue that some of the existing travel search sites come close to this
example. On the surface, yes, sites such as PriceLine offer a few of the elements.
However, the technology and methods beneath the surface are completely differ-
ent and largely rely on humans to set prices. The travel industry is likely to be
one of the frst to incorporate these technologieslargely because many of the
reservation systems are already linked together at some level. At some point, the
negotiating agent needs access to the data. Today, these decisions are made at cen-
tral search engine sites that have access to the data on millions of sites. In a true
agent-based system, the search engine would not need direct access to the data,
but would communicate with the agents located at each site.
Notice three important features of software agents. First, the agents need to
know how to communicate. It is not as simple as transmitting raw data. They must
understand the data and respond to questions. Second, imagine the amount of net-
work traffc involved. In the vacation search example, your agent might have to
Vacation
Resorts
Software agent
Resort
Databases
Locate &
book trip.
Figure 9.32
Software agents. A personal software agent might be used to book a vacation. It
would take your initial preferences and communicate with other agents to fnd
sites that matched your preferences. It might also be able to negotiate prices with
competing resorts.
627 Chapter 9: Business Decisions
contact thousands of other computers. Now picture what happens when a thou-
sand other people do the same thing! Third, all of the agents are independent. You,
as well as other computer owners, are free to create or modify your own agent. As
long as there are standard methods for agents to exchange attributes and activate
functions, they can be modifed and improved. For instance, you might program
your agent to weight the vacation spots according to some system, or you might
teach it to begin its search in specifc locations.
Programmers have begun to incorporate expert system and other AI capabili-
ties into these agents. By adding a set of rules, the agent becomes more than just
a simple search mechanism. The more complex the rules, the more intelligent it
becomes, which means you have to do less work. In fact, software agents have the
potential to dramatically increase the research in AI. Currently, because of limited
standards and the diffculty of creating them, there are few examples of useful
agents. As increasing numbers of people use agents and begin demanding more
intelligence, it will become proftable for researchers to work harder at building
reliable, intelligent software.
Support and Problem-Solving Applications
Increasingly, your customers want personalized attention to help in both selecting
products and solving problems. Yet it is expensive to provide individual personal
support to every customer. Instead, frms are developing expert systems and other
intelligent applications to help customers with a more personalized touch. For ex-
ample, look at Amazon.coms recommendation system. It began with books but
has been expanded to most of their products. As you purchase items at Amazon.
com, the system gives you a list of similar products that you might be interested
in. For instance, if you purchase several science fction books, it will suggest new
releases of similar books. The system can increase sales because it helps show
customers items that they might not have found otherwise.
More complex products can beneft from more sophisticated expert systems
that help analyze customer needs and help confgure the correct components. For
example, a computer vendor could build a system that asks questions to help iden-
tify the applications that a customer will run. It could then suggest specifc en-
hancements such as adding RAM or a second disk drive to improve performance.
Similarly, many frms are building expert systems to help customers with prob-
lems. If a customer has a problem installing a new product, he or she can turn to
the Web site. The system asks questions to identify the problem and then make
suggestions. The advantage of the expert system is that it is available 24 hours a
day, can solve most of the easy problems, and is less embarrassing to customers
who might think their questions are too silly to ask a human troubleshooter.
Intelligent systems can also be useful for B2B and other forms of e-business.
The systems might analyze past purchases and suggest new products, or automati-
cally analyze sales patterns and help managers develop new products and close
out unproftable lines. They can be used to develop automated ordering systems
that predict customer demands, schedule production, and generate automated
sales orders and payments.
It can be diffcult to develop these applications, but frms that build powerful
systems will attract customers and increase the level of sales to each customer. Ul-
timately, these systems could be the primary reason people switch to buying items
over the Internet.
628 Chapter 9: Business Decisions
Cloud Computing
How can cloud computing be used to analyze data? Cloud comput-
ing offers some options for analytical toolsbut the process is only beginning.
Some decision tools require relatively large amounts of computation and storage
capabilities. In some cases, these tools could be run on large parallel processing
supercomputers. Some research institutions provide online access to supercom-
putersbut they are traditionally used for scientifc research. For more typical
business research, it should be possible to use multiple processor systems leased
from cloud computing providers. Companies such as Amazon provide access
to multiple processors based solely on the amount of time used. Consequently,
researchers can develop algorithms, test procedures, and fne-tune the analysis.
Then, when the main data sets are loaded, additional processors can be leased for
a short time to process the main results. With minimal fxed costs, cloud comput-
ing makes it possible to tackle large problems at relatively low costs.
It is likely that companies will offer data analysis as package services through
online systems. Currently, several market research frms will conduct studies, for-
mat data, and run analyses for other companies. As more data becomes acces-
sible through online systems, it will become possible for cloud-based companies
to offer direct access to analytical services. For instance, if you want to offer ser-
vices similar to Amazon or Netfix to show customers similar items purchased
by customers, a company could automatically read your sales data, perform the
forecasts, and display the results using links across the Web. You would not have
to develop the algorithms or purchase high-speed computers to handle the com-
putations. On the other hand, you might have less control over customization or
modifcation of the algorithms. Leased systems might not provide a competitive
advantage, but they might make it easy for your company to add desirable features
to your Web site at relatively low cost.
Summary
Managers make many different decisions. Every business discipline builds models
to help people analyze problems and make decisions. Without models and tools,
people rarely make good decisions. Many tools have been created to help you ana-
lyze data and make decisions. In many cases, you will want to build a data ware-
house to retrieve and organize the data. You can build a DSS, building a model in
a spreadsheet or more advanced statistical analysis tool. A good DSS extracts the
needed data from the database, evaluates the model, and displays the results in a
form that helps managers visualize the problem and quickly choose a solution.
The biggest diffculty with DSS tools is that you generally need to be trained to
create the models and understand the results.
More sophisticated data mining tools can be employed to semiautomatically
search for correlations and other relationships within the data. Common regres-
sion, clustering, and classifcation tools use statistical measures to identify the
importance of various attributes and to build forecast equations. Market basket
analysis identifes items that customers purchase together. The information pro-
vided by this analysis is a powerful tool for cross selling related products. Data
mining tools are powerful techniques, but the results are not always useful, and
you must carefully evaluate the implications of the results to ensure that they are
realistic and repeatable.
629 Chapter 9: Business Decisions
Expert systems provide a different level of decision automation. They analyze
data based on rules defned by an expert. They can handle complex and missing
data. They are particularly useful at helping novices reach a better decision. They
are excellent tools for specialized, narrowly defned problems. The biggest con-
cern arises when someone tries to build an ES for a problem that is too large, too
variable, or unstructured. The ES is not likely to work, and it will cost money and
time to build. Worse, the proposed decisions might be nonsensical.
Scientists are continually working on ways to automate even more decisions.
Neural networks are incredible tools for analyzing pattern data. They have been
successfully applied to problems ranging from speech recognition to lending anal-
ysis. You can purchase software that will quickly build a neural network to analyze
data. One drawback to neural networks is that the relationships tend to be highly
nonlinear and diffcult to interpret. So, you might reach an answer, but you might
not be able to explain the relationships. Other tools that are increasingly useful in
business applications are machine vision, robotics, and language comprehension.
Automated tools can help you provide better service to customers and suppli-
ers, particularly when the intelligent systems can be reached online. If you can
help a customer solve a problem 24 hours a day without having to pay hundreds of
humans, you can gain happier customers with little additional cost. Several com-
panies are working on building intelligent agents that will enable customers and
vendors to interact automatically by following rules that you specify.
A Managers View
It is hard to make good decisions. You need fast access to huge amounts
of data, the ability to evaluate various models, and a way to visualize the
problem and the solution. Various levels of tools are available to help. The
tools provide different types of intelligence and support. As a manager, you
need to understand the context of the problem and know which tools can be
applied to solve a problem. You also need to be enough of an expert to rec-
ognize when a system provides useless or bad answers so that you can avoid
disasters.
630 Chapter 9: Business Decisions
Key Words
Web Site References
Expert Systems and AI Tools
A.L.I.C.E.conversation Alice.pandorabots.com
CLIPS (Started by NASA) clipsrules.sourceforge.net
ExSys (Commercial) www.exsys.com
International NeuralNetwork Society www.inns.org
Jess ( Java) www.jessrules.com
Mathworks neural network toolbox www.mathworks.com/products/
neuralnet
Machine Vision
CalTech www.vision.caltech.edu
Carnegie Red Team www.cs.cmu.edu/~red/Red
British Machine Vision www.bmva.org
Review Questions
1. Why is it so important to build models and analyze data using a scientifc
process?
2. What is the purpose of a data warehouse?
3. How is an OLAP cube browser better than using queries?
4. What is the role of a manager in a DSS?
5. How is a GIS used to answer business questions?
6. How can data mining help you make better decisions and what are some of
the primary techniques?
7. What is an expert system and what are the characteristics of the problems
that it is designed to solve?
8. What tools are available to help businesses construct expert systems and
what features do they provide?
agent
artifcial intelligence (AI)
data marts
data mining
data warehouse
decision support system (DSS)
decision tree
expert system
extraction, transforma-
tion, and loading (ETL)
geographic information system (GIS)
global positioning system (GPS)
knowledge base
knowledge engineer
market basket analysis
metadata
models
natural language
neural network
online analytical processing (OLAP)
optimization
parameters
prediction
rules
simulation
Turing test
631 Chapter 9: Business Decisions
9. What types of problems are best suited for a neural network?
10. How would a fully autonomous vehicle alter business?
11. What are the differences between a DSS, ES, and AI features?
12. Why are intelligent systems so important for e-business?
13. How could cloud-based computing and the Internet be used to add
intelligence to business applications and decisions?
Exercises
1. Work through at least two of the examples on the Exsys Web site. What
features do the two examples have in common? Give an example (unrelated
to any on the Web site) of a business problem or something from your life
that could beneft from an expert system.
2. An HR manager wants to develop an expert system to evaluate potential
employees applying to work for a job in your department. Assuming the job
can be performed by a business-school intern, list some of the questions you
would ask potential employees. Create a decision tree to evaluate the basic
questions. Try to generate three possible outcomes: acceptable, unacceptable,
and personal interview to decide. Your goal is to reduce the number of people
needing a personal interview.
3. Interview an expert in some area and create an initial set of rules that you
could use for an expert system. If you cannot fnd a cooperative expert, try
researching one of the following topics in your library: fruit tree propagation
and pruning (what trees are needed for cross-pollination, what varieties
grow best in each region, what fertilizers are needed, when they should be
pruned); requirements or qualifcations for public assistance or some other
governmental program (check government documents); legal requirements to
determine whether a contract is in effect (check books on business law).
4. Describe how you could use data mining tools to help you fnd a new vehicle
to buy. How well do the car-buying sites such as Edmunds perform these
tasks for you?
5. Obtain an expert system (e.g., Jess and CLIPS are free). Create a set of rules
to evaluate a simple request for a car loan. If you do not have access to the
tool, at least build the decision tree.
6. Identify a problem that would be well suited for a neural network. Explain
how the system would be trained (e.g., what existing data can be used?).
Explain why you think the problem needs a neural network and what benefts
can be gained.
7. For the following problems identify those that would be best suited for an
expert system, decision support system, or a more advanced AI system.
Explain why.
a. A fnancial manager in a bank wants to fnd the best investments for her
clients.
b. A venture capital investor wants a system to do a frst-pass evaluation of
new business plans that are submitted via a Web site.
632 Chapter 9: Business Decisions
c. A plant manager wants to be able to forecast when equipment will need
special maintenance. Currently, the engineers use a fxed schedule, but
some products and operations seem to cause more problems than others.
d. A fast-food restaurant chain wants to help managers determine the
appropriate number of employees to schedule for each day in the year.
e. A cell-phone provider wants an application on its Web site to help
customers select a cell phone that best meets their needs.
f. A company has to select a city to host a new factory which happens about
once a decade.
g. A marketing department wants an application to help them set the best
prices for new products in different markets.
8. Examine existing travel sites, including aggregators such as Kayak.com.
What features could be added to increase the intelligence level to assist
consumers?
9. Use a spreadsheet to create the example from the Human Resources
Management example. Fill in the market adjustment column so that raises
match the performance appraisals. Remember, total raises cannot exceed
$10,000.
DeptStor.mdb
You are a midlevel manager for
a small department store. You have
collected a large amount of data on
sales for 2012. Your transaction sys-
tem kept track of every sale (order)
by customer. Most customers paid
by credit card or check, so you have
complete customer data. Walk-in
customers who paid cash are given
a separate customer number, so you
still have the sales data.
You are trying to determine staff-
ing levels for each department. You
know that the store becomes much
busier during the end-of-the-year
holiday season. For summer months,
you have thought about combining staff from the departments. From conversa-
tions with experienced workers, you have determined that there is a maximum
number of customers that can be handled by one person in a department. These
numbers are expressed as monthly averages in the table.
You are thinking about combining workers from some of the departments to
save on staffngespecially over the spring and summer months. However, work-
ing multiple departments makes the sales staff less effcient. There are two consid-
erations in combining staff members. First, if any of the departments are reduced
to a staff of zero, sales in that department will drop by 10 percent for that month.
Second, total staffng should be kept at the level defned by the monthly averages.
If average staffng (total across all departments) falls below the total suggested,
then sales in all departments will fall by 2 percent for each tenth of a percentage
point below the suggested average.
Department Customers/month
ClothingChildren 180
ClothingMen 150
ClothingWomen 180
Electronics 200
Furniture 150
Household 250
Linen 300
Shoes 300
Sports 400
Tools 340
633 Chapter 9: Business Decisions
10. Using the database and a spreadsheet, determine how many workers we
need in each department for each month. Present a plan for combining
departments if it can save the company money. Assume that sales members
cost an average of $1,000 a month. Two queries have already been created
by the MIS department and are stored in the database: SalesbyMonth and
SalesCountbyMonth. The frst totals the dollar value; the second counts the
number of transactions.
11. Write a report to upper management designating the appropriate sales staff
levels for each department by month. Include data and graphs to support your
position. (Hint: Use a spreadsheet that lets you enter various staffng levels in
each department in each month, and then calculate any sales declines.)
12. Create a PivotTable for the company that enables managers to evaluate sales
by employee by department by month.
Technology Toolbox
13. Create the PivotTable report for Rolling Thunder Bicycles. Briefy
summarize any patterns or problems you identify.
14. Using the Rolling Thunder Bicycles query, create a PivotChart and compare
sales of the different models over time. Identify any patterns that you see.
15. Research an alternate cube browser (such as SQL Server or Oracle) and
explain how it is different from the Excel PivotTable. If you have access to
the tool, build a small example.
16. Compute the average number of days it takes to build a bicycle (ShipDate
OrderDate) for each month. Import the data into Excel and forecast the
trend. First, forecast it based on all of the data. Second, forecast it for three
time periods: (a) the early years, (b) the middle years, and (c) the most recent
years. Look at the initial chart to estimate the breaks between these three sets,
or just divide it into three equal-size groups if you do not see any good break
points. Comment on any differences or problems.
17. Using federal data (start at www.fedstats.gov), compute a regression
analysis of Rolling Thunder sales by state by year compared with at least
population and income.
18. Choose a company and identify the primary dimensions that you would
create in an OLAP cube if you were a manager at that company. Hint: Focus
on your major area.
Teamwork
19. Have each person fnd and describe a problem that could beneft from a GIS.
Make sure it needs a GIS, not just a mapping system. Combine the results
and compare the types of problems to identify similarities.
20. Build a decision tree to test whether a specifc student next year can take this
class.
634 Chapter 9: Business Decisions
21. Many classes fll up early and the dean keeps a wait list for adding students
at the last minute. Build a decision tree to evaluate each student on the list to
determine priority for adding that specifc person to the class.
22. Each person should identify a problem that could be solved with a rules-
based expert system. Combine the results and compare the types of problems
to identify similarities.
23. Using Rolling Thunder Bicycles, have each person forecast the sales by
one model type for six months. Combine the individual model results and
compare this value to the forecast based only on total sales.
24. Select an economic data series such as personal income (check www.
fedstats.gov). Place members into one of three subgroups. Have each group
forecast the series using a different methodology. Compare the results. If you
have suffcient data, leave out the most recent data, and then forecast those
values and compare the forecasts to the actual.
25. Choose a publicly-traded company and collect basic quarterly fnancial data
for the company for at least 10 years. It is easiest if you assign specifc years
to each person. Put the data into a spreadsheet or simple database. Create a
PivotTable and Pivot Chart to examine the data. Create a report containing
some of the charts and tables and any conclusions you can make.
26. Have each person fnd a problem that could beneft from a neural network.
Describe how the system would be trained. Combine the individual
comments and identify any commonalities.
Rolling Thunder Database
27. Identify shipments where receipts do not match the original order. Provide a
count and value (and percentages) by supplier/manufacturer.
28. Analyze sales and discounts by employee and by model type. Are some
employees providing higher discounts than others? Are we discounting some
models too much or not enough?
29. The company wants to create an online ordering system. Create a decision
tree to help novices select the appropriate bicycle and components. If
necessary, consult with a friend or relative who can be considered a bicycle
expert.
30. Use queries to extract sales data by model type and month. Use a spreadsheet
to forecast the sales of each quantity of model type by week for the next year.
Hint: Use Format([OrderDate],yyyy-mm) to get the month.
31. What pattern-matching types of decisions arise at Rolling Thunder that could
beneft from the use of neural networks?
32. What aspects of customer service might be automated with expert systems?
What are the potential advantages and disadvantages?
635 Chapter 9: Business Decisions
Additional Reading
Barabba, Vincent and Gerald Zaltman, Hearing the Voice of the Market, Harvard
Business Press: Cambridge, MA, 1991. [Overcoming design biases at GM.]
Franses , Philip Hans, Time Series Models for Business and Economic
Forecasting, 1998, Cambridge University Press: Port Chester, NY. [An
introduction to forecasting.]
Dangermond, Jack and Adena Schutzberg, Engineering, geographic information
systems, and databases: a new frontier, Journal of Computing in Civil
Engineering, July 1998 pp. 121-122. [Uses of GIS.]
Krill, Paul, Analytics redraw CRM lines, Computerworld, December 3, 2001.
[A summary of vendors developing products to analyze customer data.]
Neil, Stephanie, Blue Cross dissects data to improve care, PC Week, February
8, 1999. [BCBS uses data warehouse and online application processing DSS
to improve service.]
Wilkinson, Stephanie, PC apps help to take a byte out of crime, PC Week,
February 23, 1998. [GIS and imaging tools help police predict and solve
crimes.]
636 Chapter 9: Business Decisions
Cases: Financial Services Industry
Te Industry
The fnancial industry is interesting. It is huge and everyone interacts with the tril-
lions of dollars a day handled by the global fnancial system. It is also complex,
with many different types of frms involved, and constantly creating new fnancial
tools. At one point, the fnancial industry was driven by banks. Today, banks still
play important roles, but where do people put their money? In the stock market
or other investments. So brokerage frms have a strong role. How do consumers
pay for things? With debit cards and credit cards. So the card-processing sector,
led by Visa and MasterCard, plays a huge role in the industry. As the national laws
have changed, mostly relaxed, over the past few years, the industry has become
even more complex. Banks can once again sell stocks and investments, as well as
insurance. And brokerage frms and insurance companies can perform banking
functions.
0
20
40
60
80
100
120
140
160
1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010
B
i
l
l
i
o
n
$
Annual Revenue
Citigroup
Bank America
Capital One
-0.4
-0.3
-0.2
-0.1
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010
R
a
t
i
o
Net Income / Revenue
Citigroup
Bank America
Capital One
637 Chapter 9: Business Decisions
Making Money
How do brokerage frms make money? They used to make a proft on transaction
commissions, as much as several percentage points per tradeamounting to hun-
dreds or thousands of dollars every time a client bought or sold a stock. With the
advent of online trading, pushing the discount brokerage frms, commissions fell
to fxed rates of $10 to $20 per trade, a tiny fraction of what they were and under
10 cents a share. The big frms tried to convince customers that their higher fees
were worthwhile because they also provided investment advice. But with tainted
advice, and a huge amount of data available free to customers online, the full-
price frms suffered.
How do banks make money? Banks make money in two ways: interest rate
spreads and fees. Interest rate spreads are the difference between the rates the
banks charge borrowers and the amount the bank has to pay to obtain the money.
Banks select different lending markets (consumer versus business) and have di-
verse ways of obtaining funds (deposits, loans from other banks or the Federal
Reserve). Likewise, fees vary depending on the type of bank. Consumer-oriented
banks receive fees from customers (such as checking account fees). Business or
investment banks charge fees for more sophisticated services.
How do credit card companies make money? Here the answer is trickier, be-
cause several types of companies are involved. The transaction-processing organi-
zations (Visa and MasterCard) receive a fee for every transaction handled through
the clearing system. However, banks ultimately issue the cards and are responsible
for the money. A consumer bank issues a card to customers and is responsible for
paying vendors for legitimate transactions. The consumer bank makes money on
consumer fees (usually low today) and interest charges to customers on outstand-
ing balances. It also uses the cards as a marketing tool to attract customers and
encourage them to purchase other services. The merchant bank is responsible for
ensuring that the merchant is legitimate. It makes money by taking a percentage
cut of the merchants credit card (or debit card) sales. In 2011, the U.S. govern-
ment joined Europe and imposed caps on merchant fees for debit cards (not credit
cards). So banks began cancelling debit card promotional programs and scram-
bled to fnd other ways to charge fees.
Brokerage Firms
More than three-fourths of Americans liquid assets ($12 trillion) are in stocks,
bonds, and money market funds [Revell 2002). How safe are these assets? Do you
trust your broker? Do you trust the advice from brokers? In April 2003, forced by
a lawsuit led by New York attorney general Eliot Spitzer, 10 of the largest Wall
Street investment banks paid fnes of $1.4 billion (Nocera 2004). The money was
a settlement for providing misleading investment analysis. The brokerage frms
usually wrote glowing reports of companiesurging people to buy stock in spe-
cifc companies. Many of the reports were written because the frms were vying
for investment banker contracts with the same companies. In exchange for glow-
ing reports, the companies provided more business (and fees) to the brokerage
frms. James Freeman, a former research director, notes that analysts went from
having investment banking deals pushed on them in the 1980s to becoming the
greedy pigs at the center of it (Nocera 2004).
638 Chapter 9: Business Decisions
Credit Cards
At one time, the credit card industry was neatly divided into three main segments:
the upper end controlled by American Express, the middle tier targeted by Citi-
corp, and the subprime market pursued by Providian. As a fourth group, MBNA
targeted a wide swath of customers with its affliate cards. Most card companies
gained market share by blindly sending 5 billion solicitations a year to U.S. con-
sumers (Gross 2002). Capital One grew by using targeted marketing and thou-
sands of marketing tests with different groups of potential customers. Nonethe-
less, with competition at a peak for high-end customers, profts were squeezed.
Companies were increasingly tempted to go after the subprime marketwhere
they could charge higher interest rates in exchange for greater risk. But as the
economy turned down and interest rates increased, this strategy results in greater
losses when customers do not pay their bills or even fle for bankruptcy (Dugas
2002). Providian lost 90 percent of its stock market value from mid-2001 to mid-
2002. Capital One also faced greater losses, but not as large as many other compa-
nies. The 2003 settlement with Visa and MasterCard ultimately affected profts for
the industry. Wal-Mart had sued the two credit card companies to break up their
power to force merchants to accept higher costs for debit cards. The win by the
merchants reduces the power of the card companies and banks, and should ulti-
mately reduce fees paid by merchants (www.cardweb.com).
Banks
Citibank (or the parent company Citigroup) is one of the largest banks in the
world. In 2003, it earned $17.9 billion in profts, the most ever by a single bank
(Economist 2004). In 2010, net income was $10.6 billion (2010 Annual Report).
Over the years, it has suffered several problems along with other banks, including
from the huge losses on international loans to South America in the 1980s to the
investment banking scandals in the 1990s. The company agreed to pay $400 mil-
lion as part of the $1.4 billion investment banking settlement in 2003, the largest
payment by any of the companies involved. Also like other banks, the company
grew through acquisitions of other banks (Primerica in 1988), insurance compa-
nies (Travelers in 1993), brokerage frms (Shearson and Salomon in 1998), and
credit cards (Sears in 2004) (Rosenberg 2003). In fact, the last decade of banking
in the United States can be best characterized by the mergers. A handful of banks
control a huge number of deposits (Citibank, Bank of America, J.P. Morgan Chase,
Wells Fargo, and Wachovia) along with a few large regional banks (Stone 2003).
Ultimately, one limiting factor to mergers is that federal law currently prohibits
a single U.S. bank from holding more than 10 percent of the consumer deposits.
Banks have also been one of the big benefciaries of the loose federal monetary
policy of the early 2000smaking it easy to borrow money at almost no cost.
The entire banking industry was rattled in the 2008 recession and housing mar-
ket crash. All of the major banks in the U.S. and many banks in other countries
were bailed out by governments. A few banks were allowed to fail, and a few oth-
ers merged with larger banks. The banks most involved in shaky mortgage loans
were the hardest hit and the frst to go. Brokerage frms were also forced to merge
in order to survive. For example, WaMu (savings bank) was eventually sold to JP
Morgan Chase, and Merrill-Lynch (brokerage) was picked up by Bank of Ameri-
ca. The crisis revamped banking rules and brokerage oversight, but the process is
ongoing and will take many more years to stabilize (Sorkin 2009).
639 Chapter 9: Business Decisions
Decisions
All aspects of the fnancial industry heavily utilize information technology. All
frms face diffcult daily questions on how to balance risks and profts. Overall,
banks have profted because they have become more adept at identifying poten-
tial bad loans and diversifying risk. The entire industry has become more inter-
connected through new fnancial devices to share risk and create new products.
The use of credit-default swaps and derivatives has been credited with protecting
banks in the downturn of the early 2000s (Economist 2004). Derivatives spread
risks across the entire industry and multiple frms, which is good. But, it means
that all companies, investors, and regulators have to carefully monitor a wide
range of fnancial indicators and evaluate large-scale effects. How can anyone
possibly handle this much data to make informed decisions?
Additional Reading
Dugas, Christine, Bankruptcy Filings Set Reocrd in 2002, USA Today,
February 14, 2003.
Gross, Daniel, Capital One, Whats in Your Wallet? Slate, October 25, 2002.
Just Deserts? The Economist, April 15, 2004.
Nocera, Joseph, Wall Street On the Run, Fortune, June 1, 2004.
Revell, Janice, How Much Do Brokers Have to Hide? Fortune, April 28, 2002.
Rosenberg, Yuval, Sandy Hands Over the Keys to Citi, Fortune, July 16, 2003.
Stone, Amey, Will Citi Upstage BofAs Big Deal? BusinessWeek, October 29,
2003.
Sorkin, Andrew Ross, Too Big to Fail: The Inside Story of How Wall Street and
Washington Fought to Save the Financial Systemand Themselves, Viking,
2009.
http://www.cardweb.com
Case: Citigroup
Charles Prince III, general counsel of Citigroup explained the overall challenges
facing management: Youve got fve or six or seven businessescredit cards to
mortgages to personal loans to investment banking to commercial insurance. They
relate in important ways, but theyre different. And theyre all over the place. No
one has ever had a company as broad in geographic scope [101 countries], as
broad in product set, and as deep in size (Loomis 2001). Sandy Weill gained con-
trol of Citigroup (ticker: C), the parent company, in 2000 after a merger between
his company (Travelers) and Citibank. In 2001, most of the top-level management
was reorganized, but the structure is a little non-traditional. Robert Willumstad is
head of consumer business. Michael Carpenter runs the corporate division includ-
ing the Salomon Smith Barney brokerage and Citis commercial bank. Thomas
Jones runs the investment management and private bank. Bictor Menezes heads
the emerging markets section. Charles Prince and Jay Fishman, technically co-
chief operating offcers, also report directly to Weill. Prince handles operations
and administration, Fishman risk and fnance. Neither has any direct authority
640 Chapter 9: Business Decisions
over the other business leaders. One of Fishmans jobs is to synthesize the overall
risk picture of the business (into a 54-page monthly book), so that everyone can
see the current issues and risks. The lines in many cases are somewhat blurry.
Prince, for example, has a responsibility to promote cross selling of products. Be-
cause most of the company growth has come from acquisitions, few people down
in the hierarchy know much about the other divisions and options. Chief fnancial
offcer Todd Thomson also has oversight of cross selling. Yet, neither Prince nor
Thomson has direct authority over the businesses that do the cross selling. Weill
points out that this company is too big to micromanage, but its not so big that
you cant know whats going on (Loomis 2001). Overall, the combination of a
huge bank and brokerage frm creates signifcant advantages over the competitors.
When necessary, Citigroup can swing an investment underwriting deal by offer-
ing a Citibank loansomething that is much harder to do at brokerage frms like
Merrill Lynch.
One controversial step Weill has taken is to minimize the use of the Internet.
Instead of trying to run it separately, he moved the projects into the subdivision
units and asked them to merge them into their own operationswhile trying to re-
duce costs. Similarly, the Salomon Smith Barney retail brokerage is a full-service
company and does not offer low-cost Internet trading. On the other hand, Deryck
Maughan, CEO of E-Citi worked hard to establish an electronic foreign-exchange
market called Atriax in partnership with three other large banks. We are saying
that we would rather disintermediate ourselves in partnership with others and grab
a large share of the new market than sit around in some pre-Information Age fac-
tory (Loomis 2001). In October 2003, Weill remained chairman but made Prince
CEO and Willumstad president (Stone 2003).
American fnancial institutions were hammered by the recession of the early
1990s, even Citibank came close to going under. Yet with the recession of the
early 2000s, most banks, including Citigroup, increased profts. Average return
on bank assets jumped from 8 percent in the 1990s to 16 percent in the 2000s.
One reason is that the 2001 recession was not as deep, and banks are not as tied to
corporations as before, supplying 40 percent of the funds today versus 50 percent
a decade earlier. Banks also profted from the drop in interest rates engineered
by the Fed. But banks are still the biggest source of funds for companies. The
big change: a substantial improvement in risk management at American banks.
Doug Woodham of Moodys observes there has been a step change in risk man-
agement (The Economist 2004). For example, mortgages have been turned into
securities that are sold on a national marketspreading the risk away from the
issuing bank. Credit-default derivatives have accomplished the same task for cor-
porate loans, with the market reaching $350 billion in 2003.
The Hispanic population represents a growing marketparticularly for Ci-
tibank with its international reach and reputation. In 2004, Citibank created a
checkless checking account specifcally for Hispanic customers. Many workers
from South America come to the United States to make money, which they send
back to their families. Yet many of them do not realize the importance of banks
and ATMs in the U.S. economy. Most have diffculty opening checking accounts.
The Citibank account relies on a debit card and Citibanks international collection
of ATMs. Workers can deposit money in the account, and family members can
withdraw it almost anywhere in the world through a local ATM (Wentz 2004).
Citibank is one of the largest issuers of credit cards in the United States. Yet
that market is stagnant with intense competition and little opportunity for proft.
641 Chapter 9: Business Decisions
Some frms have tried to expand profts by going after the subprime market, but
Citigroup has resisted. Instead, it is aiming to expand its reach globally. Leverag-
ing its experience in emerging markets, it began offering Visa cards to Chinese
consumers in February 2004. The charges can be paid using either dollars or Chi-
nese yuan. Charles Prince and other dignitaries opened the service with parades
through the streets of Shanghai. In 2003, only 25 million of the 1.3 billion Chinese
citizens held credit cards. Some experts expect the number to easily triple in 10
years. Although the untapped market seems to offer incredible benefts, the risks
are enormous. There is only one credit bureau in the entire country, minimal mar-
ket research, and high bank fraud. Similar expansions of credit in Hong Kong and
Korea resulted in huge losses from personal bankruptcies. Citigroup is mitigating
the risk by performing their own background checks, only issuing cards to clients
older than 21, and requiring an annual income of at least $6,000 (restricting the
market to only 10 percent of Shanghais 16 million residents). Citibank has also
devised a mathematical scoring system to asses each individuals credit risk. The
McKinsey consulting frms notes that the current default rate in China is 1.5 per-
cent compared with 5 percent in the United States. An interesting twist to the risk
problem is that the customers tend to pay off their card in full each month, so the
bank has to make its money on fees instead of interest charges. (Baglole 2004).
To train brokers and agents, Citigroup needed a better way to communicate. In
2004 and 2005, the company installed IBMs Digital Media for Banking technol-
ogy that enables it to stream live and archived content to 300,000 PC desktops
across the companys offce and branches (Mearian 2004). Communication with
external organizations is more complicated. A key feature in the modern bank-
ing system is communications from the banks to the credit bureaus. On a regular
basis, Citigroup sends a tape of customer data and payment histories to various
credit bureaus. On May 2, 2005, Citigroup sent a tape to an Experian facility in
Texas via UPS. However, the tape never made it to the company and UPS was
unable to track the package. The unencrypted tape contained data on 3.9 million
customers including Social Security numbers and payment history. After the inci-
dent, Citigroup decided it would be safer to begin encrypting the data on the tapes
(McMillan 2005).
In early 2007, Citigroup laid off 17,000 workers in an effort to cut costs by
$10 billion. The company also reorganized IT operations, largely by consolidating
data centers. The company said that simplifcation and standardization of Citis
information technology platform will be critical to increase effciency and drive
lower costs as well as decrease time to market. The company also planned to
move 9,500 back-offce positions to lower-cost locations, including off shore (Vi-
jayan 2007). Analysts observed that Citi had little choice because between 2000
and 2005 its revenue increased by 8 percent while costs soared by 15 percent.
Citigroup planned to close half of its 42 data centers. Much of the savings will
come by replacing server clusters with grid computing based on thousands of
smaller computers networked together (Crossman 2007). Another part of the plan
involved reducing its credit card platforms from 12 down to 2, and reducing mort-
gage-origination software systems from 5 to 1 (McDougall 2007). However, at the
same time, Citigroup announced that it was upgrading 325,000 employee desktop
PCs to Windows Vista (Lai 2007).
The housing market collapse of 2007-2008-ongoing caused huge problems for
most banks. The main problem was that banks had made loans to weak customers
who could not pay them back. When housing prices collapsed (many cut in half),
642 Chapter 9: Business Decisions
borrowers decided to default on their loans and walk away. Banks who made the
loans had resold the loans as packages to everyone else. The entire banking indus-
try was hit with a liquidity crisis. Citigroup alone posted losses of $27.7 billion in
2008 and $1.6 billion in 2009. With a huge infusion of cash by the federal govern-
ment, Citigroup returned to proftability ($10.6 billion) in 2010. Homeowners did
not really gain anything. Banks were also required to increase their capital hold-
ings to reduce the risk of future meltdowns.
To reduce costs, Citigroup cut another 52,000 jobs at the end of 2008. Many of
the job cuts came through selling subsidiaries, including the sale of Citigroups
India-based computer management center to Wipro (Thibodeau 2008).
Largely due to the fnancial crisis, banks largely made few changes in opera-
tions or technology. On the other hand, security issues continued. Citigroup was
hit by hackers who stole card numbers from over 360,000 accounts (McMillan
2011). Hackers did not get into the main database, but were able to guess account
numbers and log into the customer Web site. Sensitive data such as Social Secu-
rity Numbers, expiration dates, and CVV codes were not compromised. Still, the
thieves racked up $2.7 million in charges on 3,400 accounts. The bank covered
those losses, and issued new cards to all of the affected customers.
Many banks have jumped on the smartphone platform and offer apps to help
customers monitor their accounts and transfer money. Citigroup encountered a
problem with their early version. The software stored account information on a
fled on the iPhone, and apparently this data was not encrypted. If someone lost a
phone, it would have been relatively easy for someone to read the fle to get the
account information. Citi releaed an upgrade that removed the fle (Keizer 2010).
In another interesting security problem, Citigroup reported that a former vice
president (Gary Foster) allegedly stole $19.2 million from corporate accounts that
were in his responsibility (Bray and Rothfeld 2011). Basically, he is alleged to
have set up false contracts and just wired the money to his own account. The
transactions were uncovered in an audit. Shannon Bell, a Citi spokeswoman stated
that We are outraged by the actions of this former employee. Citi informed law
enforcement immediately upon discovery of the suspicious transactions and we
are cooperating fully to ensure Mr. Foster is prosecuted to the full extent of the
law.
Questions
1. How does Citigroup use models and information systems to make decisions
in the credit card market?
2. How is the Chinese and Southeast Asian market for credit (especially in
Korea) different from that in the United States?
3. How could Citigroup make better use of the Internet?
4. How can models, expert systems, and other information tools help Citigroup
manage such a large organization?
Additional Reading
Baglole, Joel, Citibank Takes Risk by Issuing Cards in China, The Wall Street
Journal, March 10, 2004.
Bray, Chad and Michael Rothfeld, Former Citi Executive Charged in $19
Million Theft, The Wall Street Journal, June 27, 2011.
643 Chapter 9: Business Decisions
Crossman, Penny, Wall Street-Style Power, Information Week, April 14, 2007.
The Economist, Just Deserts? April 15, 2004.
Keizer, Gregg, Citi Confrms Critical Bug in iPhone Mobile Banking App,
Computerworld, July 26, 2010.
Lai, Eric, Ballmer: Citigroup to Upgrade 500,000 PCs to Vista in Next Year,
Computerworld, April 19, 2007.
Loomis, Carol J., Sandy Weills Monster, Fortune, April 1, 2001.
McDougall, Paul, Citigroup Cost Cutting Puts a Bulls-Eye On IT, Information
Week, April 14, 2007.
McMillan, Robert, Citigroup to Encrypt Data sent to Credit Bureaus,
Computerworld, June 7, 2005.
McMillan, Robert, Citigroup Hackers Made $2.7 Million, Computerworld,
June 24, 2011.
Mearian, Lucas, Citigroup Rolls out Streaming Media to Corporate Desktops,
Computerworld, May 28, 2004.
Stone, Amey, Will Citi Upstage BofAs Big Deal? BusinessWeek, October 29,
2003.
Thibodeau, Patrick, Wipro Says Buying Citigroup Unit will Boost IT
Infrastructure Outsourcing in India, Computerworld, December 23, 2008.
Vijayan, Jaikumar, Citigroup to Lay Off 17,000, Overhaul IT Operations,
Computerworld, April 11, 2007.
Wentz, Laurel, Banks Tailor Efforts to Homesick Hispanics, Advertising Age,
April 5, 2004.
Case: Capital One
As a newcomer to the credit card industry, Capital One (ticker: COF) needed an
edge. The company created the edge by building the Information Based Strategy
(IBS). The system is highly focused on testing and evaluating various options be-
fore offering them to the public. The three-step approach: (1) create a new product
and fnd a target population, (2) create a test by changing the variables and seeing
how the group members react, and (3) use the test results to further divide the
segment, and then test specifc campaigns against those segments. By specifcally
targeting rates, fees, and options to each market, Capital One was able to obtain
high response rates, reducing the costs of acquiring a customer. The company
conducted 45,000 tests in 2000 alone (120 per day). The company extended the
process to its Web site, tracking visitor activity, tailoring options to each specifc
customer, and using the background data to buy ads on other sites with the appro-
priate demographics. For example, if sports enthusiasts responded well to certain
features, those features would be advertised on sporting sites. With this process,
the company opened 2 million new accounts online (Cohen 2001).
644 Chapter 9: Business Decisions
The company uses the test results and marketing to tailor interest rates and fees
to individual customers. In effect, it has created 100,000 different segments or
product combinations. The process extends to the customer call center. Capital
One uses Cisco Systems Global Service Logistics (GSL) system to route calls.
The system retrieves information about the customer and routes the call to the
most appropriate representative. For example, a customer who routinely pays off
the monthly charges might be routed to a representative to sell a platinum card
with a higher balance.
In a different twist, Capital One uses a similar process to hire and promote em-
ployees. It records specifc data on every hire, including scores on a timed math
test and a behavioral test. During promotions, the characteristics of successful em-
ployees are listed for each job. These characteristics, and the initial test scores, are
used to refne the hiring process for each type of job. The process fts employees
to jobs and reduces hiring costs (Cohen 2001).
For several years, Capital One had enviable growth rates with revenue grow-
ing from $95 million in 1995 to $4.97 billion in 2001, from 6 million customers
to 33 million (Cohen 2001). Yet because of the extremely competitive nature of
the industry, Capital One had to extend into the subprime market to capture more
customers. With the economic downturn, the subprime market crashed in 2002.
Capital One suffered along with the others in the industry. For the frst time, man-
agers also revealed how dependent Capital One was on the subprime market. In
2002, 40 percent of its cards were in the hands of subprime customers (Albergotti
2003), far above what most investors had believed. The market punished Capital
Ones stock. Yet, ultimately, Capital Ones system worked. The companys risk
management techniques gave it one of the lowest levels of bad loansuntil 2003.
The company wrote off bad debt, but earnings eventually rose and the company
survived. The company has reduced its exposure in the subprime market. Federal
oversight also forced companies to reevaluate the subprime marketregulators
have been attempting to limit fees and penalty charges (Smith 2002). But, the
strategic shift leaves Capital One facing more competition in the higher quality
markets. Its proft margins have shrunk accordinglydown to 16 percent in 2004,
half their earlier levels (Byrnes 2004).
Searching for new markets, Capital One is widening its search into more tra-
ditional banking areas. Richard D. Fairbank, the CEO, knows that growth in the
card market will be slow. A lot of the different fnancial markets are evolving, but
the most evolved is the credit card business. This is pretty close to the endgame.
Weve really got to work for a living these days in the credit card market. His
new target: auto loans, installment loans, and even international loans. In particu-
lar, he wants to target small businesses. Capital Ones lending to small businesses
has grown from $400 million in 1999 to $3.3 billion in 2003. At the end of 2003,
the company managed $46.3 billion in credit card loans, $8.5 billion in autos, $5.4
billion in installment loans, and $7.6 billion in international loans (Kuykendall
2004).
In the meantime, the company is cutting expenses, eliminating as many as
2,500 of its 9,000 positions in its Richmond, Virginia, headquarters. Fairbanks
told employees he needed to cut expenses by 20 percent. Our businesses need
to improve their cost positions to compete in the future against leading players in
the fnancial-services industry (Hazard 2004). Capital One is also interested in
using the Internet to reduce costs. Processing payments online instead of paper
checks reduces costs by $1 a year per customer. Persuading customers to accept
645 Chapter 9: Business Decisions
electronic statements instead of mail cuts costs an additional $5 per customer per
year. Rick Long, director of U.S. card operations at Capital One, notes that our
ROI [return on investment] models are built on lowering costs [Wade 2004). He
was emphasizing that Capital One is primarily interested in using the Internet only
where it is cost effective. The company is also concerned that customers have to
be enticed to use the Internet instead of coerced. If we drive them to the site, they
may not stay [Wade 2004). Most customers who are interested in using the Inter-
net, enroll within the frst six months.
To broaden its reach and fnancial offerings, Capital One embarked on a cam-
paign of buying retail banks. The company purchased North Fork Bancoprt as
well as Hibernia Corp. (Wei 2007) Capital One IT managers were so impressed
with Hibernias deposit-transaction system that they migrated their banking sys-
tem onto its mainframe package. In its other 9 recent acquisitions, Capital One
migrated most operations onto its existing platforms. In particular, HRM, fnance,
and other operations are transferred to Capital Ones PeopleSoft ERP system (Mc-
Gee 2006).
Like other institutions, Capital One is trying to reduce expenses. In 2007, the
company announced job cuts of 2,000 employees in an effort to reduce costs by
$700 million (Wei 2007). The IT department is working to cut expenses by reduc-
ing the number of servers it runs. Using server virtualization, a hardware-based
server can be split into multiple virtual servers, with each one running different
operating systems and different applications. One goal is to reduce costs by mov-
ing from 1,600 down to 1,100 servers. Le Congdon, VP of corporate technology
also said that the technology buys us time in circumstances where a specifc ap-
plication is ready to move over and we need to shut down that physical location,
or where we need to move of aging hardware or software. It also gives us better
management tools and controls across the environment. If we can go from 50 per-
cent to 85 percent utilization on the servers, thats free money (Thibodeau 2006).
Capital One was also hurt by the fnancial crash. But, because the frm focused
on higher-end customers (compared to Providian), it was able to survive the li-
quidity crash. Rob Alexander, CIO, pointed out that the company was still in-
vesting in technology to handle customer transactions. He also emphasized the
importance of business analytics at Capital One to ensure the company was mak-
ing the best decisions possible (Fonseca 2008). Alexander also noted that the IT
department maintains an advanced technology group to look at cutting-edge tech-
nologies and test them to see how they might improve operations or deliver new
business opportunities in the near future.
In 2011, Capital One purchased the U.S. online-banking business of INGa
Dutch bank that pioneered some online banking. The deal will make Capital One
the ffth largest U.S. bank measured by the amount of deposits (Grocer 2011).
Questions
1. How does Capital One use decision support systems to reduce risk and
increase sales?
2. With its advanced systems, how did Capital One lose so much money in
2003?
3. How can Capital One use technology to reduce its costs?
646 Chapter 9: Business Decisions
Additional Reading
Albergotti, Reed, Fewer Credit-Card Solicitations Are in the Mail, The Wall
Street Journal, November 5, 2003.
Byrnes, Nanette, Coming of Age At Capital One, BusinessWeek, February 16,
2004.
Cohen, Jackie, Growth Formula, Computerworld, July 2, 2001.
Fonseca, Brian, The Grill: Capital Ones CIO Discusses Business Strategies for
Tough Financial Times, Computerworld, November 3, 2008.
Grocer, Stephen, Deal Profle: Capital One Wins ING Direct USA, The Wall
Street Journal, June 17, 2011.
Hazard, Carol, Capital One Shifts Focus; Firm to Cut Richmond, Va., Jobs to
Reduce Costs, Richmond Times, April 29, 2004.
Kuykendall, Lavonne, Amex, Capital One Talk About the Future, The
American Banker, June 7, 2004.
McGee, Marianne Kolbasuk, Capital One: A Serial Acquirer, Information
Week, June 26, 2006.
Smith, Geoffrey, The Bill Comes Due For Capital One, BusinessWeek,
November 4, 2002.
Thibodeau, Patrick, Capital One Cuts Servers With Virtualization Push,
Computerworld, February 13, 2006.
Wade, Will, Coming Full Circle on E-Strategies, The American Banker, June
15, 2004.
Wei, Linling, Capital One to Cut About 2,000 Jobs, The Wall Street Journal,
June 28, 2007.
Case: Providian/Washington Mutual
The credit card industry has changed in the decades since the 1960s when Bank of
America fooded households with millions of cards. Today, trillions of dollars of
transactions are paid with credit cards, with 1.2 billion in use in the United States
alone. The average cardholder has 2.7 bank cards, 3.8 retail cards, and 1.1 debit
cards for a total of 7.6 cards per person. Despite the huge variety, the top 10 issu-
ers handled about 78 percent of the total value at the end of 2002. About 24 per-
cent of all consumer retail transactions are paid with credit and debit cards (www.
cardweb.com).
A huge percentage of the U.S. population already holds several credit cards, and
banks are constantly competing to give more cards to high-income customers. To
most observers, the market appears to be saturated. Customers will switch banks
if one offers a better rate or different benefts. Providian Financial (PVN), a San
Francisco-based company, looked at this market and decided to fnd a new niche:
the subprime market. According to cardweb, approximately 25 percent of the pop-
ulation has weak credit ratings. The objective was to fnd low-income people with
poor or no credit, offer them a credit card, and then charge huge fees and high
647 Chapter 9: Business Decisions
interest rates. Shailesh Mehta, who eventually became CEO, developed a complex
mathematical model that allowed the company to identify the subprime custom-
ers who would be most likely to use the cards, but not default on the loans. One
executive characterizes the process as we found the best of the bad. Since other
banks refused to serve this market segment, Providian had solid growth rates and,
despite the 24 percent and higher interest rates, was able to claim that it was pro-
viding a useful service to the customers. Eventually, other banks (notably Capital
One and Household International) jumped into the market. By 2000, 20 percent of
the cardholders were classifed as subprime (cardweb), and Providian was the ffth
largest card issuer in the nation (Koudsi 2002). In 2000, the company was ordered
to pay $300 million in restitution for misleading, unfair, and deceptive business
practices. To keep growing, the company had to fnd a new market. It failed in an
experiment to go after the platinum market. So, it went after increasingly risky
customers. By 2001, when the economy faltered, the subprime market felt the
impact frst, and the company saw its default rates jumpto a huge 12.7 percent.
Amid claims of misleading accounting, the stock price plummeted 90 percent.
Cardweb notes that 1.3 million cardholders declared bankruptcy in 2001which
generally erases unsecured credit card debt. Other banks focusing on the subprime
market faced similar problems. Bernhard Nann of Fair Isaac, which evaluates
consumer creditworthiness, notes that data used in traditional behavioral models
is not quite as powerful as we would like. Wed like to go and expand the universe
of data that can be looked at to produce better predictions. Thats particularly im-
portant in the subprime area. In particular, the company wants to include utility
and rent payments in its calculations (Punch 2003).
With the economy improving in 2003 and 2004, Providian was able to sell off
some of its loans and write off the really bad ones. The company also refocused its
efforts to go after the middle market, people with a FICO score between 600 and
720 (Albergotti, 2003). Although weak, the company was able to report a proft
in late 2003 (Business Week 2003). By 2004, some experts saw an improvement
in the credit card industry profts. Many homeowners had already refnanced their
mortgagesand paid down credit card debt. But, that leaves them free to increase
the borrowinghence increasing profts (Stovall 2004).
Yet, with increasing competition for the platinum and midmarket segments,
banks continue to search for ways to make money on credit cards. With low bal-
ances and low interest rates, and few new customers, banks turned to fees. Income
from late fees and penalties was predicted to reach $13 billion for 2004, with total
fees likely to account for 39 percent of revenue (Simon 2004). Providian joined
in the parade and increased its fees annually. However, the company also created
a Real Rewards program, where cardholders accumulate points for cash rebates
that can also be used to offset late fees.
In 2004, Providian settled the accounting and insider-trading lawsuits for $65
million (Kuykendall 2004).
In 2005, Providian was purchased by Washington Mutual Bank WaMu (Hal-
linan 2005). WaMu was formed in 1889 in Washington State. It runs consumer
and small-business retail banks from the West Coast to the Midwest. It also has
an aggressive home-lending program. In the past few years, it has become known
as a bank for taking risks and targeting subprime loansboth in credit cards and
mortgage loans. WaMu was pressured by the crashing housing market in 2006
and 2007. Because of its aggressive subprime loans, the company was one of the
frst to offer new loans to customers to try and move them into safer loans as rates
648 Chapter 9: Business Decisions
increased, in an effort to keep large number of customers from defaulting on hous-
ing loans (Carrns 2007 and Hagerty and Carrns 2007).
WaMu aggressively uses technology to reduce labor costs in its banks. In most
of its branches, tellers assist customers with transactions that are handled elec-
tronically. Effectively, tellers work at advanced ATM stations that enable them
to handle tasks only slightly more complex than a standard ATM machine. If a
customer processes a transaction involving cash, the money is dispensed by the
machine.
The real estate crash and fnancial liquidity crunch were tough on WaMu. Es-
sentially, the government forced the sale of WaMu to JP Morgan Chase, who
picked up the assets for relatively low cost. Shareholders of WaMu stock pretty
much lost all of their value. For a couple of years after the crash, top-level manag-
ers tried to argue that the government should not have forced the sale of WaMu,
and that government actions might have contributed to the failure of the company.
But, in the end, most observers simply blamed the over-aggressive lending prac-
tices of the company. When the real estate market crashed, an increasing number
of loans turned bad, and even moderately risky customers walked away from their
debt. These were the customers targeted by WaMu, and it lacked the capital and
stable profts to balance these risks. JP Morgan had to write off at least $31 billion
in bad loans (Sidel, Enrich, and Fitzpatrick 2008).
Questions
1. Why is the subprime market so risky and how does Providian use
information technology to minimize the risks?
2. How are the platinum and midmarket accounts different from the subprime
market, and can Providian use the same models?
3. How can Providian use information technology to increase its revenue from
fees?
Additional Reading
Albergotti, Reed, Fewer Credit-Card Solicitations Are in the Mail, The Wall
Street Journal, November 5, 2003.
BusinessWeek, UBS Financial Cuts Providian to Neutral, October 30, 2003.
Carrns, Ann, Washington Mutual Earnings Slide on Home-Loan Losses, The
Wall Street Journal, April 18, 2007.
http://www.cardweb.com/cardlearn/stat.html
Hagerty, James R. and Ann Carrns, WaMu Leads in Risky Type of Lending,
The Wall Street Journal, April 17, 2007.
Hallinan, Joseph T, WaMu Has Deal To Buy Providian For $6.45 Billion, The
Wall Street Journal, June 7, 2005.
Koudsi, Suzanne, Sleazy Credit, Fortune, February 19, 2002.
Kuykendall, Lavonne, Providian Says It Can Move On After Settling Class
Action for $65M, The American Banker, June 9, 2004.
Punch, Linda, Subprime Cards, Act II, Credit Card Management, November
2003.
649 Chapter 9: Business Decisions
Sidel, Robin, David Enrich, and Dan Fitzpatrick, WaMu Is Seized, Sold Off to
J.P. morgan, In Largest Failure in U.S. Banking History, The Wall Street
Journal, September 26, 2008.
Simon, Ruth, Credit-Card Fees Are Rising Faster; As Economics of Industry
Change, Issuers Seek To Boost Income From Penalties; $35 Late Charge,
The Wall Street Journal, May 31, 2004.
Stovall, Sam, A Rising Rating for Consumer Finance, BusinessWeek, February
24, 2004.
Case: Merrill Lynch
For decades, Merrill Lynch (ticker: MER) was the premier brokerage frm. It led
the industry in sales and innovations. The frm helped create hundreds of modern
companies with its access to capital and the ability to sell stocks. In the 1970s
and 1980s, its innovations in money market funds rocked the fnancial world and
resulted in substantial changes to the federal banking laws. It accomplished many
of these innovations through technologyand the recognition that money is re-
ally data. It expanded its reach overseas, and became the largest retail broker-
age and the largest underwriter of stocks and bonds in the world. Through the
stock market bubble of the 1990s, Merrill prosperedat least in terms of market
share. They helped fnance several start-ups and retail stock brokerage revenues
grew by $3 billion from 1996 to 1998. But the growth carried equally huge costs:
only $100 million of that money made it to the bottom line. By 1998, Merrills
proft margins were 10 percentage points lower than its competitors. At the same
time, the growth of online account management and discount brokerage frms had
chipped away at the retail end of Merrills operations. By 2001, even the directors
knew that Merrill was in trouble and might not survive. Being the largest was not
very useful if the company was not making money (Rynecki 2004). In 2001, the
board made the surprising move of appointing Stan ONeal, the CFO to become
the new CEO of Merrill. Recognizing the importance of profts, and seeing limits
on the ability to increase revenue, he began focusing on cutting costs. Ultimately,
he eliminated 24,000 jobs, including 20 percent of investment banking and ana-
lyst positions. He closed 300 feld offces and completely pulled out of Australia,
Canada, New Zealand, and South Africa. He reduced the number of stocks traded
directly by the frm by 75 percent. He replaced almost all of the management from
the top downlargely replacing them with younger staffers looking to make their
marks. He reportedly often states that ruthless isnt always that bad (Rynecki
2004). The result: in 2003, the frm earned a record $4 billion in proft, and pre-
tax margins reached 28 percentvastly exceeding the high-growth years of the
1990s.
Despite the proftability, the frm still has to worry about revenue. In 2004, with
the slow economy and shaky fnancial markets, Merrill ranked last in sales growth
among the Newsday Top 100with a three-year sales decline of 14.8 percent
(Murray 2004). Merrill Lynch is refocusing its retail brokerage operationson
wealthy customers. The company pays higher interest rates to customers with bal-
ances over $10 million (McGeehan 2004). Merrill also jumped into the credit card
market in 2004. The company realized that customers withdrew $3 billion from
their accounts in 2003 to pay off credit card debt. Co-branded with MBNA, the
650 Chapter 9: Business Decisions
card is designed to provide one-stop shopping for its customers. Merrill is target-
ing its wealthier customersin an effort to provide more services, but also to keep
control over a larger percentage of their money. The company is offering a variety
of awards to entice customers to use them for large transactions (Lieber 2004).
Despite the renewed emphasis on cost, Merrill still has to handle business, and
that requires technology. In 2003, the company began the frst steps of a $1 billion
upgrade to their broker workstation systems. The new Client 360 system is de-
signed to be a total wealth-management toollargely focused on customer rela-
tionship management. It is designed to provide a complete view of customer data
to the broker. John Killeen, the chief technology offcer, notes that the tool suite
around wealth management is pretty well established across the industry, still what
will make this unique is that we are facilitating the relationships for our fnan-
cial advisers with their clients. Its a single-screen representation of the most
important and most prevalent questions that a client may ask a fnancial adviser
when they have them on the phone. It will talk to balances; it will talk to progress
towards plans, and any important notices that affect that client. And within one
or two clicks, we can drill down to greater and greater detail. It represents a huge
productivity gain for our fnancial advisers (Pallay 2004). Most of the front-end
system being developed is installed by Thomson Financial, which is overseeing
the integration of work from 400 vendors. The back-end system remains Merrills
proprietary system, largely running on Microsoft software. The company built a
framework that separates the back-end and middle tier systems from the front end.
This approach enables the company to alter various components on either end
without having to rebuild the entire system. Despite the complexity of the project,
Killeens focus has been on the end-use applications: I think the lynchpin around
the tools will be client datawho has the greater understanding of the total client
relationship, what is important to the client at the different phases of their fnan-
cial life cycle, and how do we put all of that together so that our advisers are best
positioned to work with their client?
Technology has been driving several changes in market trading for several
years. For a while, the stock exchanges frowned on automated trading schemes,
but by 2007, they had adopted them wholeheartedly. Brokers, including Merrill
Lynch, have developed complex models of trading strategies. Some look for ar-
bitrage opportunities across markets, others look for timing gaps. These systems
can generate hundreds of trade orders per second, and generally hold positions for
only a few seconds or minutes (Martin 2007). Economically, these systems serve
to remove bumps and reduce imperfections in the market. In the process, the large
brokers make profts not available to the average investors, but the profts pay for
the technology.
In terms of customer-based technology, Merrill Lynch is reportedly the largest
customer of Salesforce.com with licenses for 25,000 users (Weier 2007). Sales-
force provides customer relationship management software via an online system.
The company offers its Wealth Management Edition for Merrill Lynch and other
fnancial institutions. In terms of processing transactions, federal regulations be-
gan changing the rules in July 2007 with the implementation of Reg NMS. The
regulation requires brokers to automatically and instantly route orders to the mar-
ket that displays the best price (Horowitz 2007). Only the largest brokerage frms
have been able to afford the technology to maintain constant connections and
price searches with multiple markets. With many of the exchanges automated, the
brokerage computers need to be fast and secure to handle the number of searches
651 Chapter 9: Business Decisions
required for each transaction. Tim Cox, VP of market structure strategy at Merrill
Lynch observed that The big are going to get bigger. Reg NMS over the course of
a couple of months will make technology a real differentiator (Horowitz 2007).
Merrill Lynch only barely survived the fnancial crisis of 2008. The company
had made huge bets on the housing marketand held those bets on its balance
sheet. Its competitor Lehman Brothers was allowed to fail by federal regula-
torspartly to send a message to the rest of the industry. Merrill Lynch would
probably have been close behind, but Bank of America took a $50 billion gamble
and bought out the company (Farrell 2010). Ultimately, the question of wheth-
er Merrill Lynch was worth billions of dollars to Bank of America remains to
be seen. Can the division generate enough revenue to justify its continued exis-
tence? After all, it is still a high-priced brokerage frm. Perhaps it can help Bank of
America in high-end deals for IPOs and other investment banking tasks.
Questions
1. How can Merrill Lynch survive as a full-service broker, particularly with the
regulatory changes in investment research?
2. How can Merrill Lynch use information technology to attract and keep the
high-end investors that it wants?
3. How can the company use technology to reduce its costs and improve its
proft margins?
Additional Reading
Farrell, Greg, Crash of the Titans: Greed, Hubris, The Fall of Merrill Lynch and
the Near-Collapse of Bank of America, Crown Business 2010.
Horowitz, Jed, How New Rule May Tip Brokerage Scales, The Wall Street
Journal, July 6, 2007.
Lieber, Ron, A New Contender for Your Wallet; Merrill Jumps into Card War
With No-Fee Rewards Offer, But Does It Beat Platinum? The Wall Street
Journal, April 20, 2004.
Martin, Richard, Wall Streets Quest To Process Data At The Speed Of Light,
Information Week, April 21, 2007.
McGeehan, Patrick, Schwab Tells Less-Affuent Customers They Have To Pay
More Than Richer Clients To Make Trades, The New York Times, May 26,
2004.
Murray, Christian, Top 100; After a Low, Merrill Looking Up, Newsday, June
14, 2004.
Pallay, Jessica, An Interview with Merrill Lynchs John Killeen, Wall Street &
Technology, May 2004.
Rynecki, David, Putting the Muscle Back in the Bull, Fortune, April 5, 2004.
Weier, Mary Hayes, New Deals Show Software-As-A-Service More Than A
Niche, Information Week, February 28, 2007.
652 Chapter 9: Business Decisions
Summary Industry Questions
1. What information technologies have helped this industry?
2. Did the technologies provide a competitive advantage or were they quickly
adopted by rivals?
3. Which technologies could this industry use that were developed in other
sectors?
4. Is the level of competition increasing or decreasing in this industry? Is it
dominated by a few frms, or are they fairly balanced?
5. What problems have been created from the use of information technology
and how did the frms solve the problems?
653
What You Will Learn in This Chapter
How can you use information technology to improve your organization and make it
better than your competitors?
How competitive is your world?
What are the main factors affecting a frms competitive advantage? Where do you
begin looking for an edge?
How can you use IT to gain a competitive advantage? Where do you begin your
search?
How can IT support the operations of the frm to provide a competitive advantage?
Why is it so diffcult to convince management to make strategic changes? What are the
risks of strategic decisions?
Why did so many dot-com frms fail? Do their failures mean there is no viable Internet
strategy?
How do you convince an organization to change strategies?
Can cloud computing provide strategic advantages?
Chapter Outline
Strategic Analysis
10
Chapter
Introduction, 654
The Competitive Environment, 656
External Agents, 658
Buyers, 658
Suppliers, 660
Rivals, New Entrants, and Substitutes,
660
Government Regulations, 662
IS Techniques to Gain Competitive
Advantage, 662
Barriers to Entry, 662
Distribution Channels, 664
Switching Costs, 666
Lower Production Costs, 667
Product Differentiation and New
Products, 667
Quality Management, 669
The Value Chain, 670
The Search for Innovation, 671
Research, 672
Engineering and Design, 673
Manufacturing, 673
Logistics and Supply, 674
Marketing, 674
Sales and Order Management, 676
Service, 676
Management, 676
Costs and Dangers of Strategies, 678
High Capital Costs, 678
When the Competition Follows, 679
Changing Industry, 679
Sharing Data, 680
Government Intervention, 681
The Role of Economics, 682
Challenges of Strategy, 683
Sustainability, 685
Leader or Follower, 686
Change Agents, 688
Cloud Computing, 689
Summary, 690
Key Words, 691
Web Site References, 691
Review Questions, 691
Exercises, 692
Additional Reading, 695
Cases: The Airline Industry, 696
654 Chapter 10: Strategic Analysis
Delta Air Lines
Introduction
How can you use information technology to improve your orga-
nization and make it better than your competitors? Can technol-
ogy make your company the best in the industry? These questions are still being
debated, but it is clear that in some cases information technology has provided the
ability for companies to dramatically change industries. Figure 10.1 shows that
technology can be used to build ties to customers and supplierseffectively mak-
ing it harder for competitors to enter your market. A key theory from economics
(extensively applied in marketing) states that a frm can make additional profts
only by blocking new frms from entering the market. And one of the few legal
ways to block frms is to differentiate your product so that customers will perceive
it as a separate item. Technology can provide differentiating factors including bet-
ter service, lower prices, stronger customer relationships, and new features for
products.
The reengineering provided by information technology creates ad-
ditional benefts. It enables you to alter the way an organization oper-
ates. However, it is critical that you remember that technology by itself
is not a magic wand. Now, for the important question: How can you use
information technology to fnd new opportunities and gain a competi-
tive advantage?
Strategy requires looking beyond the internal factors such as costs and imple-
mentation details. Managers need to look at the potential effects on customers,
How can you use information technology to make your company better than your
rivals? Delta is one of the original airlines in the United States. Only a handful of
the original remain, and most of them, including Delta, are firting with bankruptcy.
Many of the airline executives blame September 11, 2001, the SARS scare of 2002-
2003, and the oil price increases of 2003-2004 for their problems. But if you look at
revenue and profts over time, it is clear that the big airlines were getting their butts
kicked long before these events. In 2005, Delta, Northwest, and Continental were
in bankruptcy courtlargely to drop their pension plans and renegotiate labor and
other contracts. At one point, 50 percent of the U.S. air transportation capacity was
operating in bankruptcy. The discount airlines, led by Southwest and joined by Jet-
Blue and ATA, have been proftable over the last few yearsbecause they found a
way to attract customers and hold down costs.
Discounters and upstarts are not new to the airline industry. In a classic case,
American Airlines was able to drive away People Express in the early 1980s with its
Sabre reservation system. American pioneered yield managementcharging every-
one on the plane different pricestrying to get as much money from each person as
possible, meaning that businesses paid through the nose while tourists who book in
advance get cheap seats. The advantage generated from this system was refned with
frequent fier miles and kept American, Delta, and the others on top for 15 years.
But Southwest, with a radically different strategy, has slowly grown to challenge the
entire industry. Is there another rabbit in the hat for the big, traditional airlines? Can
Delta fnd a new way to use information technology to save the day?
655 Chapter 10: Strategic Analysis
suppliers, competitors, and other external agents. In some cases, the technology
can be relatively commonbut the trick is to look for additional benefts. For
instance, using social networks for marketing uses relatively standard technology,
but it requires a marketing staff that understands the products and the customers
supported by custom search engines and data analytics to determine the most im-
portant contacts and strongest effects. Using the technology changes the way the
company operates. In this example, instead of relying on traditional sales through
distributors and retail stores, companies can choose to interact directly with high-
profle customers who then affect decisions by other consumers. The real differ-
ence with strategy lies in its goal: to change the way the business operates, and
gain an advantage over the other frms in the industry.
Information systems can provide a competitive advantage through decreasing
costs, improving quality, establishing ties to consumers or suppliers, differentiat-
ing products or creating entirely new products. Computer systems can also create
barriers to entry through the need for greater technical skills or increased costs.
Designing strategic systems can be a dangerous task with many opportunities
to fail. One complication is that development costs are high. Some strategic sys-
tems use new technology, which carries higher costs and a greater risk of incom-
patibilities and other problems. It is also important to remember that attempts to
monopolize a market are illegal, and strategic systems can sometimes come close
to breaking the antitrust laws.
The most diffcult aspect of strategic systems is coming up with ideas that might
give you an advantage. Consequently, a related problem is convincing top manag-
ers that a potentially radically new, costly idea could actually work. One way to
get ideas is to see what frms in other industries have done. You never know when
some of the techniques and tricks used by other companies might be useful to you.
Figure 10.1
Strategies. Managers are increasingly being asked to fnd ways to give their frm an
advantage over the competition. Information systems can help identify areas that can
provide a competitive edge. Information systems can also directly provide services
and advantages that are not offered by your rivals.
Competition
Become the best rm in the
industry. Block the competitors by
keeping your customers happy.
Connections to suppliers
and customers.
656 Chapter 10: Strategic Analysis
Te Competitive Environment
How competitive is your world? One of the important trends facing most
businesses today is the increased level of competition. As indicated in Figure 10.2,
improved telecommunications and faster delivery services mean that local frms
face competition from regional, national, and international frms. Local frms have
to compete against national mail-order companies, which offer wide selections,
next-day delivery, and low prices. The Internet, home shopping channels, and toll-
free phone numbers make it easier for consumers to compare prices, putting pres-
sure on all frms.
Large national retailers and franchises put pressure on local stores. They also
compete against themselves for market territories. Their size gives them leverage
in dealing with manufacturers. By purchasing in large quantities, they can nego-
tiate lower prices. Their high volume also makes it easier for them to buy from
foreign producers.
Trends
Ideas and concepts for managing businesses are constantly changing. Many
current practices are often traced to Alfred Sloan, who drove the consoli-
dation and expansion of General Motors from 1920 to 1956. Management
techniques evolve over time and ideas come from many sources. Through
the 1950s, many companies focused on making production more effcient.
In the 1950s and 1960s, U.S. frms expanded into wider markets, both na-
tionally and internationally. In the 1970s, managers were preoccupied with
the economic changes brought on by oil price rises and consequent shocks
of high infation and high interest rates. The 1970s and 1980s also saw the
emergence of increased international competitionfor example, between
1960 and 1985, U.S. imports as a percentage of GDP increased from 5.6 per-
cent to 11.5 percent. The 1990s and 2000s saw increasing international com-
petition as well as consolidation among large frms. Many industries now
support only a handful of large frms.
Through the 1960s and 1970s, the use of MIS was largely governed by
its capabilities and the immediate needs of the organizations. The most com-
mon MIS objective was to save money and time by automating transaction-
processing tasks. The projects were evaluated on the basis of how much
money they could save. Eventually, managers came to realize that computer
systems have other advantages. A new technology might enable the frm
to provide better service to customers. The company that is the frst imple-
menter of a technology might fnd it easier to attract customers, giving it a
competitive advantage over the other frms. For example, the frst banks that
installed ATMs to provide 24-hour access gained an advantage over their
competitors.
Now, everyone uses information technology for transaction processing
and some decision-making. Still, new opportunities arise to be a leader, such
as connecting to customers through the Web, social networking, and mobile
devices. The key is to always look for ways to use new technologies and
identify the benefts as well as the costs to fnd the optimal timing.
657 Chapter 10: Strategic Analysis
Several international trends are creating increased competition. The interna-
tional search for lower manufacturing costs puts pressure on frms to cut their
costs. For instance, the Japanese have moved production to other Asian nations
to build television sets and automobiles. The demographics of an aging popula-
tion have led Japan from a labor surplus to a labor shortage, and Japan has moved
much production to lower-cost nations. Decreasing trade barriers throughout the
world also creates larger markets. As eastern European economies rebuild, as the
European Union takes shape, and as Chinese, Indian, and Mexican incomes in-
crease, consumers will be able to buy more products. Although the prospect of
these increased sales is enticing to U.S. manufacturers, many complications exist.
If a competitor becomes established frst, it will be a stronger and tougher com-
Figure 10.2
Competition. Even industries with one or two front-runners often have a pack of
hungry competitors trying to chase them down. Todays businesses face competitors
from around the world.
Reality Bytes: Business Trends
Business statistics indicate a clear trend toward the increased importance of service-
oriented frms. Service frms are well suited to certain strategic uses of information
systems. In particular, product differentiation, product quality, and new products are
typically useful strategies. In many service industries, information is the primary
product, so technology is especially valuable.
The fnancial industry provides several strategic examples, such as the Merrill
Lynch Cash Management Account, ATMs, or new fnancial instruments created by
brokers. Similarly, Federal Express uses tracking information to differentiate its ser-
vice from its rivals offerings. Likewise, the airlines used their reservation systems to
give them a competitive advantage in transportation services.
658 Chapter 10: Strategic Analysis
petitor in the United States. New frms will arise or expand in these international
markets, giving them a stronger base to increase sales in the United States, provid-
ing for increased competition.
The business world has defnitely become more price-competitive in the last
decade. Large frms competing on price continually squeeze suppliers to cut costs
and offer discounts. Think about the effect of Wal-Mart. How does Wal-Mart con-
tinue to decrease costs? Yes, through internal savings, but also through leaning on
suppliers. On the other side, the Internet and mobile computing have made it easy
for consumers to fnd price information and compare products instantly. It is easy
for consumers to use their cell phones to take a photo of a bar code and receive
instant price comparisons, quality ratings, and customer comments. Certainly re-
tailers need to consider the effects of these technologies, but manufacturers must
also evaluate the competition in terms of price and quality.
External Agents
What are the main factors affecting a frms competitive advan-
tage? Where do you begin looking for an edge? Competitive advan-
tage can be gained by establishing or changing relationships between the frm and
its external agents. External agents consist of suppliers, customers, rivals, poten-
tial new entrants, substitute products, and sometimes the government. Figure 10.3
portrays these relationships in Porters Five Forces model. From a systems per-
spective, each of these entities is outside the control of the frm. Yet they strongly
affect the company. Through improved ties to these agents, they become part of
your system, which can be used to improve the competitive position of the frm.
Buyers
Who are your customers? This famous question is used to highlight the issues in
an industry. The answer might seem obvious, but many frms have layers of cus-
tomers. To a retail outlet, customers are likely to be individual people. As shown
in Figure 10.4, a large manufacturer might have several levels of customers, rang-
ing from wholesale frms that buy in bulk, then sell to distributors, which deliv-
Threat of
New Entrants
Rivalry Among
Existing Competitors
Threat of Substitute
Products or Services
Bargaining Power
of Buyers
Bargaining Power
of Suppliers
Figure 10.3
Porters Five Forces model. Strategies often involve external agents: customers,
suppliers, competitors, the threat of new entrants, and substitute products.
659 Chapter 10: Strategic Analysis
er products to retailers, where the fnal customer purchases the product. Having
more intermediate levels between the manufacturer and the customer can make
it much harder to manage the frm. It also makes it more diffcult to identify the
needs of your customersparticularly when information from the various levels
conficts. For instance, an end consumer might want more features, while a retail
store might want simpler products and fewer models to reduce stocking problems.
A common strategic goal is to get closer to the customers. Information sys-
tems can be used to strengthen the ties among the customers, manufacturers, and
various intermediaries. For example, you could build electronic ordering systems,
with terminals in the retail stores to capture current sales levels. The systems
could also be used to send new product information to the customers, or collect
feedback on various attributes, or provide immediate answers to question from
retailers and customers.
The issue of buyers power is critical in Porters model. For example, if you
are a small company selling parts to General Motors, then you have little power
in that relationship. So, you will need to look at the supplier side for strategic
options.
Figure 10.4
Production chain. Modern companies have ties to hundreds or thousands of entities.
Sometimes a company will own several pieces of the production chain (vertical
integration). Sometimes the company might expand horizontally by building related
businesses. Each linkage requires communication and offers the possibility for
strategic gain.
parts
supplier
parts
supplier
parts
supplier
warehouse warehouse
supplier supplier supplier
tool
manufacturer
Manufacturer
workers
wholesaler
wholesaler
distributor distributor
distributor
retail store
retail store retail store retail store
Consumers
660 Chapter 10: Strategic Analysis
Suppliers
Suppliers can provide individual parts, entire products, or even services (such as a
bank that lends money). Three major issues involving suppliers are price, quality,
and delivery schedules. Just as with customers, problems can arise when many
layers of suppliers exist. For instance, increased layers can result in longer delays
between ordering and delivery because the supplier has to contact its supplier,
who contacts its supplier.
Quality management is also more diffcult when there are several layers of sup-
pliers. A fundamental element of total quality management (TQM) states that
quality must be built into every process and item. Picture the problems that arise
if quality is measured only in terms of the output at the manufacturer. When a
defective product is found, there is no information about the cause. How can the
problem be corrected? Managers need to know where each component came from
and evaluate the quality as soon as possible. For instance, if there is a defective
product, you could check each component to determine its original manufacturer.
The manufacturer could be notifed of problems, and you could search other items
for similar defects. The manufacturer could use this data to identify problems with
individual production lines.
Information systems can be used to build electronic ties to suppliers. Com-
mon uses of these systems include placing orders, tracking shipments, monitor-
ing quality control, notifying partners of changes in plans, and making payments.
Electronic links provide faster responses, better record keeping, and fewer errors.
They also offer the potential strategic benefts described in the next section.
Rivals, New Entrants, and Substitutes
The goal of a strategic approach is to derive a competitive advantage over the
rivals, or other frms in the industry. There could be many competitors or just a
few larger rivals. The competition could take place in a small town, across a na-
tion, or worldwide. One of the frst steps in any strategic analysis is to identify the
primary competitors and to assess their strengths and weaknesses. Is the industry
rivalry intense with constant price movements and attempts to gain market share?
Or do companies rarely adjust prices and are largely content to service existing
customers?
One issue to remember about competition is that it never stops. Coming up
with one strategic idea is not good enough. For example, American Airlines
and United Airlines spent millions of dollars to build reservation systems as
strategic systems. Today, all major airlines have access to these systems, and each
airline must continually work to improve its system to provide new enticements
to customers. Similarly, automobile companies designed computerized diagnostic
systems to improve services offered by repair shops. Today, all of the manufactur-
ers have essentially the same systems. In some cases, rivals might offer improve-
ments over your ideas, which will put the originator at a disadvantage. However,
the frm that frst implements a new strategy can gain recognition and market
share. It is important to remember that companies must continually improve and
seek new opportunities.
A related issue is the concept of potential competitors or entrants in the busi-
ness. In some cases, you might identify the major rivals, implement a strategy,
and then immediately lose everything as new frms enter your business. Entrants
might build their frms from scratch, such as the way Burger King built new
stores in the same areas as McDonalds restaurants. Alternatively, other frms
661 Chapter 10: Strategic Analysis
may increase the sales of products that are similar to your products. Substitute
products are related economically by the degree to which consumers are willing to
use one product instead of the other. A classic example comes from the late 1970s,
when the U.S. economy faced high infation rates and banks were subject to limits
on the interest rates they could pay on deposits. Merrill Lynch, the stock broker-
age frm, introduced a service enabling customers to store their money in a wide
variety of fnancial instruments that paid signifcantly higher interest rates than
did checking accounts, and still write checks on the account. Many larger custom-
ers took their money away from banks and put it in these asset accounts. These
new accounts were perceived as close substitutes for traditional bank services, and
people transferred huge sums of money out of the banking system.
The key point is that you need to take a broad look at your frm and the indus-
try. Know who your competitors are and how they operate. Are other products or
services offered by other industries that might attract your customers? If you make
a change in the way you do business, fnd out how it will affect your rivals. Deter-
mine how changes will alter the industry. Will they provide an opening for frms
in other industries?
Barrier
To Entry
Firm Rival
Supplier
Supplier
Supplier
Consumer
Consumer
Consumer
Consumer
Consumer
Consumer
Consumer
Decreased
Costs
Improved
Quality
Ties To
Customers
Increased
Switching Costs
Wholesale
Ties To
Suppliers
Control Of
Distribution
Innovation and
Dierentiation
Figure 10.5
Methods to gain competitive advantage. Examining the production chain highlights
several useful techniques. Barriers to entry keep out potential competitors and
substitutes. Ties to suppliers can cut costs, improve quality, and lock out competitors.
Control over distribution provides stronger markets and keeps out competitors.
Building ties to customers builds loyalty, improves products and increases margins.
Creating switching costs keeps customers loyal.
662 Chapter 10: Strategic Analysis
Government Regulations
In any economy, government intervention has a strong infuence on the frm.
There are myriad government agencies, regulations, taxes, and reports. The situa-
tion multiplies for multinational frms that are subject to the regulations of many
nations. These agencies and regulations can have strong effects on the proftability
of a frm. Generally, an individual frm has no control over government regula-
tions, but sometimes suggestions can lead to modifcations. For instance, it is now
possible to submit some documents to government agencies in computer form. In
fact, some reports (such as 10K or 10Q fnancial reports) are required to be fled
electronically. Electronic forms can decrease your storage costs and make it easier
to fnd documents that have been stored for long periods of time.
IS Techniques to Gain Competitive Advantage
How can you use IT to gain a competitive advantage? Where do
you begin your search? These questions are diffcult to answer. Keep in
mind that your competitors are asking the same questions every day. Competitive
advantage may be achieved with many techniques in business. Information tech-
nology is one area that may provide several opportunities. In general, MIS tech-
niques may not be better than other methods. However, some frms have experi-
enced considerable success from using these techniques, so they are well worth
considering. Moreover, the rapid changes in technology often lead to competi-
tive advantages if your frm is the frst to fnd a creative use for the new technol-
ogy. The other side of the coin is that untested new technologies may not work as
planned. Hence, the pioneer is taking a risk: If the project fails, the development
costs may put the frm at a competitive disadvantage.
The fundamental mechanisms for gaining competitive advantage are barriers
to entry, switching costs, lower production costs, product differentiation, control
over distribution channels, innovation, and quality control. These techniques are
illustrated in Figure 10.5. The question we wish to examine is how information
systems can take advantage of these techniques.
Barriers to Entry
A fundamental concept of economics is that to make extra profts, you need some
mechanism to prevent other frms from entering the industry. Otherwise, as soon
Sources of Barriers to Entry
Economies of scale (size).
Economies of scope (breadth).
Product differentiation.
Capital requirements.
Cost disadvantages (independent of size).
Distribution channel access.
Government policy.
Figure 10.6
Several methods can build barriers to entry. Be careful. Many attempts to erect
barriers are considered illegal under antitrust legislation.
663 Chapter 10: Strategic Analysis
Reality Bytes: People Express Airlines (Classic Case)
In 1981, Donald Burrs People Express Airlines was the darling of the airline indus-
try and American management. In four years the fedgling airline grew to a $2 billion
company. People Express was cited in In Search of Excellence as an ideal American
business because of its fat organizational structure and compensation plan that based
reward on stock growth. All employees, whether customer representatives or pilots,
were viewed as equally valuable to the company. Growth seemed to be unlimited and
the airline could not process applications or reservations fast enough. Yet on January
18, 1985, People Express Airlines declared bankruptcy. Soon thereafter, the parts of
the empire that Burr constructed were auctioned off and the routes redistributed.
The basic philosophy driving People Express was to make air travel available to
everyone. At its peak, Peoples low fares brought thousands of students, the elderly,
and the middle class through Newark, New Jersey. The waits were horrendous and
the service was chaotic. Yet the $29 fare made the hassle worth it, particularly when
the other airlines were charging fve times as much. Peoples fares allowed the car-
rier to book and fy full planes.
As long as the fights were full, the profts were easy to calculate: determine the
price of the fuel and the equipment and employee cost per fight of the plane; deter-
mine a per fight fare that would provide a proft when the expenses were subtracted;
and repeat this formula across the fight pattern. Keep the fares so low that the fight
would always be booked. By developing the demand in this new market segment,
Burr felt that he had found a formula for success that could not be broken.
This approach looked promising until American Airlines used its Sabre reserva-
tion system to implement yield pricing. Through advance ticketing and other restric-
tions, American was able to discount seats that would have gone unsold because of
Peoples low fares. The fying public now had a choice. They could continue to fy
on People Express Airlines and deal with the chaos and the crowds, or they could
make reservations and fy on American Airlines with comfort. Besides, they could
fy directly and not go through Newark. The remainder of the seats were sold at full
price to business people who could not plan far enough ahead to make advance res-
ervations.
Peoples vision was a good one. It centered on cost cutting and motivating the
workforce. Overexpansion and the lack of a marketing focus contributed to the fail-
ure of People Express. However, a third major factor was the failure to integrate
technology into solving its business problems. Before its frst plane left the ground,
People Express managers decided not to duplicate American and United Airlines
sophisticated reservation systems. Another reason People Express shied away from
technological development was that the airline lacked the internal expertise to build
or even buy a reservation system. In 1983, the carrier contracted with NCR Corpo-
ration to build a system to handle yield management. After 18 months, the project
failed. According to Burr, the failure was due to poor communication on both sides
and a lack of management attention.
Adapted from Richard Pastore, 1990, Coffee, Tea and a Sales Pitch, Computerworld,
7/3/89, p. 1. and Clinton Wilder 1989, Dont Blame the System, Computerworld,
7/3/89, p. 42.
664 Chapter 10: Strategic Analysis
as your frm develops a strategy that pays higher returns, other frms will fock to
the industry and drive the prices and profts down. Figure 10.6 summarizes the
common barriers to entry. One way that information systems create barriers to
entry is from their cost. Consider what happens when you create a new informa-
tion system that provides additional services, like banks did with ATMs. Custom-
ers soon expect all frms to offer those services. If a new company wishes to enter
the industry, it will have to spend additional money to buy the computers and
create the systems to offer those services. The information system raises the cost
of entering the industry. A classic example of this situation was the introduction
of People Express Airlines in 1981. The CEO of People Express stated that
he knew the airline needed a reservation system to compete effectively with other
airlines, but after raising $100 million to start the airline, top management found
it impossible to raise the additional $100 million needed to create the reservation
system.
As shown in Figure 10.7, computer systems might also be used to create more
direct barriers to entry. For instance, as a manufacturer you could build a computer
system that is tied to retail stores. The stores would use the system to place orders
and to inquire about products, warranties, and delivery schedules. You might be
able to forbid the stores from using the system to connect to any other manufac-
turers. If the stores gain advantages from the new system, they will end up placing
more orders from you, and you will keep out potential competitors. However, you
will have to be careful not to violate antitrust regulations.
Distribution Channels
Controlling distribution channels is a method of gaining competitive advan-
tage that is similar to creating barriers to entry. The Japanese economy has long
been a classic example of controlling distribution channels, although the role of
information systems is minimal. In Japan, sales relationships are developed over
long periods of time, and companies have many interrelationships and ties. In par-
ticular, distribution of products from manufacturers to retailers is controlled by
a few large companies that are loosely organized into support groups (keiretsu).
If you want to sell products in Japan, you must build a relationship with one of
these companies. American executives have often complained about the problems
they experience in dealing with these distributors, which creates a barrier to sell-
ing U.S. products in Japan. Although there is disagreement on the cause of the
problems, the ability to control distribution channels can be an effective strategy
for maintaining market share and deterring rivals. The distributors gain power
through their close personal ties to the customers. For example, in Japan, most
new automobiles are sold by salespeople who call on customers at their homes.
Information systems can be used to control distribution channels. As a manu-
facturer, you could build a computer link to the retail stores. In addition to provid-
ing faster ordering and more information, you encourage the store to order direct-
ly from your company and avoid competitors. For example, Levi Strauss, the
jeans manufacturer, has installed such a system in some retail chains. Assume that
you work for a competitor and you call on the retail store to convince the buyers
to carry your products. Probably the frst question you will be asked is whether the
store can order your jeans through the Levi Strauss computer link. If the answer
is no, the store manager is going to be less willing to buy your products.
665 Chapter 10: Strategic Analysis
Now, imagine the confusion that can result for the retail manager who wishes
to sell similar products from three companies. What happens if each company
has its own private computer link? Does the manager need to have three different
computer terminals and learn three different systems?
Partly because of the loss of access to distribution channels and partly because
of the confusion resulting from having multiple systems, attempts are being made
to standardize some electronic relationships. An important component of electron-
ic data interchange (EDI) is to defne standards so that managers have to work
with only one system and everyone has reasonable access to that system. If EDI
does become standardized, there will be fewer opportunities to control distribu-
tion channels with information systems. However, businesses might still be able
Gaining a Competitive Advantage
Barriers to Entry
The additional costs of creating a sophisticated information system make it
harder for frms to enter the industry. Classic case: People Express.
Distribution Channels
Control over distribution prevents others from entering the industry. Case:
iTunes or Napster.
Switching Costs
Consumers are reluctant to switch to a competitor if they have to learn a new
system or transfer data. Classic Case: Baxter Healthcare.
Lower Production Costs
Using technology to become the least-cost producer gives an advantage over
the competition. Classic case: Wal-Mart.
Product Differentiation
Technology can add new features to a product or create entirely new products
that entice consumers. Classic cases: Federal Express and Merrill Lynch.
Quality Management
Monitoring production lines and analyzing data are important aspects of
quality control. Improving quality leads to more repeat sales. Classic case:
Digital Equipment Corp.
The Value Chain
Evaluating the entire production process identifes how value is added at
each step. Combining steps or acquiring additional stages of the value chain
can lead to greater profts. Case: Qwest.
Figure 10.7
Classic cases. Several classic cases illustrate some important methods of acquiring
a competitive advantage. Understanding these cases will help you identify potential
strategies in other situations. They will also help you communicate with IS
professionals.
666 Chapter 10: Strategic Analysis
to gain a competitive edge by providing better, more sophisticated electronic ser-
vices through the links. For example, expert systems might be used to provide
faster responses to retailer and consumer questions.
One of the interesting aspects of the Internet is its ability to alter traditional
distribution channels. In particular, the Internet is becoming the major distribution
system for digital data such as music, books, video, software, and news. Some
traditional organizations fear this change as a loss of control. For example, in the
U.S. music industry, a handful of frms have controlled the production and dis-
tribution of most music. In 1998, the frms attempted to stop the expansion of
digital music (e.g., MP3 format), but the courts did not support this interference.
Consequently, it is now relatively easy for anyone to create music in a commer-
cial format and distribute it cheaply over the Internet. The same industry-altering
effects are occurring within the book and news industries. As the number of mo-
bile devices (readers, tablets, and large-screen phones) increases, more people are
switching to digital content away from traditional paper.
Switching Costs
An interesting strategic capability of information systems is their ability to create
switching costs for your consumers. Consider the case of a brokerage frm that
creates a system that enables you to manage your accounts with your personal
computer. You buy and sell fnancial instruments and write checks against your
account. The computer automatically tracks your portfolio, notifes you of major
changes, and automatically sweeps uninvested cash into interest-bearing assets.
At the end of the year, it prints a complete summary of your transactions for tax
purposes.
Now, what happens if another broker or bank offers you the same capabilities?
Will you switch to a new frm? You might, but it depends on what other incentives
the company offers. If everything else is the same, most people would be reluctant
to change since they incur costs to switch. For example, you would have to learn
how to use the new system. Besides, you would have to reenter your investment
data and program new reports and graphs. If you are one of the frst frms to create
a new system, the deterrence of switching costs can be a powerful tool to maintain
Reality Bytes: Control over Distribution
Sony was one of the leaders in designing and selling e-book readers; even before
Amazon. Sony has its own digital book store tied into its reader. When the Apple
iPad was released, it presented a challenge to Sony and other e-Book readers. Al-
though the display quality is lower on the iPads, it is color, and it is backlit so people
can use it at night without a reading light. Sony (like Amazon and Barnes and No-
ble), created an iPhone/iPad app that enables people to buy books directly from the
Sony bookstore. In February 2011, Apple blocked the Sony app. Apple is now insist-
ing that content must be sold through the Apple store instead of inside an application.
The reason is not technicalit involves money. Apple takes a 30 percent commis-
sion on all sales through its store.
Adapted from Yukari Iwatani Kane and Stu Woo, Apple Rejects Sony E-Book
App, The Wall Street Journal, February 1, 2011.
667 Chapter 10: Strategic Analysis
your market share. Figure 10.6 summarizes the tools to create competitive advan-
tages as practiced by companies in the classic cases.
Lower Production Costs
In some cases, an effective strategy is to become the lowest-cost producer. If you
can consistently sell your product for lower prices than your competitors do, you
will have an important advantage. However, consumers need to believe that your
products are as good as the competitions.
Computer systems have long been used to decrease costs. Transaction-process-
ing and accounting systems decrease administrative costs. Robots and process-
control systems can be used to control manufacturing costs. Inventory systems are
used to track parts and reduce inventory ordering and holding costs. Marketing
systems might be used to create better target marketing, with the advantages of
improved response and lower marketing costs. Financial systems that control in-
vestments and cash fow also can result in decreased costs.
Product Diferentiation and New Products
Another strategic use of information systems is the ability to create new or differ-
ent products. If you can add features to your product so that consumers believe it
is different from the competition, you will be able to make more money. A classic
case of using technology to create a new product is portrayed by Merrill Lynch.
Reality Bytes: Merrill Lynch Cash Management Account (Classic Case)
Until the 1970s, banks and other fnancial institutions were treated differently by the
government than stock brokers such as Merrill Lynch. Financial institutions could
not sell stocks, and there were limits on interest rates that could be paid to deposi-
tors. Brokerage companies focused on investments in stocks. In this environment,
Merrill Lynch created its Cash Management Account (CMA). For a minimum sum
of $25,000, investors could open a new account with Merrill Lynch. The account was
similar to a bank account. The money could be placed in risk-free government bonds
or it could be used to purchase stocks and bonds. The money could be obtained with
minimal problems, including writing checks against the account. In short, the CMA
became a bank account for medium and large investors. The primary advantage to
the CMA over traditional bank accounts was that there were no government restric-
tions on the interest rates. As commercial interest rates rose in the late 1970s and
early 1980s, huge sums of money left the banking industry and were deposited in the
CMA.
Merrill Lynch used its information system to offer additional features, such as au-
tomatic transfers between accounts, overnight repurchases and sales of government
bonds, and automatic investments and sales of stocks. All the investment options
were controlled by individual investors. Banks could not offer these services because
of governmental restrictions, and other brokerage frms did not have the information
systems. This use of information technology gave an advantage to Merrill Lynch.
While Merrill Lynch was not known for other innovations, it is one of the largest
fnancial institutions in the United States with a balance sheet comparable to Citi-
corps. In 1995, the brokerage frm had 44,000 employees and operated in 31 coun-
tries. The 1994 proft amounted to 18.6 percent return on equity.
668 Chapter 10: Strategic Analysis
Another classic case of using information systems to modify a product for
competitive advantage came from Federal Expressan overnight package de-
livery company. Federal Express was the frst major delivery company to track
individual packages. The service places bar codes on every package and scans
them every time the package is moved. By storing this data in a central database,
Federal Express employees can tell customers exactly where any package is lo-
cated. Besides decreasing the number of lost packages, this system provides a new
service for customers. Nervous customers can use the information to determine
when a package will be delivered. The information system tracks the current loca-
tion of each package. When the system was created it provided a unique service to
customers. To consumers, Federal Express is offering not just package delivery
but also information on the location of the package. This product differentiation
will help attract customers and might allow the company to charge higher prices.
In some cases, information systems can be used to create entirely new products
or services. For example, many banks offer sweep accounts to customers who
place large sums of money in their bank accounts. Variations exit, but the purpose
of a sweep account is to automatically place money into higher-interest-bearing
assets. For instance, you might need cash available during the day to cover any
withdrawals. But if you do not make major withdrawals at night, the bank could
lend your money to someone for overnight use. The bank needs a sophisticated
information system to keep track of which customers are participating, monitor
what limits they have imposed, and automatically transfer the money to the bor-
rowers accounts. (As a side note, you might wonder who wants to borrow money
for just one night. Of the many possibilities, two major players are governments
and large banks. Some interesting international possibilities also arise by lending
across time zones.) Customers receive more interest, borrowers have access to
more funds, and banks make money on the transaction fees and interest rate dif-
ferentials. These accounts can be provided only by investing in new information
systems.
Reality Bytes: Postal Service Death Spiral?
In many ways, the U.S. Postal Service (USPS) appears to be in a death spiral. The
number of users (mail) declines, so the company increases prices to get more rev-
enue, which drives away more customers and the process repeats. In 2010, mail vol-
ume declined 3.5 percent from the prior year. However, 170.6 billion pieces is still a
lot of mail. For the years 2008, 2009, and 2010, the volume of frst class mail fell by
4.8%, 8.6% and 6.6% respectively. Typically, frst class mail produces at least half
of the revenue. The Post Offce eliminated 105,000 jobs and reduced costs by $9
billion, but still lost $8.5 billion for the year. The agency asked Congress for permis-
sion to eliminate Saturday deliveriesessentially reducing services. The demand for
physical shipments has not disappeared, but no one knows how far or how quickly
the demand will drop.
Adapted from The Wall Street Journal, Post Offce Has $8.5 Billion Loss, Novem-
ber 12, 2010.
669 Chapter 10: Strategic Analysis
Quality Management
Firms can gain a competitive advantage by offering higher-quality products.
Through the 1980s, surveys indicated that owners reported fewer problems with
automobiles manufactured by Japanese frms compared with those produced by
U.S. manufacturers. This difference in quality gave the Japanese frms a com-
petitive advantage. Similarly, Motorola is one of the leading proponents of total
quality management. The company is constantly encouraging its suppliers to work
at improving quality through the entire manufacturing process.
Information systems have a role in improving quality management. For start-
ers, they can be used to collect data about quality measures. If quality measures
come directly from production machines, there can be an overwhelming amount
of data. In other cases, quality measures might be collected electronically from
your suppliers. Collecting data seems like an obvious idea, but the huge amount of
data complicates the process. In many cases, manufacturers have trouble identify-
ing the original source when a component fails. Often, just knowing which sup-
pliers cause the most problems is a useful step in quality management. This data
can also help the supplier. Failure data can be used by the supplier to pinpoint the
source of problems. Since 1992, nations in the European Union (EU) have been
requiring frms to improve quality by complying with the statements in the ISO
9001:2008 (International Organization for Standardization) directive. ISO 9001
requires companies to measure quality at all stages of production. Any frm that
wishes to sell products or parts to frms in the EU must build an information sys-
tem to monitor quality and provide information to customers.
No machine is perfect. There is always an element of error in the output. The
diffcult part is to determine which errors imply that the machine needs to be read-
justed. Decision support systems can be used to improve quality. Statistical qual-
ity control (SQC) is an important tool. Several statistical calculations and graphs
are used to determine whether fuctuations are purely random or represent major
changes that need to be corrected.
Figure 10.8
Value chain. The value chain illustrates the essential operations in a business.
Every frm has operations for purchasing, production, shipping, marketing, and
customer service. These processes are supported by the organization of the frm,
human resources management, technology development, and procurement services.
Providing services desired by customers contributes to the proft margin of the frm.
Firm Infrastructure
Human Resources Management
Technology Development
Procurement
Inbound
Logistics
Operations Outbound
Logistics
Marketing
& Sales
Service
M
a
r
g
i
n
M
a
r
g
i
n
670 Chapter 10: Strategic Analysis
Expert systems also can be employed to control errors and locate the source of
the problems. Consider a production line that has 50 major machines. In addition,
several hundred parts are purchased from external suppliers. The fnal product has
thousands of parts and hundreds of assembly operations. Total quality manage-
ment requires that quality be monitored at each step of the process. A typical prob-
lem facing a machine operator is that a machine might stray off the baseline and
need to be corrected. The operator faces several questions, such as: Which adjust-
ment should be made? Should we overcorrect to compensate for the prior errors?
Was the problem caused by this machine, or did earlier operations contribute? If
corrections are made now, how will they affect other machines down the line? An
experienced operator might be able to answer some of these questions. On the
other hand, an expert system might be helpful at solving the more complex prob-
lems. Digital used expert systems to improve quality and cut the cost of installing
minicomputers. Digitals weak performance in the 1990s also illustrates the dif-
fculty in maintaining a competitive advantage as the market changes.
Te Value Chain
One method of searching for areas that might provide you with strategic benefts
is to examine the entire value chain of the industry. As shown in Figure 10.8, the
key feature of a value chain is to examine each step of production and determine
how value is added at each step. If some steps show larger increases in value than
others, they will be key points to target for strategic action. The second objective
of value chain analysis is to encourage decision makers to examine the bigger pic-
ture in the industry. In many cases, a frm can beneft by expanding its operations
beyond its traditional activities. For instance, an automobile manufacturer (Ford)
might buy a car rental agency (Hertz). Now the manufacturer can control a large
consumer of its products and control the sale of the used vehicles.
Manufacturing
Engineering
and Design
Marketing
Research
Customer
Service
Management
Sales and
Order
Management
Logistics/
Supply
Suppliers
Customers
Production
Figure 10.9
Process innovation. Production consists of the processes of supply logistics,
manufacturing, and sales management. These processes are directly supported by
design, engineering, and marketing. Research and customer service support all of the
processes; top management organizes and controls the frm. Technology can provide
innovations in all of these processes.
671 Chapter 10: Strategic Analysis
Te Search for Innovation
How can IT support the operations of the frm to provide a com-
petitive advantage? Industry and academic leaders are constantly searching
for ways to improve organizations and gain a competitive advantage. Illustrat-
ed by Figure 10.9, one method to organize the search is to examine the primary
processes of the frm: research, engineering and design, manufacturing, logistics
and supply, marketing, sales and order management, service, and general manage-
ment. Each of these processes has its own inputs, outputs, and objectives. Analyz-
ing them in detail enables managers to spot problems and to search for innovative
opportunities.
The following sections present general ideas for each of these processes that
have generated interest and some success. Most of them use technology to im-
prove the process or to help the processes work together better. Keep in mind that
in any frm, there can be many ways of improving processes. Relying on informa-
tion technology is not always the best answer.
Just coming up with a new corporate strategy is diffcult, but it is not enough.
As indicated by Figure 10.10, an effective strategic plan must also describe the
changes in the process, identify the new data needs, and describe how the infor-
mation system will be changed to support the new strategy. Business strategy re-
Figure 10.10
Strategy requires more than a good idea. Innovative strategies often carry high
risk and potentially high rewards. Unique ideas are hard to fnd, hard to evaluate,
and diffcult to sell to top management. And success can depend on careful
implementation, management support, and careful monitoring.
Strategy idea
Convince top management
Data
Competition
Costs
Forecast
Research/Plan
Implement
and Monitor
672 Chapter 10: Strategic Analysis
quires more study than can be provided in this book. Several books and courses
study the various techniques for analyzing businesses and searching for new busi-
ness strategies. The key is that the executive analysis should include an awareness
of the opportunities provided by information systems. Also, the information sys-
tem strategic plan needs to adapt to the organizations strategies.
It is easier to understand the strategic possibilities of IT by looking at the spe-
cifc organization functions. In most situations, you will examine the organization
in detail, and search for ways to apply technology to operations and support func-
tions. Figure 10.11 summarizes the capabilities of IT to support innovation. All
of these technologies are discussed in this book. The difference now is that you
are specifcally searching for new ways to improve an organization. All of these
methods have been used in other organizations to support the various areas. Some
organizations use many of these tools, others only a few. Some technologies are
well-established and would hardly count as strategic in some organizations today.
But, the point of the table is to summarize the possibilities to help ensure you do
not overlook them in your search for ideas.
Research
Research in frms varies enormously depending on the industry and the overall
corporate strategy. At a minimum, most frms at least have a product development
Area Information Technology Support
Research Analysis and modeling, project management, workgroup support,
databases,decisionsupport.
Engineering and Design CAD/CAM,testing,networks,workgroupsupport.
Manufacturing Mass customization, links from customers and suppliers, robotics,
qualitymonitoring,expertsystemsformaintenance,production
databases,businessintegrationtools.
Logistics and Supply Just-in-time linkages, forecasts, models, links for design, transaction
processing.
Marketing Frequentbuyerdatabases,targetmarketandmediaanalysis,survey
design and analysis, multimedia promotion design, links between
customersanddesignteams.
Sales and Orders Portable computers for salesperson contact, expert systems for order
customization and confguration, workgroup tools for customer
support.
Service Phone support systems, location monitoring and scheduling of
servicepeople,expertsystemdiagnostics,databases.
Management Enterprise information systems, links to service providers
(accountants,consultants,etc.),e-mail,bulletinboards,decision
supportsystems,personalproductivitytools,workgroupsupport.
Figure 10.11
The search for innovation. Information technology provides many opportunities
for improving the fundamental business processes. IT is used to improve
communication, decrease costs, reduce design times, monitor customers and rivals,
and improve customer service.
673 Chapter 10: Strategic Analysis
team that is constantly searching for new products or improvements in existing
products. Some companies, such as 3M, DuPont, Microsoft, and Intel, spend
considerable sums of money on basic research to create entirely new products. To
these frms, strategic advantage comes from being the leader in the industry with a
constant cycle of new products.
IT support for research takes the form of computer analysis and modeling,
statistical analysis of data, project management and budgeting, and workgroup
technologies that make it easy for researchers to collaborate and share informa-
tion with each other and with managers throughout the company. Data mining,
business intelligence, and neural network tools can also be useful for exploring
and analyzing research results. For example, many experiments in chemistry and
physical sciences can be monitored and summarized by automated equipment.
Engineering and Design
Engineering and design processes are responsible for converting theoretical re-
search into new products. Engineers establish manufacturing procedures, design
new equipment, and coordinate suppliers with production. In particular, the de-
sign process must optimize the production line to minimize costs and retain high
quality.
Support for engineering and design takes the form of CAD/CAM systems that
make it easy to create, modify, store, and share new designs. If these systems are
coupled to integrated design databases, engineers can more easily reuse prior re-
sults. Tying into production databases enables the engineers to model and test var-
ious aspects of their designs. Engineers can also be supported with expert systems
that help them analyze production aspects of their designs. As General Motors
engineers design new cars, software helps them improve the layout to simplify
production and to use existing components. Engineers are also being supported by
workgroup technologies that make it easy to share designs and receive input from
teams of workers throughout the company.
Manufacturing
Four key features are critical in production: costs, speed or timing, quality, and
fexibility. Competing through lower costs and higher quality are time-honored
means of gaining a competitive advantage. It might not be suffcient today. In-
creasingly, frms are turning to mass customization in an attempt to gain market
share. Twenty or thirty years ago, the large frms in an industry were content to
build huge plants, gain economies of scale, and aim at the mass market. This ap-
proach tended to leave niches open for competing frms. The problem with this
strategy is that it allows rival frms to gain a toehold, which they might use to
build market share and eventually compete directly against your primary market.
Todays frms are trying to shift production fast enough so that they can cover vir-
tually all of the niche markets.
Mass customization requires an IT system that links the sales system directly to
the production line and through to supply. It also involves heavy use of robotics
that are confgurable directly from one computer. Other uses of IT include expert
systems for maintenance and diagnostics. Japanese frms have long been propo-
nents of preventive maintenance. If you wait until a machine breaks, it is too late.
Expert systems can be used to schedule routine maintenance and spot problems
before they cause problems. IT systems are also heavily used to monitor quality
and suggest improvements.
674 Chapter 10: Strategic Analysis
Logistics and Supply
The implementation of just-in-time (JIT) inventory systems is largely credited to
Japanese manufacturers. Today they are used by manufacturers worldwide. Manu-
facturers attempt to cut costs by holding minimal inventories. Instead, inventories
are maintained by the suppliers, who deliver the products to the assembly line just
as they are needed. The system can work only if the suppliers and factories are
linked electronicallyoften there is only a one- or two-hour delay between order-
ing and delivery.
Suppliers are often involved in the design phase. Their knowledge is useful in
identifying supply availability, costs, and substitutability of components. Some-
times, it is diffcult to locate suppliers for equipment. Computer networks such as
IndustryNet help frms connect with potential suppliers and identify equipment,
parts, and prices.
Marketing
A well-known application of IT to improve marketing is the use of frequent-buyer
databases that identify major customers. More traditional point-of-sale transaction
systems can be leveraged by identifying preferences and rapidly spotting patterns
or trends. At the tactical level, expert systems are used to help analyze data and
perform statistical trend analysis. Geographic information systems are being used
by leading frms to identify patterns and possibilities for new sales. Information
systems can also be used to link frms more closely to external marketing frms for
research data, communication, and development of promotional materials.
Multimedia tools are being used by leading frms to develop initial ideas for
advertising and promotional campaigns. Companies such as General Motors are
also using video tools and computer dissemination of video to link customers and
marketing departments closer to the design team.
Social networking is an increasingly important marketing channel in many
frms. If nothing else, it is important to monitor the Web for comments about your
companyboth to gain information and to help stop bad comments as quickly as
possible. Finding ways to gather, evaluate, and leverage consumer information is
critical to success in marketing.
Reality Bytes: Artists Without Labels
Information technology has made huge leaps in the past few decades and companies
have spent billions of dollars on hardware, software, and personnel. But, do compa-
nies actually gain anything from all this technology? This question is challenging to
answer because of the complexity of companies and technology. One answer comes
from the MIT Center for Digital Business that worked with McKinsey & Co to sur-
vey 330 U.S. public companies. An important conclusion of the study was that com-
panies that used data and analytical tools to make decisions (instead of guesswork)
had four percent higher productivity and six percent higher profts than the average.
Another interesting result is that many frms are not using the technology as much as
they could be.
Adapted from Andrew McAfee and Erik Brynjolfsson, What Makes a Company
Good at IT? The Wall Street Journal, April 25, 2011.
675 Chapter 10: Strategic Analysis
Technology Toolbox: Locating Customers with a GIS
Problem: You need to identify locations and characteristics of your customers.
Tools: A geographic information system (GIS) helps you analyze and display re-
lationships based on location. ESRIs ArcInfo and Microsofts MapPoint are two
leading products for
displaying overlays
of geographical in-
formation. ArcInfo
is relatively expen-
sive, but is widely
used for large proj-
ects. MapPoint is
not included with
Offce, but is afford-
able and demon-
stration copies are
available. GIS soft-
ware is designed to
display basic maps,
showing boundar-
ies and major infra-
structure items such
as roads and rivers. You can choose the level of detail you want to see by zooming
in or out. The critical feature of a GIS is the ability to display geo-coded data. Data
is usually displayed using shading or different circles or other icons. You can also
overlay pie or bar charts in each location, but you need to keep the number of charts
relatively low to remain readable.
To further refne your strategies, you can add your own data, such as sales, facto-
ries, or competitor locations. Advanced systems also provide optimization routines
that help select distribution routes.
One of the greatest strengths of a GIS is the ability to persuade others. Even if
you already know the general relationships, a map is a powerful tool to convince
executives. Instead of reading through pages of data, they can quickly see the spatial
relationships on the map.
Quick Quiz:
1. How often does the U.s. Census Bureau update its data?
2. Why is location an important element in business decisions?
3. How many location-based pie charts do you think could be placed on a map?
676 Chapter 10: Strategic Analysis
Sales and Order Management
Sales and order management are often handled simply as an operations or transac-
tion-processing area. However, in the last 10 years, several frms have used tech-
nology to gain a competitive advantage by improving the way they handle sales
and orders. Frito-Lays use of handheld computers is a classic example. The sys-
tems enable managers to more closely track their own sales, sales of competitors,
and other external factors, because salespeople can enter data immediately. For
certain industries, the concept can be extended further to installing workstations
at the customer sites that tap into your central databases. Federal Express and
Baxter Healthcare both used this technology to gain a leadership position.
Leading frms are also using expert systems to assist customers in choosing the
products and options that best match their needs. These systems assist order takers
and improve sales by matching customer needs. Expert systems are similarly used
to improve confguration and shipping.
Workgroup technologies, e-mail, and expert systems all combine to give more
power to the frontline workers dealing directly with customers. Resolving prob-
lems and meeting customer needs faster improve customer satisfaction and cut
costs.
Service
Service industries and service-based processes (like accounting, MIS, and law)
have their own problems and opportunities. Technology is used to support ser-
vices with on-site, portable computers. These systems enable workers to have
complete access to information almost anywhere in the world. Leading companies
are building specialized databases to support their service workers, such as the
answer line databases that support General Electric and Whirlpool customer
service representatives.
Systems are built that monitor locations of service personnel, enabling frms
to identify the closest workers to problems and to fne-tune schedules through-
out the day. Complex products are increasingly being sold with internal diagnos-
tic systems that automatically notify service departments. Similarly, companies
are cutting costs and reducing repair time by building expert systems to diagnose
problems.
Management
One of the more dramatic IT support mechanisms for management is an execu-
tive information system. Giving top managers better access to data allows them
to identify and correct problems faster. More sophisticated models can be built to
examine alternativesespecially to analyze the potential reactions of rivals in a
competitive situation.
Larger frms are building electronic links to their strategic partners, for in-
stance, by providing electronic access to corporate data to accounting and legal
frms. These links enable the external partners to keep a closer eye on the frm,
speeding the identifcation of problems and assisting them in spotting broad pat-
terns and opportunities.
Executives are also increasingly turning to electronic conferencing tools and
workgroup software, even e-mail. Executives can cover more areas and deal with
more people with these systems than they can by phone or through face-to-face
contact. Some studies have shown that, in traditional conversations, managers
spend as much as 50 percent of the time on personal chitchat. Electronic systems
677 Chapter 10: Strategic Analysis
(although they might be less personal) tend to be more effcient. On the other
hand, some companies have been restricting employee access to electronic net-
works (especially the Internet) because they waste too much time on personal
communications.
Another approach taken by management is the move toward standardization:
the effort to make all jobs similar, routine, and interchangeable. By reducing jobs
to their most basic level, they become easier to control and easier to support or
replace with information technology. Franchises make good use of this concept.
At the same time, management jobs in some companies are being reformulated as
teams of knowledge workers. In the past, managers worked on fxed tasks within
the corporate hierarchy. Today, you are more likely to be hired for your specifc
skills and knowledge. As the needs of the company change, you will work with
different teams at solving problems and creating new products and services. Per-
sonal computers and client-server technologies are often used to support these
management teams. Instead of relying on one central computing facility, each
team has its own set of resources, which are shared over networks throughout the
company.
Strategy
Skills & Resources
Required
Organizational
Requirements Risks
Diferentiation Strongmarketing.
Productengineering.
Basicresearchskills.
Distributionchannel
acceptance and
cooperation.
Internal
coordination, R&D,
production, and
marketing.
Incentivesfor
innovation.
Resourcestoattract
creative and skilled
labor.
Competitors
imitate.
Customersdonot
acceptdiferences.
Costistoohigh.
Cost Leadership Continuedcapital
investment.
Processengineering.
Continuousquality
improvement.
Tightsupervisionof
laborandcosts.
Productsdesignedfor
low-costproduction.
Low-costdistribution.
Tightcostcontrol.
Frequent,detailed
costreports.
Highlystructured
organization.
Incentivesbased
onquantitative
measures.
Competitors
imitate.
Technology
changes.
Loseproduction
or distribution
advantage.
Customer-Supplier
Links
Infuencewith
partners.
Communiation
channels.
Standardsor
agreements.
Flexibility
to respond to
customers.
Serviceculture.
Abilitytoadaptto
emergencies.
Securitythreats.
Changingstandars.
Competitorscopy
withmorelinks.
Figure 10.12
Implementing strategy can be diffcult, costly, and time consuming. Firms generally
choose one primary strategy and then build the resources and shape the organization
to best support that strategy.
678 Chapter 10: Strategic Analysis
Costs and Dangers of Strategies
Why is it so diffcult to convince management to make strate-
gic changes? What are the risks of strategic decisions? Strategic
uses of information systems can be seductive. There are many interesting cases
in which companies have created innovative information systems. Inventing stra-
tegic alternatives requires a considerable amount of creativity. It is easy to get
caught up in the excitement of designing new approaches and to forget about the
risks. Evaluation of any project requires weighing the risks against the potential
gains. Although it is often diffcult to measure the potential gains and risks, it
is important to consider all consequences. By their nature, strategic changes can
alter the entire course of the frm. Figure 10.12 summarizes the skills, organiza-
tional effects, and risks involved with several strategies.
Robert Morison and Kirtland Mead (A Hard Look at Strategic Systems 1989)
pointed out that it is easy to misinterpret the various classic cases regarding stra-
tegic use of technology. For example, in many cases, the true strategy does not
lie in the computer system; instead, the gains came from changing the way the
business operates. For instance, the gains experienced by American Hospital
Supply (Baxter Healthcare) came about because they improved the way their
customers (hospitals) handled supplies and inventory. The computer system facili-
tated this change but was not necessarily responsible for it. In other words, rather
than search for a killer strategic computer system, it is wiser to identify ways to
improve the overall business, then ask how technology will support that change.
High Capital Costs
One of the important considerations in strategic analysis is the cost. Strategic
changes often involve implementing new technology before any of your competi-
tors. Yet new technology tends to carry high costs. Manufacturers of technology
may not have reached economies of scale, and they might have monopoly power
over prices through patent rights. Furthermore the IS teams will have less experi-
ence with the technology, so it will take longer to implement and may result in
Money for research
Money for IT
Figure 10.13
Dangers of strategy. When developing and choosing strategies, you must always
remember that innovations can be risky and often carry high capital costs. Although
it may be exciting to spend millions of dollars on technology, it can destroy the frm
if you do not have enough resources to support research and operations.
679 Chapter 10: Strategic Analysis
missteps and require additional testing. For instance, Morison and Mead (1989)
report that it took six years and $350 million before American Airlines Sa-
bre travel agency reservation system started paying off. As Figure 10.13 implies,
these costs might take away money from other projects.
It can be diffcult to estimate the cost of major projects, especially when they
involve new technologies. There are many examples of MIS projects going over
budget and beyond deadlines. Moreover, strategic projects often require major
capital outlays up front, but increased revenues do not appear until much later.
A big question with new technology is trying to decide when it should be im-
plemented. There is an inherent confict. If you offer an innovative service from
the technology before your competitors, you can gain a competitive advantage.
However, if you wait, the costs will be lower. In making this decision, you will
also have to guess what action your competitors will take.
When the Competition Follows
Another diffculty with strategic systems is that much of the advantage comes
from creating a service that is not offered by your rivals. Once you introduce the
service, your rivals will watch the customer response closely. If the customers
begin to switch to your frm, your rivals will undoubtedly create a system to offer
the same services. At that point, you lose most of the competitive advantage. Even
worse, you might end up with an escalating war of technology. Although the
competition is good for the customer, the increased expenditures can cause prob-
lems for the company if the ideas do not work as well as you expected. In this as-
pect, strategy is similar to chess: you must plan for multiple moves ahead of time.
The gains to technology occur from when you frst implement the strategy to
the point that your rivals follow. For example, almost all of the major overnight
delivery services now provide the ability to track shipments. If the system is
easy to create, you may not gain much. However, it is likely that customers who
switched to your frm will stay, so you can gain a larger share of the market.
On the other hand, if your strategic ideas do not pay off, your rivals will gain,
because you will likely lose most of the money invested in the project. Some frms
use this tactic to great advantage, by using a fast-follower strategy. They allow
smaller frms to take the risk and experiment with new technologies. If the project
succeeds, the large frm steps in with more money and more clout and creates its
own, improved version. About the only risk it takes is that the smaller frm might
become successful enough to grab a serious share of the market. But, if the large
frm is big enough, it can often buy out the smaller rival and integrate the technol-
ogy with minimal risk.
Changing Industry
An intriguing problem that can arise is that even if your strategic project suc-
ceeds, the company might lose because your project has changed the industry.
Consider an insurance company that sells software to companies to allow them
to track insurance deductions and payments to workers. The insurance company
decides that it can add a program to compute payroll, so the companies could drop
their existing payroll software. These features appear to give the company an edge
over its rivals in the insurance industry. The problem is that there are many more
companies that create payroll software, and one of them is an 800-pound gorilla
(ADP). It is relatively easy for these payroll companies to add insurance capabili-
ties to their existing software. The actions of the insurance company encourage
680 Chapter 10: Strategic Analysis
the payroll software frms to move into the insurance market. As illustrated in
Figure 10.14, the insurance company suddenly has hundreds of new competitors
and could lose customers.
Sharing Data
One common technique in strategic systems is to share your data with customers
and suppliers. Two questions arise from this situation. First, do you really want
suppliers and customers to have access to the data? Second, can you control their
access to protect other data? Security and control issues are examined in detail
in Chapter 5. The main point to think about here is what might happen as your
customers gain access to your data. The process of protecting the rest of your data
becomes more complex. Consider the situation of a supplier to General Motors.
To save costs and improve communications, GM wants you to connect your com-
puter to the GM factory computers. GM intends to use the links to place orders,
monitor quality data, and track shipments. Are you willing to give GM access
to your computer? Can you control the information that the large corporation is
allowed to see? Maybe when checking on their orders, GM will also be able to
determine how much you are producing for other companies. Or maybe GM will
gain access to your supplier lists and raw material prices. Even if the GM manag-
ers are ethical and do not reveal this data to anyone else, you still might worry.
What happens when you have to negotiate prices with GM the next time? If the
corporation has access to your data, you might be concerned that it could infu-
ence the negotiations. Figure 10.15 illustrates the need for security systems that
will enable you to control the access to your data.
Figure 10.14
Changing industry and government intervention. A complication with strategy is that
it might alter the industry. A frm in Industry 1 might use IT to attract customers from
a different industry. Because of this expansion, the frm gains new competitors (from
Industry 2). While competition is often benefcial, you must thoroughly analyze the
effect of the new competition before embarking on changing the industry. In a related
manner, sometimes changes in government regulations alter relationships between
industries, as in the telephone and cable TV markets.
Industry 1
(expands into
industry 2)
Industry 2
(new
competitor)
Customer
Customer
Customer
Customer
Customer
Customer
Customer
Customer
New technology
New services
Same technology
681 Chapter 10: Strategic Analysis
Government Intervention
You have to be careful when considering strategic maneuvers. Many potential
strategies violate antitrust laws. For example, many barriers to entry are illegal,
as is price discrimination. In fact, attempts to monopolize a market are forbidden
by the Sherman Antitrust Act. Price fxing and other forms of collusion are also
outlawed. Information system agreements between competitors could be scruti-
nized by the Justice Department or the Federal Trade Commission. More recently,
the European Union has become a major player in evaluating mergers and anti-
trust complaints. Even if a company is largely based in the U.S., major sales in the
European Union can make the company subject to European rules and procedures.
If government agents choose strict interpretations of the laws, it could compli-
cate many information system issues. For instance, frms might be discouraged
from forming consortiums that defne standards. Agreements to share disaster
backup facilities might be outlawed. Computer links to customers might be seen
as limiting competition. So far, the U.S. agencies have allowed all of these ac-
tivities to proceed without interference. However, there is always the chance that
other nations or different political administrations will view the issues differently.
From the 1980s through the 2000s, the government was relatively lenient
about antitrust issues, including those regarding information systems. However,
one interesting case arose with the airline reservation systems. For many years,
American Airlines and United Airlines had the leading reservation systems.
Other airlines could list fights on the systems, but they had to pay money for each
ticket sold through the system. A confict eventually arose because the airlines
Production Firm
Data to be shared. Data to be protected.
Hackers
or competitors
rejected
External
rewall
Internal
rewall
Web
servers
Internet
router
Figure 10.15
Security complications. Improving communication and sharing data are common
themes in using technology for competitive advantage. This need to share data with
outsiders makes it more diffcult to protect your internal data. Some data you will
want to share; other data must be kept secret. Security systems can provide some
protections, but the more outsiders who are involved, the more diffcult it is to
provide adequate security.
682 Chapter 10: Strategic Analysis
that created the system programmed it to list their fights frst. Flights from other
airlines were often listed on separate screens, so travel agents and customers were
encouraged to choose fights from the airline that built the system. Although this
mechanism did not directly violate antitrust laws, Congress decided to pass a new
law, making the practice illegal. Lawmakers decided that as long as the other air-
lines had to pay for access to the system, everyone should have an equal chance
at being listed frst. The point is that even though the initial action was not illegal,
Congress has the ability to pass new laws and remove the advantages, so you can-
not assume that the benefts will last.
Te Role of Economics
Why did so many dot-com frms fail? Do their failures mean
there is no viable Internet strategy? The main lesson from the failures
of the early dot-com frms in 2000 and 2001 is that no matter what anyone tries
to tell you, to succeed in business, you must make a proft on operations. The
second lesson is that it takes time to acquire loyal customerslonger if you want
to change the world. Many of the early e-commerce managers felt that to become
the dominant player, they had to be the frst and biggest frm. So their primary
strategy was to sell products below cost and spend huge amounts of money on
national advertising. The advertising was successful at attracting investors, whose
cash kept the frms alive for a year or so. But when the sales failed to generate
profts, there was no way to keep the companies running.
The advertising strategy also created an interesting domino effect in the ear-
ly industry. By pushing the importance of name recognition (and a good domain
name), many of the early frms were able to survive by attracting advertising mon-
ey from other frms. For example, Excite was a leading Web-portal frm. With its
easy name and relatively popular search engine, many people used the site on a
regular basis. Based on the number of people visiting the site (known as eyeballs),
Excite was able to sell advertising space on its pages to other Web frms. Over 80
percent of Excites revenue came from advertising. As the other frms in the indus-
try fell apart, they stopped their advertising spending and Excites revenue plum-
meted. Many other frms faced the same problem, and the chain reaction caused
hundreds of frms to fail.
Clearly, Web sales and Web advertising are here to stay. Many frms make mon-
ey from sales of products, services, and advertising. Yet, many frms still face dif-
Reality Bytes: Borders Battles for Life
Borders Group is the second largest bookstore chain in America, behind Barnes and
Noble; and not counting Amazon. The switch from print books to digital caught Bor-
ders fat-footed. The company was late to the digital marketplace. Borders purchased
a stake in Kobo Inc., a Canadian e-book retailer, and launched an online bookstore
in mid-2010. Albert Greco, a researcher of the book industry estimated that in 2009
Borders had a 10 percent share of the retail book market. Borders said that it hoped
to control about 17 percent of the e-book market by mid-2011. In early 2011, Bor-
ders began closing many of its retail stores.
Adapted from Jeffrey A. Trachtenberg, Borders Group Launches e-Book Store,
The Wall Street Journal, July 7, 2010.
683 Chapter 10: Strategic Analysis
fcult decisions about how to draw those lines. The newspaper industry is one that
is facing diffcult questions. In the early days, many magazines and newspapers
attempted to charge for access to their sites. Gradually, most of them dropped sub-
scriptions and relied on advertising revenue as well as sales of traditional paper-
based versions. A notable exception was The Wall Street Journal which focused
on creating quality content for a feeeven online. But, as print subscriptions
dwindled, newspapers began creating pay walls where people had to subscribe
to see content online. The situation is an interesting strategic problemwhich
could mean life or death for many companies. The challenge is that to sell online
advertising, the sites need to attract a large number of unique visitors. But, charg-
ing for content has the potential to drive away readers who will be inclined to fnd
free resources. So, a newspaper would lose money from advertising and not gain
much money through subscriptions. Yet, if print subscriptions and print advertis-
ing continue to dwindle, how can a newspaper cover its costs?
Television and radio stations have been able to survive on the basis of advertis-
ing revenue. Some Web sites (notably Google), became wealthy through advertis-
ing. But, is there room for thousands or millions of sites to succeed based solely
on advertising?
The strategic options in e-business are increasing as new tools are created,
wireless capabilities improve, and people begin to adopt connectivity as a way of
life. At this point, there is no single answer, which makes it even more important
that you carefully defne your goals, analyze the profts, evaluate your competi-
tion, and build a creative business plan.
Challenges of Strategy
How do you convince an organization to change strategies? This
question is probably the most diffcult question any upper-level manager will face.
Even when you join an organization in an entry-level management position, you
will quickly see the challenges presented to new ideas. Most people and almost
all organizations resist change. Organizations develop a method of operating that
works. It might not be the perfect answer, but it was developed over many years
and hardened through experience and competition. The method must have been
reasonably successful or the company would not have survived. But, is it the right
strategy for the future? And, if you think you have a new strategy, how will you
convince people to adopt it. Keep in mind that new strategies cost money and
an organization usually faces multiple options for strategies. How can you prove
your ideas have merit and will work? The challenge is even higher if the risk of
failure is a large loss or a loss in market share.
Information technology solutions can be even harder to sell to top manage-
ment. Few managers truly understand technology. Most have experienced prob-
lems with technology failuresparticularly leading edge technologies. Most large
companies have encountered the delays and frustrations of trying to develop and
implement new technologies. Managers have become cautious about being the
frst organization to try new technologies. Managers also know that the price of
new technology is often high and tends to decline rapidly. Being the frst person to
adopt new hardware usually means that you are paying more money than anyone
else. Consequently, many people choose to wait and see which technologies will
succeed and wait for the price to drop to levels that reduce the risk.
684 Chapter 10: Strategic Analysis
Technology Toolbox: Analyzing Businesses
Problem: You are presented with a business problem to solve.
Tools: You need an analytical methodology to evaluate the problem, focus on the
causes, and identify appropriate solutions. If the situation is based on business pro-
cesses, you can use the data fow diagram techniques to show how the frm is orga-
nized and how data is supposed to move. Because it is a graphical approach, it is
good for spotting the cause of problems and for communicating relationships to oth-
ers. You can also adapt database and object-oriented tools to help you understand de-
sign details for data-intensive problems. Ultimately, every manager needs to develop
a methodology for approaching business problems and cases. When you encounter a
new situation, where do you start?
Foundation Business Plan Expectations
Solve the right problem
Choose the right tools
Divide the system
Make a decision
Considertheconsequences
Detail the implementation
Problem description
Statefactsandproblems.
Identify most important problems
andcauses.
Plan
Describethenewsystem.
Detailhowtoimplementtheplan.
Provideacontingencyplan.
Advantages
Show how your plan will solve the
problems.
List additional advantages and
strategicefects.
Measurable goals
Financial implications
Efect on human resources
Strategic efects
Critical success factors
Potential risks
The important frst step is to solve the right problem. Most businesses encounter
multiple problems. Often, you see only the symptoms, and you need to trace back
to the cause. This work requires detective and diagnostic skillswhich are usually
acquired through experience with cases and real-world problems. Once you have
identifed the root problems, you have to choose the correct tools. There is an old
saying: When all you have is a hammer, everything looks like a nail. Make sure you
examine all of the available tools before pounding away.
A good starting point for developing a structure is the old debating approach:
problem description, plan, and advantages. Use the problem description to identi-
fy the most important problems and the cause of the problems. This section must
clearly communicate the need for a change. The plan itself must be detailed and as
specifc as possible. You should include implementation issues, costs, and alterna-
tives or contingency plans. Be sure to include a section that explains how your plan
is going to solve the problems you identifed.
Your analysis needs to identify any measurable goals and fnancial implications.
If the goal is to reduce costs or save time, quantify those numbers. Consider the ef-
fects on human resources. Will the technology reduce the number of employees?
Will you retrain employees, or need to hire more within the MIS department? What
are the critical success factors for the frm and the project? What are potential risks
of the project? Such as cost, alienation of employees or customres. Identifying these
risks up front makes it easier to fnd ways to mitigate them later.
Quick Quiz:
1. Why is practice so important in learning to diagnose business problems? Where
will you get this practice?
2. Where do you place the expectation elements in the business plan?
3. How is the problem description different for a business case compared with an
actual business problem?
685 Chapter 10: Strategic Analysis
Sustainability
Remember that to be successful a strategy needs to create a barrier to entry. If you
spend large amounts of money on new technology to gain market share, you need
to be able to sustain an increase in profts for a long enough time to recover your
costs. As shown in Figure 10.16, if you spend the money and your rivals imme-
diately follow, everyone ends up with higher costs and no additional profts. This
argument has been made many times over the years as a reason to avoid strategies
involving technology. It can be diffcult to determine if the argument is legitimate
or if it is merely an excuse to avoid change.
Nicholas Carr explored these ideas in an article in the Harvard Business Re-
view in April 2003, claiming that IT no longer has a strategic beneft. The thrust
of the argument is that technology prices have declined so far that IT no longer
provides a barrier to entry. Any frm can almost instantly copy anything you do.
Any short-term advantage you might gain from technology is not sustainable. In
fact, most information technologies today can be purchased as services from vari-
ous frms. Since the computing hardware and software are readily available to
any organization, it will be diffcult or impossible to use it to gain a competitive
advantage.
Many aspects of this argument are true. Rarely is the information technology
the source of a competitive advantage. Instead, the benefts arise from how an or-
ganization applies the technology to solve problems and improve the management
and decision making of the frm. The use and application of technology depends
heavily on the people and management of the organization. As a weak analogy,
you could give guitars to 1,000 people, but only a few of them would ever become
$
time
Technology cost
$
time
Technology cost
Additional prots
Additional prots
Technology creates
barriers or switching costs
so you gain prots.
Anyone can copy your
strategy and competitors
atract customers.
Figure 10.16
Sustainability. If technology does not enable you to keep customers and profts, rivals
will follow and you will not earn enough money to pay for the technology cost.
686 Chapter 10: Strategic Analysis
profcient musicians and only a couple would be able to form a successful band.
Hardware and software are not enough to provide a competitive advantage. You
need an organization that has the knowledge and willingness to change and use
the new technologies to alter the way it operates.
Examine the classic cases in detail and you will see that the gains arose from
the way the technology was applied. American Hospital Supply/Baxter Healthcare
used the technology to provide better information and lock in customers. Merrill-
Lynch and FedEx used the technology to create new products and services. Amer-
ican Airlines used its giant databases to provide knowledge to make better pricing
decisions. Even if you can copy the hardware and most of the software, can your
organization achieve the same benefts?
Consider groupware as a relatively new technology. Any organization can in-
stall SharePoint servers at minimal cost in terms of hardware and software. Yet,
even today, ten years after the introduction of the technology, how many have
done so? How many are effectively using the technology? And, how many have
altered their operations to take advantage of the communication and teamwork
features to reduce costs, fnd new solutions to problems, and add fexibility to
the organization? The technology is defnitely important, but ultimately it is the
management and workers in the frm that must adopt the technology to alter the
operations and gain the full benefts.
Leader or Follower
Another often-debated aspect of strategy is the importance of the frst-mover ad-
vantage. The concept comes from game theory, which is often used to study ri-
valry. In some situations, the organization that adopts a strategy or technology frst
will be seen as the leader and will acquire customers who will then be reluctant to
switch back. Even after a competitor adopts the same technology, the customers
will stay with the frst frm. The frst mover might also gain a reputation for being
innovative, which might attract additional customers. Ultimately, the frst-mover
Reality Bytes: USA Today: What is a Paper?
USA Today was one of the frst national newspaperscertainly the frst to target
general news, and to use color. At one point, it had the largest newspaper circulation
in America. By 2010, the company hit serious problems. The biggest two: Circula-
tion was plummeting and advertising revenue had collapsed. On fnally recognizing
the shift in the way people obtain news, the paper began downsizing, eliminating 130
jobs (9 percent of its employees), and shifting its focus away from the printed edi-
tion. The goal was to create an organization that could deliver news through the Web
site and react quickly to changing preferences. Over time, USA Today had become
stale. The environment changed to online, instant access to news, entertainment, and
sports; but USA Today had made few changes. The company was fnally beginning
to understand the need for change. But, the task is arduous. Craig A. Huber, an ana-
lyst at research frm Access 342 noted that I dont blame them for tinkering with
the model, but everybody has been trying to do that. They have to restructure. They
dont have a choice in this quickly evolving media landscape.
Adapted from Jeremy W. Peters, USA Today to Remake Itself to Stress Digital Op-
erations, The New York Times, August 27, 2010.
687 Chapter 10: Strategic Analysis
advantage depends on the customers and the nature of the innovation and the in-
dustry. If the technology increases the switching costs, then the value of being the
frst frm to adopt a technology is higher. With each strategic idea, you will face
arguments over the potential strength of being the frst adopter.
The issue of being a leader or a follower is critical with information technol-
ogybecause the costs will drop over time. As shown in Figure 10.17, if you
choose to wait, you lose the frst-mover advantage, but costs decrease the longer
you wait. Additionally, any technology strategy carries risks. By waiting, you can
let some other frm take the risk, while you wait to see if customers actually care
about the new services or options available. Remember that at any point in time,
you have a choice of several technologies. It is diffcult to guess which technology
will succeed and become a standard.
Many times you face this same decision as a consumer. Look at television and
cell phone technologies. If you adopted HDTV, 3D, or 4G cell phones early then
you paid a relatively high price for the technology. Plus, content and access were
limited because most people had not yet switched. If you can manage to wait a
year or two, prices inevitably drop (or weak technologies disappear), and you can
save money by not being the leading adopter. Fortunately, consumers do not have
to worry about making money or beating other consumers with these technolo-
gies, so the decision is quite a bit easier for them than it is for businesses.
time
$
Technology Costs
Leader Follower
Leader Follower
Lock in customers
Reputation
Lock in technologies
Experience
Lead for next step
Reduced risk standards
Lower cost
Supplier experience
Figure 10.17
Leader or follower. Technology costs decline over time, so leaders pay a higher
price for technology. In good situations, the leader gets to lock in customers, build
a reputation, and gain experience. It is also primed for the next step. The follower
reduces risk by picking the technologies that survive and paying a lower cost for
hardware and experienced suppliers.
688 Chapter 10: Strategic Analysis
Large frms can be reluctant to be leaders. Their size makes it diffcult to change
operating procedures, and tends to add bureaucracy that delays making decisions.
It is often easier to watch small competitors and let them adopt a technology frst.
Even if a small competitor is successful, the risk is minimal because the num-
ber of customers affected will be small. Once a technology is seen as useful and
the prices drop, the big frm can use its size to purchase the technology, fx any
perceived problems, and generate a marketing campaign to sell the new services
to the rest of the world. Because it is diffcult to patent the use of information
technology, this approach is generally legal; and most customers will never know
about the original small frms that tested the technologies. In some extreme cases,
large companies have spun off smaller frms to test experimental technologies.
In other words, if you cannot fnd a smaller frm to do the testing, you can create
your own small frm to test a technology. Companies with many small stores, such
as franchises, often adopt a similar approach by selecting one or two stores to test
new products and services on a small scale.
Choosing to be a leader or follower in information technology is one of the big-
gest strategic decisions an organization must make. The choice does not have to
be all-or-nothing. It can be applied differently to various divisions or even types
of technologies. Also, the decision needs to be revisited periodically to correct for
changes in technology, the business environment, and the competition.
Change Agents
Organizations need rules and methodologies to function. Basic day-to-day deci-
sions need to be handled at the customer and operations level. Without rules and
procedures, all decisions would flter back to the top levels of the organization and
it would take forever to get anything done. But the drawback to rules and proce-
dures is that everyone is reluctant to change them. The larger the change, the more
diffcult it will be to get it accepted and implemented. More importantly, organiza-
tional change does not happen by itself. Change agents are people or events that
cause an organization to reevaluate its rules and procedures. When a person is the
change agent, that person often becomes the champion for the new ideas. How-
ever, change agents are rarely appointed and tend to gain prominence by random
chance. In theory, you could appoint someone to be a change agentcontinually
searching for new ideas and technologies and bringing them to the attention of ev-
eryone else. But, it would likely be a frustrating job, and the person would likely
get blamed for a lot of problems. On the other hand, some people like to try new
products and new ideas, and other people naturally turn to them for advice and
recommendations. These people are often natural change agentssimply by pro-
viding information and experience to others.
Economic events can be natural change agents. Many of the classic cases were
driven by economic changes. These changes opened the way for new business op-
portunities and made it possible for frms to expand or move into new areas. For
example, Merrill-Lynch altered the entire world of banking by using technology
to offer a new type of account to customers. But, this account was wildly adopted
because of the unprecedented high interest rates and the government restrictions
imposed on commercial banks. Merrill-Lynch had the technology and the man-
agement insight to take advantage of these changes. Similarly, American Airlines
was driven to adopt yield pricing by the emergence of People Express as a new
competitorbecause of the relaxation of government regulation in the airline in-
dustry. American Airlines had the technology and data in place for several years,
but felt no need to adopt it until pressured by this external change agent.
689 Chapter 10: Strategic Analysis
As shown in Figure 10.18, most large organizations tend to resist change, caus-
ing them to adopt ideas and technologies in lumps. This approach might be useful
because it minimizes day-to-day disruptions. However, it tends to make the frm
a follower instead of a leader, and the changes that are eventually implemented
might be more disruptive than necessary. Yet, few frms have the fexibility to
make continuous changes. On the other hand, continual evaluation and adjustment
are hallmarks of managing for quality. In these organizations, change and inno-
vation are encouraged and rewarded. Each approach has its strengths and weak-
nesses, and again, the choice of how to identify and adopt change is a strategic
management decision. Just be sure that you consciously adopt the strategy, and
not fall into a choice by inaction.
Cloud Computing
Can cloud computing provide strategic advantages? In many
ways, cloud computing is an indicator that many aspects of information technol-
ogy have limited power as a strategic tool. One goal of cloud computing is to
reduce fxed costs and to make it easier for more frms to implement the same
technologies. When even small companies can implement the same technologies
as large companies, it is going to be diffcult to use it for a competitive advantage.
This statement does not mean that technology is unnecessary. On one level, it
means that frms have to at least experiment with every possible technology to see
how it might create a competitive advantage. On a broader level, frms can still
time
time
Change agent intervention
Change agent can be person
or event (economic) that
convices organization to
change its policies.
Continuous change where
everyone is encouraged to
contribute new ideas making
many small changes over time.
Figure 10.18
Change agent. Most organizations resist change and alter procedures in jumps when a
change agent forces them to. Some organizations encourage employees to contribute
new ideas and adopt change regularly, leading to continuous improvement through
small changes.
690 Chapter 10: Strategic Analysis
gain some benefts to technology if the workers and managers are better at apply-
ing it to solve problems in unique or more effcient methods.
These concepts echo many of the fundamental ideas of strategy. Simply adopt-
ing a specifc technology rarely provides a competitive advantage. Instead, frms
need to fnd a concept or new way of doing business. Technology provides the
means to create these new methods or concepts. And it requires management cre-
ativity to fnd and effciently apply these solutions.
On the other hand, powerful technology available at low costs and with a global
reach enables frms to experiment and innovate at low costs. Firms that emphasize
creativity and design could use the cloud computing technologies to continually
adapt and lead the way with new products and services. In particular, services can
be tailored to ever-changing regions. Yes, other frms could follow, but by then
the leader will have moved on to something new. In a sense, creativity becomes a
competitive tool that can be amplifed with information technology.
Summary
Information systems can provide benefts beyond traditional cost saving. Com-
petitive advantages can be gained by creating barriers to entry and gaining control
over distribution channels. Using information systems to build ties to suppliers
and customers can provide lower costs and better quality products. Computer sys-
tems also provide incentives for customers to remain with your company if they
incur costs of learning new systems and transferring data when switching to a
competitor. Information systems can also be used to differentiate your products
from the others in the marketplace. Similarly, innovative services offered with the
help of technology can entice customers and expand your market.
You can search for competitive advantages by examining Porters external
forces of rivals, customers, suppliers, substitute products, and new entrants. You
can also search for strategies in research, engineering, and design. In manufactur-
ing, you can look for ways to decrease costs and improve logistics. In marketing,
potential gains can be found in better understanding of customer wants, as well as
sales and order management. Services can be supported through better informa-
tion fows and workgroup products. Management can be helped with better data
and better decision tools. The government also strongly affects organizations and
strategy, but fnding IT interactions with the government is relatively diffcult.
Strategic systems face many risks. They tend to be expensive and diffcult to
create. Any gains created may disappear when competitors pick up the technol-
ogy and imitate your offerings. In addition, making strategic changes to your frm
might alter the industry, which might adversely affect your frm. And if these
problems are not enough to discourage you, remember that attempts to monopo-
lize a market are illegal, so you have to make sure that your plans do not violate
governmental regulations.
691 Chapter 10: Strategic Analysis
Key Words
Web Site References
Management Consulting
Accenture www.accenture.com
Bain & Company www.bain.com
Boston Consulting Group www.bcg.com
Booz Allen & Hamilton www.bah.com
Deloitte Consulting www.deloitte.com
McKinsey & Company www.mckinsey.com
Review Questions
1. If an industry has four large frms versus a thousand small frms, is it easier
or harder to create strategies?
2. Why is strategy so dependent on external agents?
3. What are the risks and costs of strategic implementations?
4. For a large manufacturing frm, who are the customers? How many different
types of customers can there be?
5. Why are barriers to entry important to gain a competitive advantage?
6. How does control over distribution channels give a frm a competitive
advantage?
A Managers View
With increased competition, every manager is being asked to identify ways
to improve the company and fnd an advantage over the rivals. Gaining a
competitive edge is not easy. Examining the entire value chain is a useful
place to start. Information systems can provide data and evaluate models to
help you identify strategic applications. Information systems can also pro-
vide direct advantages by creating a barrier to entry, gaining control over
distribution, cutting costs, improving quality, and improving ties between
suppliers and customers. Choosing an effective strategy is a critical task
in e-business. Creating a plan and successfully implementing it are critical
steps in strategy.
antitrust laws
barriers to entry
change agents
distribution channels
external agents
frst mover
Five Forces model
mass customization
product differentiation
rivals
statistical quality control (SQC)
switching costs
total quality management (TQM)
value chain
692 Chapter 10: Strategic Analysis
7. How can information systems be used to gain control over distribution
channels?
8. What are switching costs, and how can they give a company a competitive
advantage?
9. How can information systems be used to enhance product differentiation and
create new products?
10. What role is played by information systems in improving quality
management?
11. Within management, how can information technology provide a competitive
advantage?
12. How do antitrust laws make the role of IT more important in fnding a
strategy?
13. Is it possible for a cloud computing application to lead to a strategic
advantage?
14. What are change agents and what is their role in the adoption of new
technology?
15. How could social networks be used as a strategic tool by a manufacturer?
Exercises
1. Choose one large frm and read the annual report (www.sec.gov). Identify
the primary strategic directions and which of the main techniques it uses to
gain a competitive advantage.
2. How long can frms maintain an advantage using an information system?
Research one of the classic cases and fnd out how long it took for the
competitors to implement a similar information system (for example,
Merrill Lynch and its Cash Management Account, American Airlines
and the Sabre System, Levi-Strauss and its Levi-Link ordering system, or
Federal Express and its tracking system). Find out when the system was
implemented, identify the competitors, and fnd out when they implemented
similar systems. Did the original company continue to update its strategy?
Collect data on sales and profts for the frms to see whether there were major
changes.
3. Pick an industry. Find two frms in the industryone a technology leader, the
other a follower. Get the fnancial information on those frms for the last fve
years. Find analyst summaries of their operations. Compare the two frms.
Are there differences in fnances, operating methods, or customers?
4. Choose an area of management, such as marketing, manufacturing, or
logistics. Find an example of a frm that you believe is doing a good job
applying IT in this area. Briefy explain how this usage could provide
strategic benefts to the frm.
693 Chapter 10: Strategic Analysis
5. Choose one of the IS techniques to gain a competitive advantage. Identify
a frm (not one of the examples in the chapter) that is using that method.
Briefy describe the fnancial position of the frm and how it is using
information systems.
6. For each of the following frms, identify the primary strategy of the frm
(such as cost, quality, customer links, and so on).
a. Wal-Mart
b. Toyota
c. Apple
d. Kohler
e. Yelp
f. Pfzer
g. Starbucks
h. General Motors
i. Red Bull
7. Has the Internet changed the distribution of songs? In particular, is it easier
or harder for small labels and independent groups to get their music heard
and sold to consumers?
8. Examine the market for tablet computers starting with the Apple iPad.
Identify how the various companies introduced new features and how the
others responded. What did Apple gain by being the frst mover?
9. How could an exercise gym use information technology to gain a competitive
advantage?
Technology Toolbox
10. Using a GIS tool, compare the sales for Rolling Thunder Bicycles against
population and income.
11. Find at least two Web sites or news reports that use Google maps to highlight
geographic information.
12. Create a map with Microsoft MapPoint or Google maps and insert markers
for the headquarters of at least fve companies.
13. Choose a company case at the end of one of the chapters in this book.
Perform an initial business analysis of the company. Focus on identifying
the major problems faced by the company and the cause of those problems.
Identify the primary level of the problem (operations, tactics, or strategies).
14. Select a company in the Fortune 500 (or Global 1000). Get some basic
background information on the company and read its latest annual report.
Using Porters framework, identify its primary rivals and the level of rivalry.
If they exist, identify major customers and suppliers and discuss the sales
methods used by the organization. Discuss any potential competitors or
substitute products that might arise in the near future. Describe any barriers
to entry that might keep them out.
694 Chapter 10: Strategic Analysis
Teamwork
15. Each team member should read through at least two industry cases in the
chapters of this book. Identify whether the frm is a leader or a follower in
terms of strategy and technology. Compare each frms fnancial data to that
of the industry (for example, by sales and number of employees). Combine
the individual analyses and summarize them. Identify any patterns you
might see. For example, do the larger frms tend to be leaders or followers in
technology?
16. Choose a frm that provides reasonable amounts of management information
(such as a local frm or a well-documented public frm). Have each team
member choose one area (research, engineering, marketing, and so on).
Identify the strengths of the frm in the area. Create a short plan to improve
the companys use of IT within that area. Make sure the usage fts with the
overall strategy of the company.
17. Choose an industry. Assign each team member to investigate a level within
the production chain. Each person should identify the tasks that occur at
the specifed level along with the major frms. Identify the rivalry and any
dominant frms at each level. Identify the use of IT at each level and any ties
across levels. Combine the results and briefy discuss where on the chain you
would prefer to enter as a new frm.
18. Choose a large frm (perhaps an automobile manufacturer). Use the annual
report to identify the fnancial condition of the frm. Use the management
letter to identify the basic strategies of the frm. Identify the frms primary
competitors. If possible (try searching MIS magazine Web sites), identify the
technology level used in the company.
19. Research the rivalry and strategies being pursued by Amazon and Barnes
and Noble. Look at market share and service plans and pricing. What are the
short-run and long-run strategies of each company? Is one frm stronger than
the other?
20. Each person should fnd a company that has used innovation (creativity)
successfully. Identify any use of information technology in the process.
Write a short paragraph about the case. Combine the information from all
team members and vote on which company made the best use of information
technology.
Rolling Thunder Database
21. Identify the competition in the industry. Who are existing rivals? Who are
potential rivals? Be sure to defne the industry carefully. Consider using
North American Industrial Classifcation System (NAICS) codes.
22. Perform a value chain analysis of the company. Could they improve profts
by expanding vertically or horizontally? Are there additional products we
should consider offering?
695 Chapter 10: Strategic Analysis
23. The management has the opportunity to purchase a chain of retail bicycle
stores. Evaluate the strategic aspects of this proposed acquisition. What
will be the effect on the information systems? Can the existing information
system be used to improve the operations of the retail stores? What additions
and improvements would be needed?
24. How can the company use social networks to increase ties to customers?
25. Examine the value chain in the bicycle industry. How many levels are there
and which levels are the most proftable?
26. A key element in the bicycle industry is that sales are driven by the
popularity of the sport, which in turn is infuenced by demographics.
Consequently, sales can decline over time or suddenly expand for particular
bicycle models. How can a manufacturer like Rolling Thunder Bicycles
strategically deal with these issues?
27. Use Porters Five Forces model to examine Rolling Thunder Bicycles
relationships and long-term strategic potential.
Additional Reading
Applegate, Lynda M., Robert D. Austin, and F. Warren McFarlan, Corporate
Information Strategy and Management, 2007, McGraw-Hill/Irwin: New
York. [Business strategy in information technology from a Harvard
perspective.]
Melymuka, Kathleen. State Street Banks change in direction required a new
IT approach, Computerworld, February 15, 1999. [Changing strategy with
information technology.]
Morison, Robert E. and Kirtland C. Mead, A Hard Look at Strategic Systems,
Indications, January 1989. [Myths and issues in IT strategy.]
Porter, Michael E. Competitive Advantage: Creating and Sustaining Superior
Performance, New York: Free Press, 1985. [Early discussion of strategy and
competitive advantage.]
Porter, Michael E. Strategy and the Internet, Harvard Business Review, March
2001, Vol. 79 Issue 3.
Strassmann, Paul A. The Squandered Computer: Evaluating the Business
Alignment of Information Technologies, 1997, New Canaan, CT: Information
Economics Press. [A detailed, but controversial discussion of the value of
information technology, with some excellent cases.]
696 Chapter 10: Strategic Analysis
Cases: Te Airline Industry
Te Industry
To understand the state of the airline industry, you have to look at some of the
history. The most important historical issue is that the airline industry was heavily
regulated until 1978. Until then, the civil aeronautics board (CAB) controlled all
of the business aspects of the airlines, including landing rights and fares. Several
large airlines were established and grew during that time. In 1978, the CAB was
disbanded and the airlines were free to select routes and set prices as they chose,
without government oversight. However, the FAA still controls several safety is-
sues, including work rules for fight crews, the number and spacing of fights into
airports, and national fight lanes, as well as several other details.
So, what happened when fights were deregulated? This is a good time for you
to start thinking like an airline executive. Were you making money? Did your pas-
senger mix suddenly change? Are your revenue and costs any different initially?
The simple answer is that initially, very little changed. As an established company,
with procedures and a system that works and makes money, you would not be in-
clined to change anything.
0
5
10
15
20
25
30
35
1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010
B
i
l
l
i
o
n
$
Annual Revenue
American Airlines
Delta Airline
Southwest
Sabre
Travelport Ltd
-0.5
-0.4
-0.3
-0.2
-0.1
0
0.1
0.2
0.3
1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010
R
a
t
i
o
Net Income / Revenue
American Airlines
Delta Airline
Southwest
Sabre
Travelport Ltd
697 Chapter 10: Strategic Analysis
Deregulation and Competition
But, all it took was a little time. A few airlines started offering new fights on high-
demand routes. Then, Donald Burr founded People Express, the airline that scared
every other business manager, starting in 1981. As a no-frills airline (it charged
$3 to check luggage and sold snacks on the plane), the airline charged incredibly
low prices to fy tourists. You no longer had to be in the upper class or funded by
a business to fy. Based out of the unused international terminal in Newark, New
Jersey, the company picked up non-union crews, negotiated with the FAA to fy
with only a pilot and copilot (no fight engineer), and charged fares of a paltry $59
to Chicago or $99 to Londona tiny fraction of the fares charged by the tradi-
tional airlines.
With their substantially higher cost structures, the mainstream airlines could
not compete. So, why did People Express disappear and some of the other airlines
survive? Part of the answer is mismanagementPeople Express tried to grow too
rapidly and did not have a solid management structure in place to handle the prob-
lems. But, a big part of the answer is that American Airlines fought back with
information technology. The company quickly realized that People Express ap-
pealed to tourists who were very price sensitive. Business people stayed away
from the discounter and wanted the amenities and reliable service provided by
the mainstream airlines. So, American Airlines turned to its reservation system
(Sabre) and estimated the number of people on every fight who were business
people. It then came up with the differential pricing system (yield management)
that is still in use today. Business people, those who book a couple of days before
the fight and do not want to stay Saturday night, get charged thousands of dollars.
Tourists, who book early, are offered low fares that compete with the discounters.
The basic premise is that the large airlines want to charge higher prices and fy
business people, but there is no point in fying empty seats, so they discount the
seats until they are all sold. Today, it is likely that almost every passenger on a
fight has paid a different price (McCartney 2003).
Growth of the Discounters
People Express did not have the information systems and could not compete.
The big airlines had wonbut only for a while. They did learn to adopt the hub-
and-spoke system pioneered by People Express. Small feeder fights brought pas-
sengers to a few major airports, where passengers made connections to the next
hub. The cost advantage of the hubs is that at the end of the day, all the planes and
fight crews returned to a hub city. Consequently, maintenance facilities are cen-
tralized into a few key airports instead of scattered around the country. Plus, the
key airports handle multiple fights each day, simplifying routing decisions.
But, the story is not over. Southwest Airlines was also an upstartbeginning in
Texas in 1971. By fying within the state, the airline was not subject to CAB regu-
lations. Founded and largely run by Herbert D. Kelleher, the airline grew slowly
to maintain control. Part of the simplicity lay in its fee structurefar simpler than
the major airlines, Southwest prices fights so that they are proftable. By sup-
porting several daily fights to each destination, with reasonable fares, Southwest
promotes itself as the company plane. By holding down costs (fight attendants
often help clean the airplane, and the company fies only Boeing 737s to minimize
maintenance costs), the company grew steadily. More important, Southwest Air-
lines has been proftable every single year for over 30 yearsa statement that no
other airline can match (www.southwest.com).
698 Chapter 10: Strategic Analysis
Recent Changes
To understand the current state of the airline industry, you also have to look at
September 11, 2001. The event shocked the American people. The industry and
government response provided almost as much of a shock to the industry. Sud-
denly, fying became considerably more complicatedpassengers and airlines
wrestled with long security lines and new rules. The U.S. government bailed out
most of the airlines by providing billions of dollars in grants and loan guarantees.
Yet the major airlines were still saddled with strict working rules and high wag-
es through negotiated contracts. In December 2002, United Airlines fled for re-
organization under Chapter 11 of the bankruptcy code. In 2004, the company was
still struggling to obtain fnancing to emerge from bankruptcy (www.pd-ual.com).
On September 15, 2005 both Delta and Northwest fled for bankruptcy protec-
tion. A large reason for fling for bankruptcy appeared to be a negotiation strategy
aimed at reducing labor contract costs. The airlines also declared their pension
plans bankrupt and foisted them onto the federal pension insurance program, re-
moving the liability and reducing the payouts to retired pilots and employees.
Several other airlines were created in the early 2000s to pick up passengers on
highly traveled routes. JetBlue, founded in 2003, is one of the largest. JetBlue
is based out of JFK airport in New York City and initially focused on East Coast
destinations. It has expanded to cross-country fights and is slowly adding some
Western cities to its routes. It has been successful (passengers like the DirectTV
broadcasts available on the seat-back sets) and proftable (www.jetblue.com).
Airtran, a successful start-up from 1998, has been hammering Deltas fares in the
Atlanta airportDeltas home base (www.airtran.com). While still only carrying
a fraction of the passengers of the big airlines (maybe 10 percent), JetBlue and
AirTran have been growing (The Wall Street Journal 2002). The secret to success,
as explained by Joe Leonard, the CEO of AirTran, to a congressional committee
is not to be a low-fare airline, but to be a highly effcient airline, whether you are
a big airline or small, and to adapt to the changing marketplace (Leonard 2004).
In 2011, Southwest purchased AirTran.
The obvious question at this point is that since Southwest has been so success-
ful with its strategy, why dont the airlines simply copy their formula? Yes, 9/11
and the resulting gasoline price increases due to the war with Iraq have put added
pressure on the airlines. But, the big airlines were struggling even before these
events. The answer is that it might not be possible for the big airlines to make the
huge changes needed. Delta and United started some experiments. Delta created
a subsidiary called Song in 2003 designed to compete directly with the discount-
ersfocusing on leisure travel between high-demand cities (www.fysong.com).
United formed Ted (a part of United) in early 2004 for the same purpose (www.
fyted.com). Although the fare rules for Song and Ted are usually simpler than for
the parent company, the interesting part is that it is sometimes cheaper to fy the
parent airline. In 2004, the CEO of Delta, Leo Mullins, resigned, and the interim
CEO suspended any expansion of the Song airline. And the Ted airline was sub-
sumed back into United.
Airline Costs
If airlines are going to cut costs, it helps to know where those costs are. The Air
Transport Association (ATA) tracks these costs and releases summary data. The
easiest way to understand the costs is to examine them as a percentage of the to-
tal. By far, labor costs are the largest share (38.4 percent). All other costs, mostly
699 Chapter 10: Strategic Analysis
administrative overhead, are second (23.7 percent). Fuel costs vary over time, but
most airlines use futures markets to hedge their costs (11.6 percent). The cost of
the planes seems reasonable (10.2 percent), but you also have to add in the interest
costs of the debt for the planes. Since interest rates were at historical lows in 2003,
the cost was relatively small (3.0 percent). Maintenance material (2.5 percent) is
usually steady, unless an airline is running a large percentage of older planes. Pas-
senger food costs have been declining as airlines drop their food programs (2.3
percent). Airlines still pay some commissions to travel agents, but that number is
dropping steadily (2.2 percent). Airlines have to pay landing fees to airports to use
their gates (2.1 percent). Insurance costs (1.5 percent), communication (1.5 per-
cent), and advertising (1.0 percent) are all relatively small components (McCart-
ney 2002). These industry averages conceal the differences between the airlines.
Through cheaper labor contracts, newer planes that need less maintenance and use
less fuel, and a focus on costs, the discount airlines average a cost of 7.3 cents per
mile, compared with 11.7 cents for traditional airlines (Rosato 2004).
Te Possible Future
A large part of the differences with Song and Ted are the union contracts. The ma-
jor airlines and the fight crews need to fnd some way to negotiate contracts that
enable the carriers to compete with the discounters. The airlines also need to fnd
a way to reduce costs and provide a service that people are willing to pay for. The
good news for passengers is that airlines should be more willing to try innovations
and search for ways to provide better service.
For business travelers, some new options are on the near horizon. Several com-
panies are building small, personal jets that will cost less than $1 million. Some
companies will purchase the jets for company use, but the annual upkeep and
crew costs still make them expensive. On the other hand, they might enable a type
of air taxi service to be created. Flying from small regional airports, the jets could
offer quick service directly from one city to another, bypassing the big airline
hubs and their driving, parking, and security hassles. This service will probably
be too expensive for leisure travelers, but would appeal to a business person who
is currently being charged $2,000 for a major airline fight. That would leave the
big airlines running a type of low-cost mass-transit bus service (McCartney 2003).
The micro-jet option never emerged as a major player. The technology still ex-
ists, but high fuel costs probably make it too expensive to fy a small number of
passengers.
Additional Reading
Leonard, Joe, U.S. Government Subsidizes Ineffciency in Airline Industry,
Aviation Week & Space Technology, June 21, 2004, Vol 160(25), p. 86.
McCartney, Scott, Which Costs Airlines More: Fuel, Labor or (Ugh) Meals?
The Wall Street Journal, November 6, 2002.
McCartney, Scott, Airline Visionary Burr Sees Future in Personal Travel, The
Wall Street Journal, June 4, 2003.
Rosato, Donna, The Plane Truth About Flying Cheap, Money, May 2004, Vol
33(5), pp. 83-86.
The Wall Street Journal, The New Normal: Big Carriers Lose Market Share to
Upstarts, May 14, 2002.
700 Chapter 10: Strategic Analysis
Case: Delta Air Lines
Delta (ticker: DAL) is one of the original airlinestracing its history back to its
frst passenger fight in 1929. The company, headquartered in Atlanta, had rev-
enues of $13 billion in 2003a steady decline from 2000. With over 60,000 em-
ployees, the company few about 100 million passengers in 2003. The company,
and its code-share partners, fy to almost 500 cities in 86 nations (www.delta.
com). Deltas books showed a net proft in 2000, but the company has been in the
red since that time. Delta has reported a total loss of $3.7 billion in 2001, 2002,
and 2003. For most quarters, the company is losing money even on operations
(annual report). Fred Reid, president of Delta knows the problems: Theres no
question whatsoever in Deltas mind that we are in the midst of a profound, fun-
damental and truly irreversible series of changes in which the value proposition
to the investors and the customers is changed unalterably. In this new world some
airlines are winning and some airlines are losing, and I would say that Delta is still
positioning for long-term success (Bond March 2004).
In April 2007, Delta emerged after spending 19 months in bankruptcy. The air-
line reduced capacity by about 10 percent and 20 percent fewer employees, as well
as reduced operating expenses by about $3 billion a year. The rest of the industry
also reduced fights so Delta was fying at 84 percent capacity on average fights
compared to 72 percent when it fled bankruptcy. Fares also edged up, improv-
ing revenues (Isidore 2007). The airline also started expanding into international
marketsassuming there was less competition on international routes, enabling it
to charge higher prices. The company still lost $6.2 billion on operations in 2006
(2006 Annual Report).
Pilots and Costs
As of 2004, Deltas pilots were the highest paid in the industry. After acrimonious
negotiations, then-CEO Leo Mullins granted the union huge pay raises. In 2004,
Leo Mullins was removed as CEO. Given the bankruptcies at the other airlines,
Delta then attempted to renegotiate all salaries. The company executives have dis-
cussed the possibility of fling bankruptcy to force the union to negotiate lower
salaries (Bond May 2004). Many of Deltas older pilots are abandoning ship be-
fore it sinks. In mid-2004, 288 pilots applied for retirement, 266 of them were for
early retirement. An additional 300 had already applied for retirement in Septem-
ber 2003. Despite the retirements, Delta has plenty of pilots available: 8400 on ac-
tive duty, plus 1,060 on furlough (Aviation Week & Space Technology June 2004).
Deltas total costs of fying domestically are 30 percent higher than Southwests
(McCartney October 2002).
Subsidiaries
To fght the discount airlines, Delta established or purchased several subsidiary
airlines. Delta Express and Skywest are two regional subsidiaries that operate out
of Delta hubs. These airlines fy smaller planes or regional jets and deliver pas-
sengers to the hub, providing access to Delta in smaller cities. A key arrangement
with the pilots union allows the regional airline pilots to be paid less and fy under
less limiting rulesas long as the planes carry a limited number of passengers.
In 2003, Delta launched service on Song. Although the goal was to keep fares
relatively low, Song was competing more with JetBlue than with Southwest. In
particular, the airline offered seat-back television for satellite programs, pay-per-
view movies, and video games. However, the company had trouble getting the
701 Chapter 10: Strategic Analysis
systems installed and had to begin operations without the technology for sever-
al months. Another drawback faced by Song was that they used the same Delta
personnel, with the same contracts and lack of focus on cost cutting (Melymu-
ka 2003). When Leo Mullins was replaced by Gerald Grinstein as CEO in 2004,
Grinstein halted expansion of the Song division.
In 2008, Delta bought Northwest Airlines and merged the two companies
(Crawley 2008). It took several years to merge the names and information systems
of the two companies.
Information Technology
Information technology has an impressive role in the history of airlines. At the
pure transaction level, IT is necessary to handle the millions of reservations a day.
Running from huge databases, the large systems fnd fights, check seats, and bill
customers when seats are reserved. When American Airlines used its system to
create yield management and differentiate prices, it represented a milestone in
the competitive use of technology. But today, the reservations systems have been
moved out to subsidiaries and passengers can book online or through third-party
reservation systems. Although the systems are still used by some of the major
airlines to jockey prices, companies are increasingly looking at simpler fare struc-
tures. In 2004, Qantas, the Australian airline, decided it was pointless to run its
own system. CIO Fiona Balfour, said I dont think airlines get a competitive ad-
vantage form IT anymore. They get competitive advantage from how they use it.
Running IT at a low unit cost becomes a competitive advantage (Kontzer 2004).
Nonetheless, Delta (and most of the other major airlines) continues to run its own
systems. Deltas CIO, Curtis Robb, believes that outsourcing will not necessarily
reduce costs or improve service. He observes that we get payback on a yearly
basis for in-house IT work and we get it at a fraction of the cost (McDougall
2003). Note that the in-house reservation systems are separate from the aggrega-
tors including Sabre and Orbitz.
Away from the reservation system, Delta is working harder to use the transac-
tions to increase the operational effciency. For example, the company runs the
Delta Nervous System (DNS) that pushes data from the transaction system out to
the desktop and even handheld computers. For example, as a plane arrives at an
airport, the gate agent and luggage handler are notifed electronically. A frst step
in creating the DNS was to set common defnitions for data stored in over 70 dif-
ferent databases and place every item into one of 15 subject categories. This sys-
tem forms the foundation of all the real-time applications. For example, the gate
information display simply queries the DNS data layer for real-time information
about the specifc fight, formats it, and presents it to the customers. New applica-
tions can be built relatively quicklyprogrammers need only identify the data
they require and can focus on the application and display. At Delta hubs, the DNS
data is supplemented with data from the federal air traffc control (ATC) system.
This data is examined for late fights and enables managers to spot problems and
reschedule fights. DNS is a $1.8 billion project started in 1998 (Air Transport
World 2004.
The company also installed customer relationship management software for
the call center. The CRM system enables clerks to see the entire picture of the
customer who called (McDougall 2003). In the process, the company consoli-
dated 30 customer databases into one, with three data warehouses to support an-
alytical functions (Gareiss 2003). The newer jets offer additional ways to save
702 Chapter 10: Strategic Analysis
money through integrating with information technology. The Boeing 777 collects
information from various subsystems electronically. This telemetry is collected
and transmitted to the maintenance engineers. If a problem arises, such as exces-
sive vibration in an engine, managers can spot the problem and correct it before
it causes additional problems. The company is also working to create electronic
documents for all of the maintenance procedures. Electronic versions can be pro-
vided instantly to maintenance workerssaving search time (McDougall 2003b).
Like other airlines, Delta has installed kiosks to encourage departing passen-
gers to record their own check-in, saving money by reducing the number of tick-
eting agents. Delta has also created a telephone system that customers can use to
check in. More importantly, the IT system automatically monitors late fights and
missed connections. If a passenger is not going to make a connection, the system
automatically rebooks the fight (Schwartz 2004).
In 2006, Delta launched a three-year project to update its primary systems with
a service-oriented architecture (SOA). One goal was to replace BEA Systems
Tuxedo middleware with standards-based technology. Middleware takes data
from one system and converts it into a format that can be used by other systems.
By standardizing the data interchange, it will be easier to replace various systems
in the future (Havenstein 2006).
Delta was able to use the bankruptcy fling as a lever to renegotiate contracts,
including a 27 percent drop in software fees from $3.74 million to 2.73 million
charged by SAP. Delta uses SAP software for ordering supplies and tracking spare
parts (McDougall 2006a)
Bankruptcy is not a panaceait can cause more problems than it solves. In
October 2005, Deltas pricing system crashed for 12 hours, costing the compa-
ny more than $4 million in revenue. IT outages also led to several fight delays.
Delta reported that it experienced unprecedented attrition and chaos within the
IT department as workers left in droves following the bankruptcy flingonly
39 percent offered a job decided to stay. In August 2006, Delta outsourced its
operations to IBM under a seven-year contract (McDougall 2006b). With a short-
age of workers, Delta turned to other providers to help with systems, but bank-
ruptcy made it more diffcult to pay the bills. Unisys asked the bankruptcy court
to pay it $37,000 for developing an application to assign a unique product code
to the special handling required for transporting human remains. According to the
work order, Deltas system did not distinguish between human remains and other
priority shipments, leading to service failures and irate customers (McDougall
January 2007). Cisco also had to fle a claim to get paid for $20 million in leased
equipment (McDougall March 2007). If you were a CIO at a major corporation,
you would probably see similar claims and have to deal with these standard is-
sues. The interesting aspect of bankruptcy flings is that the information becomes
public.
On a more personal level of technology, airlines have been adding Wi-Fi ser-
vice to the fights so that passengers can surf the Web aboard planes. The airlines
purchase the service from a third-party such as GoGo (Lawson 2011).
Questions
1. Why do people fy on the discount airlines? What do they not like about the
discounters? Can Delta combine these answers with IT to regain market share
and profts?
703 Chapter 10: Strategic Analysis
2. How does Delta use technology to reduce costs? Is it enough to make a
difference?
3. Can Delta use IT to become more like Southwest? Is that the best strategy?
Additional Reading
Air Transport World, Technology Leadership, February 2004, Vol 41(2), p. 32.
Aviation Week & Space Technology, Delta Pilots in New Retirement Application
Spike, June 14, 2004, Vol 160(24), p. 17.
Bond, David, Work in Progress, Aviation Week & Space Technology, March 1,
2004, Vol 160(9), p. 45.
Bond, David, Bankruptcys Siren Song, Aviation Week & Space Technology,
May 17, 2004, Vol 160(20), p. 24.
Crawley, John, Delta Buys Northwest to Create Biggest Airline, Reuters,
October 30, 2008.
Gareiss, Robin, Technology Takes To the Air, Information Week, April 21,
2003.
Havenstein, Heather, Delta Set to Launch Three-Year SOA Project,
Computerworld, December 11, 2006.
Isidore, Chris, Delta Exits Bankruptcy with Planes Full, CNNMoney.com, April
30, 2007.
Kontzer, Tony, Airline Taps IBM for Flexible Pricing Deal, Information Week,
May 24, 2004.
Lawson, Stephen, Aircell to Boost In-Flight Wi-Fi Speed, Computerworld,
March 9, 2011.
McCartney, Scott, Southwest Sets Standard on Costs for Airlines, The Wall
Street Journal, October 9, 2002.
McDougall, Paul, Tough Climb, Information Week, April 21, 2003.
McDougall, Paul, Prevention: The Cure for High Maintenance Costs,
Information Week, April 21, 2003.
McDougall, Paul, SAP Agrees to a 27% Reduction in Software Fees Charged to
Bankrupt Delta Air Lines, Information Week, December 16, 2006.
McDougall, Paul, Techie Exodus at Bankrupt Delta Caused Flight Delays,
Broader Chaos, Information Week, December 19, 2006.
McDougall, Paul, Unisys Demands Cash for Helping Delta Air Lines Ship Dead
Bodies, Information Week, January 5, 2007.
McDougall, Paul, Cisco Claims Its Owed $20 Million from Delta Air Lines,
Information Week, March 8, 2007.
Melymuka, Kathleen, Deltas Test Pilot: IT at Song, Deltas New Low-Cost
Airline Unit, Computerworld, August 18, 2003.
Schwartz, Adele C., On the Wings of IT, Air Transport World, March 2004, Vol
41(3), pp. S7-9.
704 Chapter 10: Strategic Analysis
Case: Southwest Airlines
One of Herb Kellehers favorite stories is that back when they started fying to
West Texas, the competitors tried to fght back by matching his fares. Herbs an-
swer was to start offering a bottle of whiskey to every Southwest passenger. With-
in a few weeks, Southwest (ticker: LUV) became the largest liquor distributor in
West Texas. Knowing the customers and not being afraid to take chances (or play
jokes) became hallmarks at Southwest. At one point in 2002, domestic traffc at
the nations fve largest airlines fell by 10 percent. At the same time, travel on the
fve biggest discount airlines increased by 11 percent. In 2002, the discounters
accounted for 20 percent of U.S. passenger traffc (Trottman 2002). Within Cali-
fornia, Southwest few a whopping 63 percent of the passengers (Leonhardt and
Maynard 2002).
To traditional airline executives, the amazing aspect of this change is that even
businesspeople are fying on the discount airlines. Southwest pushed this concept
hard for many yearsemphasizing that a manager could get on the plane at the
spur of the moment and fy to a business meeting at a reasonable fare. One execu-
tive, Brent Harris, managing director of Pacifc Investment Management, notes
that he now fies JetBlue for business instead of one of the big carriers for trans-
continental fights. He observes that While I could afford to pay more, theres a
certain sense of satisfaction, in getting the discounts (Trottman 2002). Southwest
began adding transcontinental fights (from Baltimore) in 2002 (The Wall Street
Journal 2002).
Southwest is an incredibly effcient airline, turning a plane around in as little as
20 minutes. Other airlines average 50 minutes. As a result, Southwest is able to fy
its Boeing 737s an average of nine hours a day, compared with six hours for Delta
and United (Trottman 2002). In general, the major airlines would have to cut 29
percent of their costs ($18.6 billion) to match the cost structure of Southwest (Mc-
Cartney 2002). In 2002, Southwest had become the nations sixth largest airline.
Not all is rosy in the Southwest family. In 2004, Herb Kelleher had to step in to
negotiate a new contact with the fight attendants union. Normally, negotiations
are friendly at the employee-centered company, but these took two years to settle.
In the end, the workers gained an average 31 percent raise spread over six years
(The Wall Street Journal 2004). In July, James F. Parker resigned as CEO.
In 2005, Southwest CEO Gary Kelly commented on the changing competition
in the airline industry, I think all carriers are low-fare carriers. To survive, all
carriers are going to have to be at least lower-cost carriers. In this new strategic
environment, Southwest still wants to be the low-fare airline, and Mr. Kelly wants
to use technology to reduce costs. One step was to shift more reservations onto the
Web site, where costs run $0.50 to $1 versus $10 or more for other methods. By
focusing on airport operations, including customer service, the airline has been
able to reduce costs by hiring fewer employees. In 2000, the airline employed 95
people per aircraft owned. By 2005, the number was down to 73 or 74 (Steinert-
Threlkeld 2005).
In 2007, Southwest announced that it would slow its expansion, including a
reduction in the number of new planes it will add. The airline also reduced some
roundtrip fights in underperforming markets. The company was also planning to
announce a new boarding/seating method at the end of 2007 (press release June
27, 2007). Ultimately, Southwest continues to expand. In 2011, Southwest took a
big step by purchasing AirTran. The company expects the merger process to take a
year, but AirTran dramatically expands Southwests reach on the East coast (press
release May 2, 2011).
705 Chapter 10: Strategic Analysis
One major change for Southwest was the increasing costs of fuel. According to
the 2010 Annual Report, in 2005, when fuel was $1.13 a gallon, fuel costs were
21.4 percent of operating expenses. In 2010 at $2.51 a gallon, they were 32.6
percent of operating expenses. Industry-wide, the market crash of 2008 and 2009
also resulted in a drop in demand for fights, so all airlines struggled during the
recession.
Information Technology
Even in the early days, Southwest managed to avoid many of the hassles of res-
ervation systems. For years, the company was able to list its fights for free on
the industry reservation systems. It required travel agents to call the company
to book the fightthe systems carried listings for free but charged when fights
were booked. One estimate places the cost of booking through the Sabre system
at $12 to $14 per transaction (Hoffman 2002). Today, Southwest has benefted
considerably from the Internet. Customers can see all fares quickly and make their
own reservations. Southwest gets over 40 percent of its bookings online, com-
pared wit Uniteds 5 percent (Trottman 2002). The Internet also makes air fares
more transparent. Even businesspeople can quickly see the difference in the prices
across airlines. Using the online tools, travelers can arrange fights to avoid the
huge fares that airlines are trying to hoist onto business fiers. David Weiner, cor-
porate travel manager for DaimlerChrysler, explains that although the company
has preferred discounts with Northwest, most of his managers would rather fy
Southwest. He claims that with companies like Southwest, their fares are afford-
able as is. Its not like you would require any additional discounts (Leonhardt
and Maynard 2002).
Southwest also pioneered business reservations on its Web site (www.swabiz.
com). In addition to letting managers and workers book fights, the system tracks
companywide data for travel managers. Kaiser Permanente, a major health care
organization, spends $6 million on Southwest travel. The business site enables
Margy Skinner, the travel manager, to identify all tickets and use them to obtain
quarterly bulk rebates (Kontzer 2004).
The Web site is so critical to Southwest that it rebuilt the system in 2002. The
new UNIX-based system uses servers from Fujitsu in a cluster to ensure that
the system keeps running and can scale up. Steve Taylor, director of interactive
marketing observes that the bedrock of customer service in the online world is
always being there. Thats what were aiming for with this clustering project
(Greenemeier 2002). The online marketing team consists of 70 employees, with
50 of them IT professionals and the rest marketing specialists.
Southwest does use information technology to help analyze its data. Since it
does collect a large share of the transaction data directly, it has purchased business
intelligence tools to help analyze it. In particular, the company is using Hyperions
Essbase OLAP application and budgeting software to make fnancial forecasts.
Mike Van de Ven, vice president of fnancial planning and analysis at Southwest
notes that after the September 11 attacks, the company knew it faced huge uncer-
tainty and needed help. He adds that we were asked to give some sort of fnancial
insight for a variety of decisions the company might make (Songini 2002). Be-
fore installing the $1 million software, managers relied on writing custom data-
base queries and evaluating the data in spreadsheets. Essbase provides immediate
analysis and charts, cutting analysis time to as little as two minutes. Managers use
the system to evaluate best and worst case scenarios to determine how to respond
706 Chapter 10: Strategic Analysis
to problems. The software paid for itself within the frst year by providing more
accurate forecasts and saving time for managers.
Unlike the other big airlines, Southwest is growingthat means it needs to hire
more workers. Growth is good for both the company and the employees, but how
can Southwest deal with the 200,000 resumes a year that it receives? Southwest
is turning to Deploy software to handle the major tasks of hiring. The software
tracks everything from job requests by departments, to application progress, and
candidate matching and ranking. The tool also integrates with the U.S. govern-
ment system for verifying job candidate fngerprints and validating drug-test re-
sults (Hayes 2003).
Radio systems in airlines are ancient. Even if the planes and radios are new,
they use technology developed in World War II. As one of the few airlines making
money, Southwest is one of the frst to install a new digital technology (VDLM2)
to transmit data between its dispatchers and aircraft captains. Because the tech-
nology is restricted to a portion of the VHF bandwidth allocated to airlines, it
provides a data rate of 31.5 K bits/second. But that rate is 15 times the rate of the
companys old system. The system primarily handles short text messagesoften
instructions on the best route around weather problems. Ultimately, the system
will be used to transmit high-resolution weather radar images to the cockpit. The
company is also planning to collect telemetry information on the planes perfor-
mance and route it to maintenance personnel at the next airport if problems are
detected (Brewin 2004).
With high prices for fuel, airlines began focusing on methods to reduce fight
distances and times. In 2007, several airlines, including Southwest, began imple-
menting fight-planning software from Jeppesen. Jeppesen has long been known
as a provider of fight maps and related technologies. In early trials, the system
was able to reduce fight times on hundreds of fights from 4 to 7 minutes. A cou-
ple of minutes might not sound exciting, but do it enough times and an airline
saves millions of dollars. EDS also sells fight-planning software to more than 40
airlines worldwide (Weiss 2007).
Because Southwest focuses on costs and proftability, it also tries to hold down
spending on technology. Rarely is it the frst adopter of a new technologyin-
stead, it fnds ways to get passengers from point A to point B as simply as pos-
sible. For instance, the fights do not assign seats and it was one of the last to print
paper boarding passes. By 2005, the CEO reported that IT costs had fat-lined to
about $170 million per year, for equipment and wages. The company also applies
its knowledge of operations to IT development. Mr. Kelly, the CEO noted that
we have a single data architecture. We have a standard testing approach, where
we will rarely allow shortcuts (Steinert-Threlkeld 2005).
In 2010, Southwest announced plans to implement a new reservations sys-
tem (2010 Annual Report). The main goal was to be able to handle international
fights, either with Southwest planes, or with a code share arrangement through
another airline. Prior to this point, Southwest focused only on domestic fights
and the reservation system was designed only for those fights. Yet, as Southwest
grows, it feels it needs to be able to compete with the larger airlines who continu-
ally emphasize their international reach. In 2011, Southwest altered its frequent
fyer program to be based on a point system instead of the number of trips. The
points are based on dollar value of the tickets, presumably to reward business
travelers who pay more money for fights than tourists. The new program required
a complete rewrite of the software and Web site to support the changes.
707 Chapter 10: Strategic Analysis
In 2010, Southwest fnished integrating the SAP ERP system which replaced
the old general ledger, accounts payable, accounts receivable, payroll, benefts,
cash management, and fxed asset management systems (2010 Annual Report).
The new systems are integrated, providing managers with a comprehensive view
of the accounting data.
Questions
1. How does Southwest use information technology to establish fares?
2. How has Southwest used the Internet to gain at least a short-term competitive
advantage?
3. Can Southwest maintain its competitive strengths as it continues to grow?
What risks will the company face?
Additional Reading
Brewin, Bob,Data Takes Flight, Computerworld, June 21, 2004.
Greenemeier, Larry, IT Pros Plus Marketing Experts Equal Better Service,
Information Week, March 18, 2002.
Hayes, Mary, Southwests People Plan, Information Week, September 8, 2003.
Hoffman, Thomas, IT Investments Grounded At USAir, Other Carriers,
Computerworld, August 19, 2002.
Kontzer, Tony, Low-Cost Airlines Build Portals For Business, Information
Week, April 5, 2004.
Leonhardt, David and Micheline Maynard, Troubled Airlines Face Reality:
Those Cheap Fares Have a Price, The New York Times, August 18, 2002.
McCartney, Scott, Southwest Sets Standard on Costs for Airlines, The Wall
Street Journal, October 9, 2002.
Songini, Marc L., Southwest Expands Business Tools Role, Computerworld,
July 12, 2002.
Steinert-Threlkeld, Tom, Southwest Airlines: High Tech, Low Costs, Baseline,
April 10, 2005.
Trottman, Melanie and Scott McCartney, The Age of Wal-Mart Airlines
Crunches the Biggest Carriers, The Wall Street Journal, June 18, 2002.
Trottman, Melanie and Scott McCartney, Southwests CEO Abruptly Quits a
Draining Job, The Wall Street Journal, July 16, 2004.
The Wall Street Journal, The New Normal: Big Carriers Lose Market Share to
Upstarts, May 14, 2002.
The Wall Street Journal, Business and Finance, July 2, 2004.
708 Chapter 10: Strategic Analysis
Case: Sabre
Sabre (ticker: TSG) is the monster real-time reservation system originally created
by American Airlines. The frst system went live in 1960 and handled 84,000 tele-
phone calls a day. In 1964, the system ran on its own private networkreducing
American Airlines staff by 30 percent in the frst year. In 1976, the system was in-
stalled into travel agent offcesquickly reaching 130 locations. In 1985, preced-
ing the Internet adoption by several years, easySabre gave dial-up access to users
with personal computers. In 2000, the company was spun off as a separate entity,
but tracking-stock data is available back to 1996. In 2004, the system handled $70
billion of travel products and connected 53,000 travel agents. It also forms the
foundation of the Travelocity Web site (www.sabretravelnetwork.com).
Technology
For years, the Sabre system ran on large IBM computers. Much of it was joint-
ly developed with IBM, since the demands and technologies needed continually
pushed the available hardware and software. The system handles 15,000 transac-
tions per second and tracks 79 million air fares. In 2001, the company announced
it would migrate the massive system to a completely new architecturebased on
a UNIX platform (Anthes May 2004), but the transfer would take several years.
Throughout its history, Sabre has been a leading-edge system, handling huge
transaction volumes and providing detailed data for analysis. Almost all of the
code has been custom written. In 2000, Sabre produced Release 8 of its AirFlite
Proft Manager. The modeling and forecasting package is used by airlines to es-
timate demand for seats on every fight. It is the core of the yield management
system. Release 8 had about 500,000 lines of code. The problem is that it was four
months late because fnal system testing turned up 300 bugs. The frst customer
found 26 more bugs in the frst three days, and additional joint testing turned up
another 200 defects. Sabre and its development team were embarrassed. However,
the situation mirrored other development projects. The catch is that Sabre has 62
software products with 13 million lines of code. It cannot afford defect rates that
high. For Release 10, shipped in December 2002, Sabre turned to extreme pro-
gramming (XP). With XP, programmers work in pairs, but more important, they
defne testing procedures for each module before writing the code. The fnal ver-
sion turned up only 100 defects after 16 months of use. At the same time, pro-
grammer productivity increased. The reduced defect rate also cut the number of
support programmers needed (Anthes March 2004).
Partly from the increased competition, partly from the need to support new
standards, Sabre moved in 2005 to replace its 15-year-old EDI system with Web
services applications. Web services uses standards such as HTTP and XML to ex-
change data more easily with remote systems. The standards reduce the cost and
the use of the Internet reduces the transmission costs and make it easier to develop
applications that work together. Transferring data from airline systems onto Sa-
bres system and ensuring timeliness and accuracy represent substantial costs for
airlines (Havenstein 205).
Competition
Despite the technological advances and prowess of Sabre, it faces competition.
Its biggest competition is undoubtedly the Internet. Although the company runs
Travelocity, one of the big Internet travel sites, the site is not proftable yet. Fur-
thermore, when customers book fights through Travelocity, the airline or hotel
709 Chapter 10: Strategic Analysis
pays a fee to Sabre. Consequently, airlines have been encouraging customers to
book their fights directly at the airline Web sitesbypassing Sabre entirely. The
Orbitz Web site was created by the fve largest airlines specifcally for that pur-
pose. It searches the companys individual databases and routes the customers
choice directly to the airlines server.
In 2004, Alaska Airlines, tired of waiting for new services from Sabre, decided
to create its own itinerary-planning and fare-searching system on a Linux-based
system. Alaska simply purchased the system from Cambridge, Massachusetts ITA
software. Steve Javris, vice president of e-commerce at Alaska, noted that we
couldnt wait on Sabre. ITAs algorithms are widely regarded as the best in the
industry (Verton 2004). Alaska will continue to use Sabre to book reservations,
but will use the new system for data analysis. The ITA system is primarily used as
the back-end processor for Web siteshelping customers identify routes. Jeremy
Wertheimer, ITAs founder and CEO, comments that it processes and confrms
availability for [trip] pricing in less than one-tenth of a second (Verton 2004).
But, Sabre is not standing still. The company is creating new tools to encour-
age airlines to continue using the system, and new products that will help travel
agents. In terms of helping the airlines, Sabre launched its interline e-ticketing
(IET) hub in 2004. Since Sabre serves multiple airlines, it is in an ideal position to
provide links between them. Previously, customers had trouble booking e-tickets
for fights that involved multiple airlines. Each system was separate and the air-
lines had to reidentify the passenger at each step. With the interline system, the
passenger data and validation are shared across airlines. Essentially, Sabre serves
as an EDI consolidator and translates data from each system into a common for-
mat that is accessible to all systems. The system is based on Web services, making
it easy to expand and change as airline systems change (Rosencrance 2004).
Sabre also introduced a new feature for travel agents in 2004. What happens if
a customer wants an aisle seat, but the only seat available is a middle seat? A good
travel agent would book the available seat to keep it, and then periodically check
the fight to see if a more desirable seat opens up. But that requires considerable
time and effort by the travel agent. Sabres answer was to create an event model
that will alert the travel agent when a seat opens up. Loren Brown, CIO of Carlson
Wagonlit Travel, a company with 8,000 agents, notes that agencies would likely
pay extra for that feature alone, stating that would be a much more elegant solu-
tion than we have in place now (Kontzer June 2004).
Sabre also faces competition from more traditional rivals: Amadeus Global
Travel Distribution, Cendants Galileo International, and Worldspan. All of these
were originally developed by other airlines and spun off as well. All of them are
facing similar problems and working to cut costs and offer new services. That
is one of the main reasons driving the switch in servers. Sabre estimates that by
running the open-source MySQL database on open-source Linux servers, the new
system will cost 80 percent less to operate (Kontzer June 2004).
Several startups offer new ways to search for fights, hotels, and cars. In 2006,
ITA Software received $100 million in venture capital funding. Its system drops
processing costs to a couple of dollars a ticket, compared to the $12 a ticket that
airlines pay to Sabre for each reservation. ITA CEO Jeremy Wertheimer observed
that almost every ticket you buy is still being handled by assembler code running
on a mainframe. His systems use inexpensive x86 PC hardware running open
source software (Kontzer 2006). Many airlines pass that cost onto customers, so
savvy customers use the search systems (such as Sabres Travelocity) to locate
710 Chapter 10: Strategic Analysis
the lowest-cost fights, and then book the fight directly with the airlineso Sabre
gets paid only for the listing, not for the purchase.
Low-cost airlines have been particularly reluctant to book fights with Sabre.
Southwest relied on its own system and Jet Blue dropped the Sabre listings when
more customers began booking directly with the airline. AirTran bucked the trend
in 2005 when it added all of its fights to the Sabre system (Kontzer 2005). By
2007, facing increased competition for low-fare fights, Southwest added its list-
ings to Sabre and to the Galileo search system (Wall Street Journal 2007).
Experts have questioned how long the big reservation systems will compete
with the startups. In 2005, Sabre took one step by purchasing European company
Lastminute.com for slightly over $1 billion. The site primarily gives Sabre ac-
cess to the European market (Information Week 2005). Competitor Expedia
had already purchased Hotels.com and Hotwire.com. Orbitz owns the Web site
CheapTickets.
In 2008, Sabre added a social network component to its system (Havenstein
2008). The objective was to enable people to share advice and recommendations
about their travel plans. It is not clear if anyone uses the systemparticularly
since anyone could use existing social networks instead.
Te Future
With so many competitive factors, it is diffcult to guess who is going to win the
battles for customer reservations. Sabre and its direct rivals have some amazing
technology as well as the developers to build complex systems. One of the things
that might be changing is that passengers will want to book package deals. But
not quite like the old heres a tourtake it or leave it. Instead, customers will
want to go to a site and select their own custom bundle: pick low-cost air fares,
choose hotels that offer the desired amenities at an acceptable price, then add in
some adventure excursions. Yes, the big travel sites support these steps in a lim-
ited way now. However, they rarely allow anything more than limited customiza-
tion. Ultimately, customers want a more intelligent system that can create desired
bundlesat a discount. So, airlines, hotels, and other providers will need to co-
operate. Then, the reservation sites will have to become sophisticated enough to
balance the various choices and compute all of the package deals (Kontzer May
2004).
Sabre Holdings Corp. was purchased by private equity frms in March 2007 for
$4.5 billion, so it is no longer a public company (Fox News 2006). Operations are
likely to continue as before. Private-equity frms went on buying sprees in 2006
and 2007, searching for companies with relatively low stock prices, that the inves-
tors believed could be used to generate solid cash fows.
In 2010 and 2011, the reservation industry faced several major challenges.
First, the recession affected bookings so revenue was down. More importantly, the
airlines began rebelling against the fees charged by the big sites (e.g., Travelocity
and Orbitz). American Airlines went so far as to remove its listings from all of the
major sites. Which was interesting because Travelocity (Sabre) was once a divi-
sion of American Airlines. The goal at AA was to encourage customers to book
fights directly at the companys Web site, bypassing the fees charged by the tick-
eting sites. Southwest uses this technique to save money and AA managers want-
ed to do the same thing. Eventually, AA renegotiated with most of the systems, but
passengers are well-advised to double check fares on individual airlines to get the
best prices. Some sites, notably Kayak, automatically check fares through the big
travel sites as well as the individual airlines.
711 Chapter 10: Strategic Analysis
Another interesting issue arose in 2010 when Google proposed to buy ITA Soft-
ware (Perez 2010). ITA is a company that provides the airline data to many of the
other travel sites, airlines, and Microsoft Bing. The company was founded in 1996
and has about 500 employees. Google wants to own the company so that it can
integrate fight data and reservations directly into the Google search engine. But,
other providers worry that this step would reduce competition, meaning take away
their customers. Eventually, the Department of Justice approved the purchase but
imposed a few conditions to encourage continued competition.
Despite the advances, travel search engines are still somewhat primitive. For
starters, they rarely fnd the best prices. But, remember it is the airlines that pay
the initial fees, so they have an incentive to arrange the systems to support their
objectives. The fexible searches that check multiple departure dates and different
airports do help users fnd better prices, but in the end, a human has to do a large
amount of work to fnd the best fares and fight times.
Questions
1. Who are Sabres competitors?
2. What risks does the company face? Will travel agents continue to exist and
will they use Sabre?
3. What factors are needed for an intelligent agent reservation system to be
created? Who would create these elements?
Additional Reading
Anthes, Gary H., Sabre Takes Extreme Measures, Computerworld, March 29,
2004.
Anthes, Gary, Sidebar: Sabre Timeline, Computerworld, May 31, 2004.
Havenstein, Heather, Sabre replacing EDI with Web services, Computerworld,
August 22, 2005.
Havenstein, Heather, Sabre Launches Web 2.0 Social Network for Corporate
Travelers, Computerworld, February 20, 2008.
Information Week, Sabre Agrees to Buy European E-Travel Company, May 12,
2005.
Fox News, Private-Equtiy Groups Buying Travelocity Parent Sabre for $4.5
Billion, December 12, 2006.
Kontzer, Tony, Travel Execs Get A Glimpse of Their Future, Information Week,
May 7, 2004.
Kontzer, Tony, Bound For Industry Upheaval--With a Layover in Dallas,
Information Week, June 7, 2004.
Kontzer, Tony, Sabre Lands Low-Fare Carriers Airfares, Information Week,
October 14, 2005.
Kontzer, Tony, VC Deal Signals Turbulence Ahead for Airlines Legacy IT,
Information Week, January 30, 2006.
Perez, Juan Carlos, Travel Search Players Unite to Oppose Google-ITA
Merger, Computerworld, October 26, 2010.
712 Chapter 10: Strategic Analysis
Rosencrance, Linda, Sabre Launches Interline E-Ticketing Hub,
Computerworld, February 3, 2004.
Verton, Dan, Alaska Airlines Switches to Linux-based Fare Searching,
Computerworld, February 2, 2004.
The Wall Street Journal, Southwest Airlines Adds Sales Outlet, May 17, 2007.
Case: American Airlines
American Airlines (ticker: AA) is one of few original airlines still in existence.
The company traces its history back to mail fights by Charles Lindbergh in 1926.
By February 1937, American had carried one million passengers. At the start of
1959, American was the frst to offer coast-to-coast jet service with the Boeing
707. In 1959 and 1960, American teamed up with IBM to develop and imple-
ment the SABRE (Semi-Automated Business Research Environment) system for
handling reservations and business data. By 1964, the SABRE network extended
across the U.S., Canada, and Mexico. American was proud to be at the leading
edge of aerospace and information technology (www.aa.com--history).
When the airline industry was deregulated in 1978, low-cost carriers arose
across the nationled by People Express in New Jersey. For four long years, the
major carriers did not know how to compete. In 1985, American turned to the data
held in the SABRE system to devise a winning strategy. Introducing Super Saver
faresfor travelers who booked in advance and stayed over SaturdayAmerican
was able to compete dollar-for-dollar with the low-cost carriers. The secret was to
hold back enough seats on each fight to sell at substantially higher rates for busi-
ness travelers who booked at the last minute. The years of fight and passenger
data held in the SABRE system enabled American to perform yield management
to determine the optimum number of seats to hold back on each fight. In 1981,
American Airlines started AAdvantage as the frst frequent fier program. It was
initially targeted to business travelersto encourage loyalty (CNN Online 2006).
Over time, despite the various attempts by American and the other big carri-
ers, competition changed the airline industry. The expansion of Southwest drove
lower fares into new markets, which dramatically increased the number of pas-
sengers. Increasingly, American had to focus on cutting costs, and emphasizing
its global access. But fights became commodities, where passengers simply want
to get to their destination on time. But airlines cannot just throw in the towel and
give up. In the 1980s, Bob Crandell, the CEO at American, thought about trying
to become like Southwest Airlines, but realized it was not possible. Instead, the
company focuses on using technology and creating systems to reduce costs and
provide better service to customers (Rosencrance 2005).
In 2011, American began offering Samsung Galaxy Tab 1.0 devices to premium
class passengers on its fights. The tablet is confgured to provide in-fight enter-
tainment and will allow passengers to browse the Web or check e-mail on fights
with Wi-Fi installed (Hamblen 2011). Like the other carriers, American lost $2.1
billion in 2008 and $1.5 billion in 2009. But, unlike some of the others, American
continued to suffer losses ($0.5 billion) in 2010 (2010 Annual Report).
713 Chapter 10: Strategic Analysis
Technology
Sabre drove American Airlines for 40 years, handling transactions and provid-
ing information about fights and crews. But, American became dependent on the
system, and it was a system designed in the 1960s. When employees have new
ideas, it can be diffcult or impossible to reprogram Sabre to incorporate innova-
tions. Captain Doug Pinion, scheduling chairman for the Allied Pilots Association
at American, has had several ideas for saving money. For instance, he suggested
back-up pilots could use the Web to bid on fights scheduled for the next day. But
pilots suggestions are overruled as too expensive, and American selects pilots
based on seniority; phoning each person in turn. The problem is that the informa-
tion system is too diffcult to reprogram for new tasks. Americans CIO in 2003,
Monte Ford, said that all of the major airlines face the same issues. In a lot of
ways were better advantaged because of the kinds of upgrades weve completed
or are about to complete (Gage 2003). Some operations have been moved onto
Unix and Windows serverspulling data from the Sabre transaction processing
system. However, Ford believes that the mainframe system is still the best way to
handle millions of transactions.
In many ways, the advent of the Internet accelerated the conversion of airline
seats into commodities. Customers, tourists and businesses, can quickly and eas-
ily see the prices. Some Web sites, such as farecast.com, even track patterns for
fights, and others can provide immediate notifcations of any price changes. Hen-
ry Harteveldt, a vice president at Forrester Research noted that yield-manage-
ment systems made it possible to have more fare types than seats on an airplane.
But the airlines got greedy, and their bad pricing strategies caught up with them
when the Internet exposed the pricing structures. The bottom line is that the es-
tablished carriers have substantially higher operating costs than the discount carri-
ers, as much as 7.2 cents per seat-mile (Rothfeder 2005).
Reducing costs will entail more than wringing additional concessions from la-
bor, retiring old planes, and closing a few hubs. Even after exiting bankruptcy,
Delta and United only reduced costs by small amounts. Ultimately, the big airlines
like American will have to fnd a way to simplify operations and reduce the huge
administrative costs. The micro-jets are waiting in the wings. Robert Crandall,
ex-CEO of American Airlines, and Cameron Burr, son of Donald Burr, ex-CEO
of People Express, have teamed up to start an executive taxi service called Pogo
based on microjets (Meehan 2007). Depending on the progress of FAA certifca-
tions, operations were planned to start in 2008. For about the same price as busi-
ness-class seats executives will be able to charter a fight that fies directly to the
desired airport on any desired time schedule. The jets can fy into smaller, more
convenient airports, and passengers will have no lines for security, check-in, or
baggage. Ultimately, the jets could eat away at the passengers that yield-manage-
ment relies on for profts.
American faced the same problems as every other airline during the recession.
In an attempt to reduce costs, it tried to encourage passengers to book fights di-
rectly on its Web site and to send booking data directly to travel agents (2010
Annual Report). The company ran into contract-violation problems when it tried
to remove its listings from the major ticketing agencies, and eventually relisted
its fights on most of the systems (Cameron 2011). In 2011, American sued Orbitz
and Travelport LP alleging anticompetitive practices. Overall, the company is fo-
cused on reducing costs.
714 Chapter 10: Strategic Analysis
Questions
1. How can American compete with Southwest?
2. Is it possible to rebuild Americans information system?
3. How can American compete with the coming microjets?
Additional Reading
Cameron, Doug, American Ups Ante in Dispute, The Wall Street Journal, April
14, 2011.
CNN Online, Frequent Flier Programs Straying Off Course? June 29, 2006.
Gage, Deborah, American Airlines: Hitting Turbulence, Baseline, July 1, 2003.
Hamblen, Matt, American to Offer Galaxy Tab 10.1 to Premium Class
Passengers, Computerworld, June 13, 2011.
Rosencrance, Linda, IT Gives Airlines a Lift, Computerworld, September 5,
2005.
Rothfeder, Jeffrey, Can Information Technology Save the Airlines? CIO
Insight, February 5, 2005.
Meehan, Rod, Getting a Move On, Conntact.com, May 14, 2007.
Summary Industry Questions
1. What information technologies have helped this industry?
2. Did the technologies provide a competitive advantage or were they quickly
adopted by rivals?
3. Which technologies could this industry use that were developed in other
sectors?
4. Is the level of competition increasing or decreasing in this industry? Is it
dominated by a few frms, or are they fairly balanced?
5. What problems have been created from the use of information technology
and how did the frms solve the problems?
715
What You Will Learn in This Chapter
How can small businesses use information technology?
How are small businesses different from larger ones?
What information and technology do small businesses need?
How do you start a business?
How will your business be different from the existing frms?
How do you turn an idea into money?
Is it true that genius is 1 percent inspiration and 99 percent perspiration?
What additional steps are required to start and EC frm?
Why did thousands of dot-com frms fail?
How does cloud computing help startup frms?
Chapter Outline
Entrepreneurship
11
Chapter
Introduction, 716
Small Business Constraints, 717
Money, 718
Workers and Specialists, 720
Information Technology Expertise, 721
Strategic Power, 723
Information Tasks, 724
Operations and Transactions, 724
Tactics and Decisions, 727
Strategies, 728
Selecting Technology Levels, 729
Managing Consultants, 730
Internationalization, 731
Entrepreneurship, 731
Idea, 732
Strategy, 732
Research, 734
Plan, 736
Strategy, Competition, and Market
Analysis, 738
Forecasts, Cash Flow, and Investment
Budget, 738
Marketing, 740
Online Advertising, 741
Organization and Timetable, 742
Implementation, 742
Ownership Structure, 743
Financing, 744
Accounting and Benchmarks, 747
Starting an e-Commerce Firm, 748
Analysis of Dot-Com Failures, 749
Pure Internet Plays, 749
Proft Margins, 750
Advertising Revenue, 751
Cloud Computing, 752
Summary, 752
Key Words, 754
Web Site References, 754
Review Questions, 755
Exercises, 755
Additional Reading, 757
Cases: Entrepreneurship, 758
716 Chapter 11: Entrepreneurship
Petz Enterprises, Inc.
Introduction
How can small businesses use information technology? In many
ways, this question has already been answered in the other chapters. You can ap-
ply the same analyses and tools to any size business. However, small businesses
often face a shortage of investment money and skilled IT workers. Business own-
ers also do not have time to spend hours thinking about IT solutions. Yet, technol-
ogy applied correctly can save business owners a considerable amount of time and
money. With the relatively low cost and tremendous power of information tech-
nology, it is possible to run relatively complex businesses with a small number of
people.
A second major question addressed in this chapter involves starting a new busi-
ness. What technologies do you need to start a business? And how can you create
a company to make money online? Entrepreneurship is a growing feld in the busi-
ness discipline and you can probably take many courses to learn how to analyze
product ideas and create a new business. This chapter reviews some of the basic
concepts and shows how technology is used to make it easier and provide more
information. Starting from scratch forces you to focus on the information you will
need to run the business. It is a good opportunity to evaluate the technologies
and data you will need to operate a business. Selling products online is relatively
straightforward today. Building new Web 2.0 applications or even phone-based
applications requires developing custom programs.
How can small frms use the Internet to improve their business? Petz Enterprises
in Tracy, California, is a family-run company that specializes in income taxes. The
company became a leader in providing software to professional accounting frms and
storefront tax offces. The tax-accounting staff at Petz keeps up with the hundreds of
tax-code changes made by the federal and state governments. It then writes the rules
that compute the taxes and print the forms. As a closely held company, Petz does not
report its fnancial data.
With the growth of the Internet, Leroy Petz, Sr., decided that the frm had to ex-
pand and create a system that could be used directly by individuals. The initial Tax-
Brain site attracted several respondents in the frst two years. After it was given a
substantial facelift, and backed by online advertising, the site became the third most
popular tax site on the Internet. TaxBrain faces some serious competition with the
well-known brands of H&R Block and TurboTax (Intuit).
Entrepreneurship, the development of new frms, is an idea that foats in the minds
of many businesspeople. In 2003, over 500,000 new frms were started. On the other
hand, almost the same number of frms were closed in the same time period. The
Small Business Administration (SBA) reports that about two-thirds of new employer
frms survive at least two years. Fifty percent survive past four years (Bounds 2004).
Information technology plays an important role in many small frmsbecause en-
trepreneurs need higher productivity. The Internet in some ways makes it easier to
start or expand a business. In other ways, it increases the marketing and technical
costs. And the Internet is certainly no guarantee of profts or success.
717 Chapter 11: Entrepreneurship
Even if you do not intend to start or run a small business in the next year or
two, you should read this chapter. First, with the number of small businesses cre-
ated each year and the growth rates, there is a good chance that someday you will
work for one. Second, the chapter serves as an integrated review of many of the
concepts covered in the other chapters. In a small business, the manager/owner is
responsible for putting everything together to solve problems and grow the frm.
All of the aspects of information technology are used in this process.
What is a small business? The simple defnition is any independent business
that is not dominant in its industry. However, the U.S. Small Business Adminis-
tration uses more specifc defnitions for its fnancial lending programs. The base
defnition is frms with fewer than 500 employees. In some industries, the number
of employees drops to 100, in others it goes as high as 1,500. Using the 500-em-
ployee defnition, the SBA concludes that about half of the employees in the U.S.
work for small businesses, and 99.9 percent of businesses are small. The year
2007 saw 688,395 new employer frms created, but 592,410 were closed for a net
gain of about 96,000 new frms. An employer frm is a company that has employ-
ees. It does not include single-person self-employment. Figure 11.1 shows the
basic totals for 2009 (the most recent data available).
Small Business Constraints
How are small businesses different from larger ones? In many
ways, all businesses have the same tasks to perform regardless of the size of the
frm. On the other hand, small businesses face several constraints that can often
determine whether the company succeeds or fails. The biggest issue is money
or investment capital. Partly tied to the issue of money, small businesses have
smaller numbers of workers and generally lack specialistsparticularly in man-
agement. Consequently, the owner, or a designated manager, handles most of the
management tasks; and usually runs out of time each day. Outside the technology
industry, few small businesses have any expertise with information technology.
Finally, small businesses often survive by selling to one or two large companies.
Looking at Porters Five Forces model, it means that small businesses often lack
strategic power. They must rely on goodwill and mandates of their largest custom-
ers. All of these constraints make it diffcult for the small business to thrive and
expand.
Figure 11.1
Small business numbers. In total, small businesses in the U.S. employee about half of
the total workers and constitute 99.9 percent of the number of frms. Source: www.
sba.gov. *The most recent birth and termination data is from 2007.
Estimates 2005 2009
Employer frms (nonfarm) 5,992,400 5,815,800
Employer frm births 671,800 688,395*
Employer frm terminations 544,800 592,410*
Self-employment, nonincorporated 10,500,000 9,800,000
Self-employment, incorporated 5,300,000 5,500,000
Business bankruptcies 39,201 60,837
718 Chapter 11: Entrepreneurship
Money
Small businesses by defnition do not generate as much revenue as large frms and
have fewer assets to borrow against. The numbers show that small frms also gen-
erate less revenue per employee than large frms do. Many have been in existence
only a short time. With these factors, small businesses often have problems acquir-
ing the money needed to expand a business, hire workers, or purchase technology.
Financing options are examined in more detail in the Entrepreneurship section,
but every small business has problems raising money. Eventually, businesses that
are successful will generate profts that can be used to pay for items that fuel ad-
ditional growth. But, except for some rare cases, this money is incremental and
growth is limited to a small annual percentage.
In the meantime, businesses face ongoing expenses. Many of them are fxed
costs such as leasing space, employee salaries, professional services (legal and
accounting), insurance, vehicles, marketing, and information technology. Small
business owners have a tendency to look at the frms expenses as deductions from
their take-home proft. Buying a new server might be nice, but at $5,000 it could
represent 5-10 percent of the annual proft available to the owner. Consequently,
small businesses are often reluctant (or unable) to invest in new technologies un-
less there is an immediate payoff in terms of reduced expenses or increased rev-
Trends
Small businesses make up about half of the U.S. economyparticularly in
terms of employment. There is a high probability that you will work for a
small business at some in your career. Perhaps you will even want to start
your own company or become self-employed. The Census Bureau keeps sta-
tistics on the number of people employed by small businesses. The ratio of
the number of small businesses to large has been relatively constant since the
late 1980s. The percentage of people working for small versus large compa-
nies has changed slightly over time. In the late 1980s, about 9 million more
people worked for small frms than for large ones. In the late 1990s, despite
a growth in the number of people employed in businesses hiring 20-99 em-
ployees, larger frms began hiring a greater percentage of the total employ-
ees. Perhaps because of the collapsing dot-com economy, workers switched
to the security of larger frms so that the share was balanced in 2001. Since
that time, large and small frms have hired about equally.
However, you see more interesting results by looking at the total payrolls
and the revenues of the two frm sizes. From the early 1990s, large frm an-
nual payrolls have grown faster than small frms. In 2007, the average salary
per employee was $47,400 for large frms compared to $37,300 for small
frms (79 percent). It is possible that these numbers are distorted by the huge
salaries paid to CEOs at large frms, but it is clear that large frm payrolls are
higher. Total revenues are not reported every year, but in 2007, large frms
earned an average of $302,000 per employee compared to only $190,000 for
small frms (63 percent). Small frms spend a higher percentage of revenue
in payroll. The lower revenue and higher salary expenses strongly affect the
way small frms are managed.
719 Chapter 11: Entrepreneurship
enue. Figure 11.2 shows that large frms pay more on average, but small frms
spend a higher percentage of revenue on employee payrolls.
Figure 11.3 shows another perspective on money by comparing small frms to
large frms in terms of receipts and payroll. The base numbers consist of total re-
ceipts divided by total employees and total payroll divided by total employees. In
every case, the values for the small frms are lower than those for the large frms.
The table shows the value for the small frms as a percentage of those for the large
frms. For example, in 2007, average receipts per employee in small frms were
62.9 percent of the value for large frms. And payroll per employee for small frms
was 79.3 percent of the value for large frms.
Figure 11.2
Large v. Small Payroll. Large frms have a higher total payroll. Since the number
of employees is about equal, the difference arises because large frms pay higher
salaries.
Source: http://www.census.gov/econ/susb/historical_data.html
0
500
1000
1500
2000
2500
3000
3500
Payroll (Billion$)
500+
Small
Figure 11.3
Small v. Large receipts and payroll. The table shows the percentage of small over
large frms. For example, in 2007, the average receipts per employee in small frms
were 62.9 percent of those in large frms.
Source: http://www.census.gov/econ/susb/historical_data.html
Year Receipts/Emp Payroll/Emp
1997 64.4% 80.8%
2002 63.0% 81.6%
2007 62.9% 79.3%
720 Chapter 11: Entrepreneurship
Larger frms could have higher receipts per employee due to economies of scale
which includes a broader base of customers and more effcient use of technology.
Typically, they have also been around longer, so they have an established base of
customers. Note that although small frms pay less per employee than large frms,
the revenue per employee is even lower. Consequently, proftability is going to be
squeezed at smaller frms.
Fortunately, with the declining costs of technology, it is easier for frms to pur-
chase powerful tools at relatively low costs. More importantly, with the expansion
of service frms, small businesses can pay monthly fees for high-end software and
services. A large frm might pay hundreds of thousands or millions of dollars and
hire experts to customize an ERP system. A small business cannot afford the hard-
ware, much less the software and personnel to build an ERP and keep it running.
Instead, the small business can contract with an online provider to host and run the
ERP system. For a few dollars a month, the small business can obtain almost the
same effectiveness. And, the system can be scaled up as the company growsso
the small business pays a small fee now but can expand the system later when
revenues increase.
Workers and Specialists
In part because of the money constraints, small businesses do not hire as many
workers. They will have to hire workers on the production sidefactory or ser-
vice workers and salespeople. But, it is expensive to hire back-offce administra-
tors or managers. Workers that do not directly generate revenue are seen as an
expense. They are hired only when the owner needs additional support or specifc
expertise. Accounting, marketing, and production managers are the most common
employees.
Small businesses rarely hire information technology specialists (outside of
technology and EC frms). Workers are expected to know how to use the basic
personal productivity tools. When things break, small businesses rely on service
contracts or local consulting frms to solve problems. As a result, it is diffcult for
small businesses to keep up with technology changes or to know what tools are
available to help them. They are also at the mercy of the local repair companies in
terms of pricing for service and support.
On the other hand, small businesses in specifc industries can often purchase
the information technology they need as an off-the-shelf package. For instance,
dentists, physicians, attorneys, restaurants, and so on can choose from many turn-
key systems. The name derives from the concept that the business buys the pack-
age of hardware and software, plugs it in, turns the metaphorical key, and has
everything necessary to run the business. The systems company provides support,
training, and upgrades. Turn-key systems exist for a surprising number of busi-
nesses. You can often fnd them through advertisements in trade magazines for the
specifc industry. Or, you can visit similar businesses to see what they are using.
The prices sometimes seem a little high, but they are often based on monthly pay-
mentsavoiding the need for large amounts of money up front.
To offset these drawbacks, small businesses should consider paying a consul-
tant every year or two to evaluate their operations and security. Some accounting
frms provide this service and some will require EDP audits to ensure basic secu-
rity provisions are being met. IT consulting to evaluate technology levels, costs,
and effectiveness is also available.
721 Chapter 11: Entrepreneurship
Information Technology Expertise
Figure 11.4 shows that the lack of IT expertise affects more than purchasing and
managing systems. As noted, day-to-day operations can be handled through pur-
chased systems and support contracts. Often the bigger constraint is that small
businesses do not know how to use IT to solve business problemsparticularly
in terms of searching for a competitive advantage. For example, a law frm can
purchase a time-and-billing system to track paperwork and bill clients. But, the
system and the attorneys know nothing about using technology for marketing or
teamwork. Perhaps the frm specializes in specifc complex cases. It could beneft
from a teamwork system that saves all of the prior work in a knowledge manage-
ment systemreducing the time it takes to prepare the next case. Such a system
could be created relatively cheaply using a SharePoint server, but if there is no
turn-key system for it and no in-house IT specialist, the frm might never know
such a system is possible or affordable.
Computer security is another critical area of expertise that is unavailable in most
small businesses. Properly installed, good turn-key systems include provisions for
security. Most use passwords to grant permissions, and most have semi-automated
backup systems to make it easy for businesses to maintain regular backups of the
data. But, with a small number of employees, managers often circumvent the in-
ternal security provisions. For example, it is common to assign a single account
with password for everyone to share. It simplifes creating accounts and solves
Figure 11.4
Lack of IT expertise. Small businesses need to hire someone to help with basic IT
tasks. Operations and transactions generally work because they have to work. Tactics
and strategies along with security tasks are often skipped because of the perceived
cost.