Ahad, 15 Disember 2013

CHAPTER 9 : E-COMMERCE

SOCIAL COMMERCE CREATES NEW CUSTOMER RELATIONSHIP

Question 1
Assess the people, organization, and technology issues for using social media to engage with customers.
Nowadays, most people will use the social media to keep in touch with friend and let them know what they recently doing. However, these social media such as Facebook, Twitter, Instagram, and Line can become powerful tools for engaging customers in business for all companies of all shapes and sizes. In addition, location based businesses like gourmet food trucks can tweet their current location to loyal followers and fans. Appointment-based businesses can easily tweet or post cancellations and unexpected openings. Larger companies run sweepstakes and promotions and cn have an opportunity to shape the perception of their brands and to solidify relationships with their customers.
Companies are rolling out ads that capitalize on the social media features of Facebook to achieve greater visibility. For example, Facebook ads feature the ability to ‘Like’ a brand, send a virtual gift, answer a poll question, or instantly stream information to your news feed. Facebook also allow you to following the fan page of the brand and can get the new feed about the brand or the updates news, promotion, and competition.

Question 2
What are the advantages and disadvantages of using social media for advertising, brand building, market research, and customer service?
Advantages
a)      Companies of all sizes have an opportunity to shape the perception of their brands and to solidify relationships with their customers.
b)      To achieve greater visibility- Facebook ads feature the ability to “like” a brand, give comment, answer poll question, send a virtual gift
c)       To allow customers to socialize and share their purchases with friends through social media
d)      Answer user question and respond to complaints. Companies can easily manage the complaints of products from user and get improvement overall through these application.
e)      Companies uses text mining to gather data and convert then to useful information and uses the information to gauge the success of promotions, which products are hot and which are duds, and the impact of advertising campaigns.
f)       Use social media- Facebook’s targeting capabilities to determine which types of people respond to the various ads it has created.

Disadvantages
a)      The result can be unpredictable, and not always beneficial, as Starbucks learned. Starbucks launched a social media contest, which was essentially a scavenger hunt for advertising posters in Twitter. The campaign backfired. At the urging of anti- Starbucks protesters, users flooded Starbucks’ Twitter feed with pictures of employees and protesters holding signs criticizing Starbucks’ labor practices.

Question 3
Should all    companies use Facebook and Twitter for customer service and advertising? Why or why not? What kinds of companies are best suited to use these platforms?

Yes, companies should use these social media-Facebook and Twitter for customer service and advertising. This is because Facebook and Twitter more effective compare to others. Facebook and Twitter is a social web and have a large amount of people or companies link their business, company products to social media. Companies with selling digital goods like camera, smartphone and so on are suitable to use the platform because social media need be efficiently and good performance with digital products.

CHAPTER 3 : INFORMATION SYSTEM, ORGANIZATION, AND STRATEGY.

INTERACTIVE SESSION TECHNOLOGIES: STARBUCK’S

1.      Analyze Starbucks using the completive force  and value chain models 

Align it with business objective
Starbuck has revamped its in-store technology and sought to integrate its business processes with wireless technology and the mobile digital platform.


Strenghten customer and supplier intinacy
Royal customer can spend time using the free Wi-Fi wireless networks offered in each store.


Product differentiation
Starbucks pursued a more aggressive product differentiation strategy, intended to emphasize the high quality of its beverages and efficient and helpful customer service. Starbucks also focused on becoming “lean” like many of its competitors eliminating inefficacy wherever possible.


Value chain model

Primary Activities
Starbuck is the world largest specialty coffee retailer.

Support activities

Starbucks launch Starbucks digital networks, a portal design specifically for mobile devices.



2.      What is Starbucks business strategy?
Starbuck’s improved their business using several different strategies. For example, the company implemented a technology that allows customer to pay by using smartphone app.

3.   How much has technology helped Starbucks compete?
 Technology is the main platform for Starbucks’s to compete with others. This is because Starbucks digital networks to intimate with customer and at the same time to market their brands and products.

CHAPTER 7 : SECURITY INFORMATION SYSTEMS

CASE STUDY 7 : INFORMATION SECURITY THREATS AND POLICIES IN EUROPE   


1.What is the bonet?
Bonet is a network of autonomous malicious software agents that are under the control of a bot commander.

2.Describe some of the main points of the Digital Agenda for Europe.
The goal of  Digital Agenda for Europe to define the key role that information and communication technologies wiill play in 2020. Another goal is that broadband speed of 30Mps be available to all European citizens by 2020. In term of security, the initiative is considering the implementation of measures to protect privacy and the establishment of a well-functioning network of CERT to prevent cybercrime and respond effectively to cyber attacks.

3.Explain how a cyber attack can be carried out.
The attack was performed using a variety of technique, ranging from simple individual ping commands and massage flooding to more sophisticated distributed denial of service (DDoS) attacks. Hackers coordinated the attack by using a large number of compromised servers organized in a botnet distributed around the world. Once a computer is infected it becomes part of a network of thousands of “zombies,” machines that are commanded to carry out the attack.

4.Describe some of the weaknesses exploited by malware.
The weaknesses exploited by malware hackers had stolen codes that were then used to insert links to external servers containing malicious codes, infected computers could be under full control of the hackers and distrupt computer operation, gather sensitive information or gain access to private computer system.

Isnin, 9 Disember 2013

CHAPTER 10: IMPROVING DECISION MAKING AND MANAGING KNOWLEDGE.

INTERACTIVE SESSION: TECHNOLOGY – Albassami’s Job Is Not Feasible Without IT


1.      What systems are described here? What valuable information do they provide?

The system needed the facility to serve specific sectors in the organization, in addition to providing information throughout the group. The system is based on clustered Dell servers running Windows 2003 and connected to over 270 Window XP clients. The database management system, used as the backbone of the system, is Sybase Adaptive server, whereas clients use SQL Anywhere. There is replication between the server at headquarters and the client’s branches. Throughout the replication, branches’ data is sent to the server and aggregated to create the most updated database version, and the sent back to the branches. This means every branch has the most recent version of the client list, trucks’ availability and new shipping contracts so that any customer is able to deal with any branch at any time.

 Entreprise-wide knowledge management systems are firm wide efforts to collect, store, distribute, and apply digital content and knowledge. Enterprise content management system provide databases and tools for organizing and storing structured documents and tools for organizing and storing semi structured knowledge, such as e-mail or rich media. Knowledge network systems provide directories and tools for locating firm employees with special expertise who are important sources of tacit knowledge. Often these systems include group collaboration tools, portals to simplify information access, search tools, and tools for classifying information based on a taxonomy that is appropriate for the organization. Enterprise-wide knowledge management systems can provide considerable value if they are well designed and enable employees to locate, share, and use knowledge more efficiently. From the study, digital form is the company had to establish several infrastructural components such as the computer network, backup system and security policy this enabled the implementation of various systems including time and attendance systems this has saved a lot of lost working hours and has been linked to the ERP. Next, website having an attractive and informative website has become a major need .the website helps many functional departments including marketing HR, sales, and customers services.

Lastly, Enterprise Resource Planning (ERP) is the company has picked Oracle E-business Suite after meeting planning what would really fit their needs. The modules chosen to help automate the business processes were: Oracle financials, inventory management, manufacturing sales and marketing, order management and procurement. CEO and it consultant involvement   in the project steering committee and adequate training and change management.


2.      What value did the IT/IS investments add to Albassami?


Since the system is based on clustered Dell servers running Windows 2003 and connected to over 270 Window XP clients. The database management system, used as the backbone of the system, is Sybase Adaptive server, whereas clients use SQL Anywhere. There is replication between the server at headquarters and the client’s branches. Throughout the replication, branches’s data is sent to the server and aggregated to create the most updated database version, and the sent back to the branches. The IT/IS investments add to Albassami achieving some strategic business objectives which are operational excellence, new products, customer and supplier intimacy, improved decision making and competitive advantage.


3.      How did implementing the Shipping Information System address the business needs and information requirements of Albassami?

The shipping information system used at Albassami maintains all the sender information such as the sent car, the truck number, the sender and receiving branches, and it also send an SMS to the client acknowledging the arrival of the car. The system also records the client’s data, and holds maintenance information. Linking the data of vehicle maintenance centers with the transportation service helps to enhance company performance and achieve better customer service. The system also enables standard reports to be provided to top management and head sectors about the productivity of each branch, resulting in accurate identification of needs for different regions and thus proper budget allocation. In addition, the system allowed a better audit on all drivers’ tracking information.

Ahad, 8 Disember 2013

CHAPTER 12 : Ethical And Social Issues In Information Systems

CASE STUDY 12 : LIFE ON THE GRID – iPhone BECOME iTRACK

1.     
Why do cell phone manufacturers (Apple, Google, and BlackBerry) want to track where their customers go?
        
Generally, cell phone manufacturers have their own agenda in business perspective. And maybe the main reason is for money. As we all know, Apple and Google are company which has advertising platforms. They also firms that are building massive databases that can pinpoint customer location. So, advertising firms will pay them for that information and for distributing their mobile ads.        Apple transmits customer location data back to central servers once every 12 hours, and also stores a copy of the locations on the iPhone. Android phones transmit the location data continuously. Apple’s technology reads the signal strength of nearby Wi-Fi transmitters, identifies and maps the location, and then calculates the location of the iPhone device.        But Apple and Google say they do not share this information with third party, deny the information can identify individuals. In facts, Apple and Google claim that the information is being used only to identify the location of cell phones for Wi-Fi-connected phones, and improve the customer experience of location-based services. Moreover, both companies say the location information is needed for them to improve their services.

2.     
Do you think cell phone customers should be able to turn tracking off? Should customers be informed when they are being tracked? Why or why not?
         
Yes, I absolutely agree that cell phone customers should be able to turn tracking off. This is because sometime people want to be alone especially when having a conflict and need some fresh air and making the decision. So, by having the cell phone tracking may disturb people’s privacy.           Due to those factors, customer should be informed first when they are being tracked. It is more proper and efficient, if user can have a choice - on and off button – on using this cell phone tracking.

3.     
Do you think cell phone tracking is a violation of a person’s privacy?
        
Based on my understanding throughout my reading, I think that phone tracking is a violation of a person’s privacy is absolutely correct. Privacy is the claim of individuals to be alone, free from surveillance or interference from other individuals or organizations or organizations, including the state. Information technology and systems threaten individual claims to privacy by making the invasion of privacy cheap, profitable, and effective.          Clearly, we can see that by existing of cell phone tracking can give a golden opportunity to criminal or enemy. Yes, there are lots of advantages that we can get from cell phone tracking which it can give you a wonderful experience. But also you need to see from a negative view that which it might turn you to an anxiety moment. SAFETY FIRST! That is more important. As we know, mobile technologies based on the smartphone make it possible to locate people throughout the day, to report this information to corporate data bases, retain and analyze the information.           Meaning that, we have no place to hide ourselves from people. In other word, we have no right to be in privacy. This is not fair! 

CHAPTER 11: Building Information System And Managing Projects

CASE STUDY 11: DST SYSTEMS SCORES WITH SCRUM AND APPLICATION LIFECYCLE MANAGEMENT

1.      What were some of the problems with DST System’s old software development environment


Some of the problems with DST System’s old software development environment are this development group had used a mixture of tools, processes, and source code control systems, without any unified repository for code or single developer tool set. Different groups within the organization used very different tools for software development, like Serena PVCS, Eclipse, or other sources code software packages. Processes were often manual and time consuming.
  Managers were unable to easily determine how resources were being located, which of their employees were working on certain projects, and the status of specific assets. Its typical development schedule was to release a new version once every two years, but competitors were releasing version faster. DST knew that it needed a better method than the traditional “waterfall” method for designing, coding, testing, and integrating its products. In the waterfall model of software development, progression flows sequentially from one step to the next like a waterfall, with each step unable to start until the previous step has been completed. While DST had used this method with great success previously, DST began searching for viable alternatives.

2.     
How did Scrum development help solve some of those problems?
DST tried Scrum with its existing software development tools and experienced strong results. The company accelerated its software development cycle from 24 to 6 months and developer productivity increased 20 percent, but Scrum didn’t work as well as DST had hoped with its existing tools. Processes broke down and the lack of standardization among the tools and processes used by DST prevented Scrum from providing its maximum benefit to the company. DST needed an application lifecycle management (ALM) product that would unify its software development environment. DST set up a project evaluation team to identify the right development environment for them. Key factors included cost-effectiveness, ease of adoption, and feature-effectiveness. DST wanted the ability to use the new software without significant training and software they could quickly adopt without jeopardizing AWD’s development cycle. After considering several ALM products and running test projects with each one, DST settled on CollabNet’s offering, Team Forge, for its ALM platform.

3.     
What other adjustments did DST make to use Scrum more effectively in its software projects? What people, organization, and technology issues had to be addressed?
The CollabNet specializes in software designed to work well with agile software development methods such as Scrum. So from the article is DST adapted Collabnet’s subversion product to help with the management control of changes to project documents, programs, and other information stored as computer files. DST adaption of Collabnet because their products is so fast in only 10 weeks. The management organization and the technology Jerry Tubbs, The system development at DST system, says DST was successful in attempts to revamp the software group because some factors.1) looked for simplicity rather than complicated 2) Involved developers in the decision making process to ensure that change to be greeted enthusiastically 3) Allow for the developers to adopt ALM software on their own. Also the company was successful because they selected the right development framework as well as the right software to make that change a reality and skillfully managed the change process.

CHAPTER 8 : Achieving Operational Excellence And Customer Iintimacy - Enterprise Application

CASE STUDY 8 : CUSTOMER RELATIONSHIP MANAGEMENT HEADS TO THE CLOUD

1. What types of companies are most likely to adopt cloud-based CRM software services? Why? What companies might not be well- suited for this type of software?

The traditional enterprise software vendors like Oracle are using their well established position to grad a share of the cloud-based application market; newcomers like Right Now, Compiere, and Sugar CRM have found success using some different tactics. Because most companies that are interested in cloud computing are small or midsize and lack the know-how or financial resources to successfully build and maintain CRM applications in-house. However, the large companies have made the switch to cloud. Company officials were hoping to eliminate maintenance and administrative costs, but not at the expense of a storage system that meets their requirements, were never out of service, and worked perfectly.

2. What are the advantages and disadvantages of using cloud-based enterprise applications?

The cloud-based advantages as it attempted to merge information from different sources, and many smaller companies have taken advantage of a new type of cloud computing. For example, cloud-based applications can merge customer data 25 disparate sources and applications into a single system. The systems automates customer service functions including order conformations, follow-up customer satisfaction surveys, and shipping notifications. Besides that, the system tracks field activities for more than 10,000 accounts, with automated reports and dashboards monitoring key performance indicators, sales calls, and sales volume.
Disadvantage is that company officials were hoping to eliminate maintenance and administrative costs, but not at the expense of a storage system that met their requirements, was never out of service, and worked perfectly and they will cost a lot of money from enterprise. Besides that, companies that manage their CRM apps with a cloud infrastructure have no guarantee that thei data will be available at all times, or even that the provider will still exist in the future.


3. What management, organization, and technology issues should be addressed in deciding whether to use a conventional CRM system versus a cloud-based version?

Nikon found that not only Right Now had the capability to implement that system, but also it had an array of other useful services. When Nikon discovered that it could combine outbound e-mail, contact management, and customer records into a single system in Right Now’s cloud, it made the move, expecting to receive a solid return on the investment. However, more customers found the information they needed on the Web, call response times dropped by 50 percent, and incoming e-mail dropped by 70 percent. While Nikon still hosts its SAP ERP system internally due to its complexity, Nikon switched its entire CRM system to Right Now. Companies that manage their CRM apps with a cloud infrastructure have no guarantees that their data will be available at all times, or even that the provider will still exist in the future.