564 Part Four Building and Managing Systems
globally shared media such as movies now permits different cultures and
peoples to develop common expectations about right and wrong, desirable and
undesirable, heroic and cowardly. The collapse of the Eastern bloc has speeded
the growth of a world culture enormously, increased support for capitalism and
business, and reduced the level of cultural conflict considerably.
A last factor to consider is the growth of a global knowledge base. At the end
of World War II, knowledge, education, science, and industrial skills were
highly concentrated in North America, western Europe, and Japan, with the
rest of the world euphemistically called the Third World. This is no longer true.
Latin America, China, India, southern Asia, and eastern Europe have devel-
oped powerful educational, industrial, and scientific centers, resulting in a
much more democratically and widely dispersed knowledge base.
These general cultural factors leading toward internationalization result in
specific business globalization factors that affect most industries. The growth of
powerful communications technologies and the emergence of world cultures
lay the groundwork for global markets—global consumers interested in
consuming similar products that are culturally approved. Coca-Cola, American
sneakers (made in Korea but designed in Los Angeles), and Cable News
Network (CNN) programming can now be sold in Latin America, Africa, and
Asia.
Responding to this demand, global production and operations have
emerged with precise online coordination between far-flung production
facilities and central headquarters thousands of miles away. At Sealand
Transportation, a major global shipping company based in Newark, New
Jersey, shipping managers in Newark can watch the loading of ships in
Rotterdam online, check trim and ballast, and trace packages to specific ship
locations as the activity proceeds. This is all possible through an international
satellite link.
The new global markets and pressure toward global production and opera-
tion have called forth whole new capabilities for global coordination.
Production, accounting, marketing and sales, human resources, and systems
development (all the major business functions) can be coordinated on a global
scale.
Frito Lay, for instance, can develop a marketing sales force automation
system in the United States and, once provided, may try the same techniques
and technologies in Spain. Micromarketing—marketing to very small geo-
graphic and social units—no longer means marketing to neighborhoods in
the United States, but to neighborhoods throughout the world! These new
levels of global coordination permit for the first time in history the location
of business activity according to comparative advantage. Design should be
located where it is best accomplished, as should marketing, production, and
finance.
Finally, global markets, production, and administration create the conditions
for powerful, sustained global economies of scale. Production driven by world-
wide global demand can be concentrated where it can best be accomplished,
fixed resources can be allocated over larger production runs, and production
runs in larger plants can be scheduled more efficiently and precisely estimated.
Lower cost factors of production can be exploited wherever they emerge. The
result is a powerful strategic advantage to firms that can organize globally.
These general and specific business drivers have greatly enlarged world trade
and commerce.
Not all industries are similarly affected by these trends. Clearly, manufactur-
ing has been much more affected than services that still tend to be domestic
Chapter 15 Managing Global Systems 565
and highly inefficient. However, the localism of services is breaking down in
telecommunications, entertainment, transportation, finance, law, and general
business. Clearly, those firms within an industry that can understand the inter-
nationalization of the industry and respond appropriately will reap enormous
gains in productivity and stability.
Business Challenges
Although the possibilities of globalization for business success are significant,
fundamental forces are operating to inhibit a global economy and to disrupt
international business. Table 15-2 lists the most common and powerful
challenges to the development of global systems.
At a cultural level, particularism, making judgments and taking action on
the basis of narrow or personal characteristics, in all its forms (religious, nation-
alistic, ethnic, regionalism, geopolitical position) rejects the very concept of a
shared global culture and rejects the penetration of domestic markets by
foreign goods and services. Differences among cultures produce differences in
social expectations, politics, and ultimately legal rules. In certain countries,
such as the United States, consumers expect domestic name-brand products to
be built domestically and are disappointed to learn that much of what they
thought of as domestically produced is in fact foreign made.
Different cultures produce different political regimes. Among the many
different countries of the world are different laws governing the movement of
information, information privacy of their citizens, origins of software and
hardware in systems, and radio and satellite telecommunications. Even the
hours of business and the terms of business trade vary greatly across political
cultures. These different legal regimes complicate global business and must be
considered when building global systems.
For instance, European countries have very strict laws concerning transbor-
der data flow and privacy. Transborder data flow is defined as the movement
of information across international boundaries in any form. Some European
countries prohibit the processing of financial information outside their
boundaries or the movement of personal information to foreign countries. The
European Union Data Protection Directive, which went into effect in October
1998, restricts the flow of any information to countries (such as the United
States) that do not meet strict European information laws on personal informa-
tion. Financial services, travel, and health care companies are often directly
affected. In response, most multinational firms develop information systems
within each European country to avoid the cost and uncertainty of moving
information across national boundaries.
TABLE 15-2 CHALLENGES AND OBSTACLES TO GLOBAL BUSINESS
SYSTEMS
GLOBAL SPECIFIC
Standards: Different Electronic Data Interchange (EDI),
Cultural particularism: Regionalism, e-mail, telecommunications standards
nationalism, language differences Reliability: Phone networks not uniformly reliable
Social expectations: Brand-name Speed: Different data transfer speeds, many slower than
expectations, work hours United States
Personnel: Shortages of skilled consultants
Political laws: Transborder data and
privacy laws, commercial regulations
566 Part Four Building and Managing Systems
Cultural and political differences profoundly affect organizations’ business
processes and applications of information technology. A host of specific
barriers arise from the general cultural differences, everything from different
reliability of phone networks to the shortage of skilled consultants.
National laws and traditions have created disparate accounting practices in
various countries, which impact the ways profits and losses are analyzed.
German companies generally do not recognize the profit from a venture until
the project is completely finished and they have been paid. Conversely, British
firms begin posting profits before a project is completed, when they are reason-
ably certain they will get the money.
These accounting practices are tightly intertwined with each country’s legal
system, business philosophy, and tax code. British, U.S., and Dutch firms share
a predominantly Anglo-Saxon outlook that separates tax calculations from
reports to shareholders to focus on showing shareholders how fast profits are
growing. Continental European accounting practices are less oriented toward
impressing investors, focusing rather on demonstrating compliance with strict
rules and minimizing tax liabilities. These diverging accounting practices make
it difficult for large international companies with units in different countries to
evaluate their performance.
Language remains a significant barrier. Although English has become a kind
of standard business language, this is truer at higher levels of companies and
not throughout the middle and lower ranks. Software may have to be built with
local language interfaces before a new information system can be successfully
implemented.
Currency fluctuations can play havoc with planning models and projections.
A product that appears profitable in Mexico or Japan may actually produce a
loss because of changes in foreign exchange rates.
These inhibiting factors must be taken into account when you are designing
and building international systems for your business. For example, companies
trying to implement “lean production” systems spanning national boundaries
typically underestimate the time, expense, and logistical difficulties of making
goods and information flow freely across different countries.
STATE OF THE ART
One might think, given the opportunities for achieving competitive advantages
as outlined previously and the interest in future applications, that most inter-
national companies have rationally developed marvelous international systems
architectures. Nothing could be further from the truth. Most companies have
inherited patchwork international systems from the distant past, often based on
concepts of information processing developed in the 1960s—batch-oriented
reporting from independent foreign divisions to corporate headquarters,
manual entry of data from one legacy system to another, with little online
control and communication. Corporations in this situation increasingly face
powerful competitive challenges in the marketplace from firms that have ratio-
nally designed truly international systems. Still other companies have recently
built technology platforms for international systems but have nowhere to go
because they lack global strategy.
As it turns out, there are significant difficulties in building appropriate
international architectures. The difficulties involve planning a system appro-
priate to the firm’s global strategy, structuring the organization of systems and
business units, solving implementation issues, and choosing the right technical
platform. Let’s examine these problems in greater detail.
Chapter 15 Managing Global Systems 567
15.2 ORGANIZING INTERNATIONAL INFORMATION
SYSTEMS
Three organizational issues face corporations seeking a global position: choos-
ing a strategy, organizing the business, and organizing the systems manage-
ment area. The first two are closely connected, so we discuss them together.
GLOBAL STRATEGIES AND BUSINESS ORGANIZATION
Four main global strategies form the basis for global firms’ organizational
structure. These are domestic exporter, multinational, franchiser, and transna-
tional. Each of these strategies is pursued with a specific business organizational
structure (see Table 15-3). For simplicity’s sake, we describe three kinds of
organizational structure or governance: centralized (in the home country),
decentralized (to local foreign units), and coordinated (all units participate as
equals). Other types of governance patterns can be observed in specific
companies (e.g., authoritarian dominance by one unit, a confederacy of equals,
a federal structure balancing power among strategic units, and so forth).
The domestic exporter strategy is characterized by heavy centralization of
corporate activities in the home country of origin. Nearly all international
companies begin this way, and some move on to other forms. Production,
finance/accounting, sales/marketing, human resources, and strategic manage-
ment are set up to optimize resources in the home country. International sales
are sometimes dispersed using agency agreements or subsidiaries, but even
here, foreign marketing relies on the domestic home base for marketing themes
and strategies. Caterpillar Corporation and other heavy capital-equipment man-
ufacturers fall into this category of firm.
The multinational strategy concentrates financial management and con-
trol out of a central home base while decentralizing production, sales, and
marketing operations to units in other countries. The products and services
on sale in different countries are adapted to suit local market conditions. The
organization becomes a far-flung confederation of production and marketing
facilities in different countries. Many financial service firms, along with a
host of manufacturers, such as General Motors, Chrysler, and Intel, fit this
pattern.
Franchisers are an interesting mix of old and new. On the one hand, the
product is created, designed, financed, and initially produced in the home
country, but for product-specific reasons must rely heavily on foreign personnel
for further production, marketing, and human resources. Food franchisers such
TABLE 15-3 GLOBAL BUSINESS STRATEGY AND STRUCTURE
BUSINESS FUNCTION DOMESTIC EXPORTER MULTINATIONAL FRANCHISER TRANSNATIONAL
Production Centralized Dispersed Coordinated Coordinated
Finance/Accounting Centralized Centralized Centralized Coordinated
Sales/Marketing Mixed Dispersed Coordinated Coordinated
Human Resources Centralized Centralized Coordinated Coordinated
Strategic Management Centralized Centralized Centralized Coordinated
568 Part Four Building and Managing Systems
as McDonald’s, Mrs. Fields Cookies, and KFC fit this pattern. McDonald’s created
a new form of fast-food chain in the United States and continues to rely largely
on the United States for inspiration of new products, strategic management, and
financing. Nevertheless, because the product must be produced locally—it is
perishable—extensive coordination and dispersal of production, local marketing,
and local recruitment of personnel are required.
Generally, foreign franchisees are clones of the mother country units, but
fully coordinated worldwide production that could optimize factors of produc-
tion is not possible. For instance, potatoes and beef can generally not be bought
where they are cheapest on world markets but must be produced reasonably
close to the area of consumption.
Transnational firms are the stateless, truly globally managed firms that may
represent a larger part of international business in the future. Transnational
firms have no single national headquarters but instead have many regional
headquarters and perhaps a world headquarters. In a transnational strategy,
nearly all the value-adding activities are managed from a global perspective
without reference to national borders, optimizing sources of supply and demand
wherever they appear, and taking advantage of any local competitive advan-
tages. Transnational firms take the globe, not the home country, as their
management frame of reference. The governance of these firms has been
likened to a federal structure in which there is a strong central management
core of decision making, but considerable dispersal of power and financial
muscle throughout the global divisions. Few companies have actually attained
transnational status, but Citicorp, Sony, Ford, and others are attempting this
transition.
Information technology and improvements in global telecommunications are
giving international firms more flexibility to shape their global strategies.
Protectionism and a need to serve local markets better encourage companies to
disperse production facilities and at least become multinational. At the same
time, the drive to achieve economies of scale and take advantage of short-term
local advantage moves transnationals toward a global management perspective
and a concentration of power and authority. Hence, there are forces of
decentralization and dispersal, as well as forces of centralization and global
coordination.
GLOBAL SYSTEMS TO FIT THE STRATEGY
Information technology and improvements in global telecommunications are
giving international firms more flexibility to shape their global strategies. The
configuration, management, and development of systems tend to follow the
global strategy chosen. Figure 15-3 depicts the typical arrangements. By systems
we mean the full range of activities involved in building and operating informa-
tion systems: conception and alignment with the strategic business plan,
systems development, and ongoing operation and maintenance. For the sake of
simplicity, we consider four types of systems configuration. Centralized systems
are those in which systems development and operation occur totally at the
domestic home base. Duplicated systems are those in which development occurs
at the home base but operations are handed over to autonomous units in foreign
locations. Decentralized systems are those in which each foreign unit designs its
own unique solutions and systems. Networked systems are those in which
systems development and operations occur in an integrated and coordinated
fashion across all units.
Chapter 15 Managing Global Systems 569
FIGURE 15-3 GLOBAL STRATEGY AND SYSTEMS CONFIGURATIONS
The large Xs show the dominant patterns, and the small Xs show the emerging patterns. For instance,
domestic exporters rely predominantly on centralized systems, but there is continual pressure and
some development of decentralized systems in local marketing regions.
As can be seen in Figure 15-3, domestic exporters tend to have highly
centralized systems in which a single domestic systems development staff
develops worldwide applications. Multinationals offer a direct and striking
contrast: Here, foreign units devise their own systems solutions based on local
needs with few if any applications in common with headquarters (the excep-
tions being financial reporting and some telecommunications applications).
Franchisers have the simplest systems structure: Like the products they sell,
franchisers develop a single system usually at the home base and then replicate
it around the world. Each unit, no matter where it is located, has identical
applications. Last, the most ambitious form of systems development is found in
transnational firms: Networked systems are those in which there is a solid,
singular global environment for developing and operating systems. This
usually presupposes a powerful telecommunications backbone, a culture of
shared applications development, and a shared management culture that
crosses cultural barriers. The networked systems structure is the most visible in
financial services where the homogeneity of the product—money and money
instruments—seems to overcome cultural barriers.
REORGANIZING THE BUSINESS
How should a firm organize itself for doing business on an international scale?
To develop a global company and information systems support structure, a firm
needs to follow these principles:
1. Organize value-adding activities along lines of comparative advantage.
For instance, marketing/sales functions should be located where they can best
be performed, for least cost and maximum impact; likewise with production,
finance, human resources, and information systems.
2. Develop and operate systems units at each level of corporate activity—
regional, national, and international. To serve local needs, there should be
host country systems units of some magnitude. Regional systems units should
handle telecommunications and systems development across national bound-
aries that take place within major geographic regions (European, Asian,
American). Transnational systems units should be established to create the
linkages across major regional areas and coordinate the development and
operation of international telecommunications and systems development
(Roche, 1992).
570 Part Four Building and Managing Systems
3. Establish at world headquarters a single office responsible for development of
international systems—a global chief information officer (CIO) position.
Many successful companies have devised organizational systems structures
along these principles. The success of these companies relies not only on the
proper organization of activities, but also on a key ingredient—a management
team that can understand the risks and benefits of international systems and
that can devise strategies for overcoming the risks. We turn to these manage-
ment topics next.
15.3 MANAGING GLOBAL SYSTEMS
Table 15-4 lists the principal management problems posed by developing
international systems. It is interesting to note that these problems are the
chief difficulties managers experience in developing ordinary domestic
systems as well. But these are enormously complicated in the international
environment.
A TYPICAL SCENARIO: DISORGANIZATION ON A
GLOBAL SCALE
Let’s look at a common scenario. A traditional multinational consumer-goods
company based in the United States and operating in Europe would like to
expand into Asian markets and knows that it must develop a transnational
strategy and a supportive information systems structure. Like most multination-
als, it has dispersed production and marketing to regional and national centers
while maintaining a world headquarters and strategic management in the
United States. Historically, it has allowed each of the subsidiary foreign divisions
to develop its own systems. The only centrally coordinated system is financial
controls and reporting. The central systems group in the United States focuses
only on domestic functions and production.
The result is a hodgepodge of hardware, software, and telecommunications.
The e-mail systems between Europe and the United States are incompatible.
Each production facility uses a different manufacturing resources planning
system (or a different version of the same ERP system), and different market-
ing, sales, and human resource systems. Hardware and database platforms are
wildly different. Communications between different sites are poor, given the
high cost of European intercountry communications. The central systems
group at headquarters in the United States recently was decimated and dis-
TABLE 15-4 MANAGEMENT CHALLENGES IN DEVELOPING GLOBAL
SYSTEMS
Agreeing on common user requirements
Introducing changes in business processes
Coordinating applications development
Coordinating software releases
Encouraging local users to support global systems.
Chapter 15 Managing Global Systems 571
persed to the U.S. local sites in the hope of serving local needs better and
reducing costs.
What do you recommend to the senior management leaders of this
company, who now want to pursue a transnational strategy and develop an
information systems architecture to support a highly coordinated global
systems environment? Consider the problems you face by reexamining
Table 15-4. The foreign divisions will resist efforts to agree on common user
requirements; they have never thought about much other than their own
units’ needs. The systems groups in American local sites, which have been
enlarged recently and told to focus on local needs, will not easily accept
guidance from anyone recommending a transnational strategy. It will be
difficult to convince local managers anywhere in the world that they should
change their business procedures to align with other units in the world,
especially if this might interfere with their local performance. After all, local
managers are rewarded in this company for meeting local objectives of their
division or plant. Finally, it will be difficult to coordinate development of
projects around the world in the absence of a powerful telecommunications
network and, therefore, difficult to encourage local users to take on owner-
ship in the systems developed.
GLOBAL SYSTEMS STRATEGY
Figure 15-4 lays out the main dimensions of a solution. First, consider that not
all systems should be coordinated on a transnational basis; only some core
FIGURE 15-4 LOCAL, REGIONAL, AND GLOBAL SYSTEMS
Agency and other coordination costs increase as the firm moves from local option systems toward
regional and global systems. However, transaction costs of participating in global markets probably
decrease as firms develop global systems. A sensible strategy is to reduce agency costs by developing
only a few core global systems that are vital for global operations, leaving other systems in the hands
of regional and local units.
Source: From Managing Information Technology in Multinational Corporations by Edward M. Roche, © 1993. Adapted by
permission of Prentice Hall, Inc., Upper Saddle River, N.J.
572 Part Four Building and Managing Systems
systems are truly worth sharing from a cost and feasibility point of view. Core
systems support functions that are absolutely critical to the organization. Other
systems should be partially coordinated because they share key elements, but
they do not have to be totally common across national boundaries. For such sys-
tems, a good deal of local variation is possible and desirable.
A final group of systems is peripheral, truly provincial, and needed to suit local
requirements only.
Define the Core Business Processes
How do you identify core systems? The first step is to define a short list of
critical core business processes. Business processes are defined and described in
Chapter 2, which you should review. Briefly, business processes are sets of
logically related tasks to produce specific business results, such as shipping out
correct orders to customers or delivering innovative products to the market.
Each business process typically involves many functional areas, communicating
and coordinating work, information, and knowledge.
The way to identify these core business processes is to conduct a business
process analysis. How are customer orders taken, what happens to them once
they are taken, who fills the orders, how are they shipped to the customers?
What about suppliers? Do they have access to manufacturing resource planning
systems so that supply is automatic? You should be able to identify and set
priorities in a short list of 10 business processes that are absolutely critical for
the firm.
Next, can you identify centers of excellence for these processes? Is the
customer order fulfillment superior in the United States, manufacturing process
control superior in Germany, and human resources superior in Asia? You should
be able to identify some areas of the company, for some lines of business, where
a division or unit stands out in the performance of one or several business
functions.
When you understand the business processes of a firm, you can rank-order
them. You then can decide which processes should be core applications,
centrally coordinated, designed, and implemented around the globe,
and which should be regional and local. At the same time, by identifying
the critical business processes, the really important ones, you have gone a
long way to defining a vision of the future that you should be working
toward.
Identify the Core Systems to Coordinate Centrally
By identifying the critical core business processes, you begin to see opportuni-
ties for transnational systems. The second strategic step is to conquer the core
systems and define these systems as truly transnational. The financial and
political costs of defining and implementing transnational systems are
extremely high. Therefore, keep the list to an absolute minimum, letting experi-
ence be the guide and erring on the side of minimalism. By dividing off a small
group of systems as absolutely critical, you divide opposition to a transnational
strategy. At the same time, you can appease those who oppose the central
worldwide coordination implied by transnational systems by permitting periph-
eral systems development to progress unabated, with the exception of some
technical platform requirements.
Choose an Approach: Incremental, Grand Design, Evolutionary
A third step is to choose an approach. Avoid piecemeal approaches. These
surely will fail for lack of visibility, opposition from all who stand to lose from
Chapter 15 Managing Global Systems 573
transnational development, and lack of power to convince senior manage-
ment that the transnational systems are worth it. Likewise, avoid grand
design approaches that try to do everything at once. These also tend to fail,
because of an inability to focus resources. Nothing gets done properly, and
opposition to organizational change is needlessly strengthened because the
effort requires huge resources. An alternative approach is to evolve transna-
tional applications incrementally from existing applications with a precise
and clear vision of the transnational capabilities the organization should have
in five years. This is sometimes referred to as the “salami strategy,” or one
slice at a time.
Make the Benefits Clear
What is in it for the company? One of the worst situations to avoid is to build
global systems for the sake of building global systems. From the beginning, it is
crucial that senior management at headquarters and foreign division managers
clearly understand the benefits that will come to the company as well as to
individual units. Although each system offers unique benefits to a particular
budget, the overall contribution of global systems lies in four areas.
Global systems—truly integrated, distributed, and transnational systems—
contribute to superior management and coordination. A simple price tag cannot
be put on the value of this contribution, and the benefit will not show up in any
capital budgeting model. It is the ability to switch suppliers on a moment’s
notice from one region to another in a crisis, the ability to move production in
response to natural disasters, and the ability to use excess capacity in one region
to meet raging demand in another.
A second major contribution is vast improvement in production, operation,
and supply and distribution. Imagine a global value chain, with global suppli-
ers and a global distribution network. For the first time, senior managers can
locate value-adding activities in regions where they are most economically
performed.
Third, global systems mean global customers and global marketing. Fixed
costs around the world can be amortized over a much larger customer base. This
will unleash new economies of scale at production facilities.
Last, global systems mean the ability to optimize the use of corporate funds
over a much larger capital base. This means, for instance, that capital in a
surplus region can be moved efficiently to expand production of capital-starved
regions; that cash can be managed more effectively within the company and put
to use more effectively.
These strategies will not by themselves create global systems. You will have to
implement what you strategize.
THE MANAGEMENT SOLUTION: IMPLEMENTATION
We now can reconsider how to handle the most vexing problems facing
managers developing the global information systems architectures that were
described in Table 15-4.
Agreeing on Common User Requirements
Establishing a short list of the core business processes and core support systems
will begin a process of rational comparison across the many divisions of the
company, develop a common language for discussing the business, and
naturally lead to an understanding of common elements (as well as the unique
qualities that must remain local).
574 Part Four Building and Managing Systems
Introducing Changes in Business Processes
Your success as a change agent will depend on your legitimacy, your authority,
and your ability to involve users in the change design process. Legitimacy is
defined as the extent to which your authority is accepted on grounds of compe-
tence, vision, or other qualities. The selection of a viable change strategy, which
we have defined as evolutionary but with a vision, should assist you in convinc-
ing others that change is feasible and desirable. Involving people in change,
assuring them that change is in the best interests of the company and their local
units, is a key tactic.
Coordinating Applications Development
Choice of change strategy is critical for this problem. At the global level there is
far too much complexity to attempt a grand design strategy of change. It is far
easier to coordinate change by making small incremental steps toward a larger
vision. Imagine a five-year plan of action rather than a two-year plan of action,
and reduce the set of transnational systems to a bare minimum to reduce
coordination costs.
Coordinating Software Releases
Firms can institute procedures to ensure that all operating units convert to new
software updates at the same time so that everyone’s software is compatible.
Encouraging Local Users to Support Global Systems
The key to this problem is to involve users in the creation of the design without
giving up control over the development of the project to parochial interests.
The overall tactic for dealing with resistant local units in a transnational
company is cooptation. Cooptation is defined as bringing the opposition into
the process of designing and implementing the solution without giving up
control over the direction and nature of the change. As much as possible, raw
power should be avoided. Minimally, however, local units must agree on a short
list of transnational systems, and raw power may be required to solidify the
idea that transnational systems of some sort are truly required.
How should cooptation proceed? Several alternatives are possible. One alter-
native is to permit each country unit the opportunity to develop one transna-
tional application first in its home territory, and then throughout the world. In
this manner, each major country systems group is given a piece of the action in
developing a transnational system, and local units feel a sense of ownership in
the transnational effort. On the downside, this assumes the ability to develop
high-quality systems is widely distributed, and that, a German team, for exam-
ple, can successfully implement systems in France and Italy. This will not
always be the case.
A second tactic is to develop new transnational centers of excellence, or a
single center of excellence. There may be several centers around the globe that
focus on specific business processes. These centers draw heavily from local
national units, are based on multinational teams, and must report to worldwide
management. Centers of excellence perform the initial identification and
specification of business processes, define the information requirements,
perform the business and systems analysis, and accomplish all design and
testing. Implementation, however, and pilot testing are rolled out to other parts
of the globe. Recruiting a wide range of local groups to transnational centers of
excellence helps send the message that all significant groups are involved in the
design and will have an influence.
Chapter 15 Managing Global Systems 575
INTERACTIVE SESSION: MANAGEMENT
FONTERRA: MANAGING THE WORLD’S MILK TRADE
While global trade has expanded at over 9 percent a (actually a cooperative) that is implementing an
year in the last 20 years, many international compa- import/export process control system.
nies still rely on outdated manual processes and
paperwork for conducting their international trade Fonterra is the world’s leading exporter of dairy
business. In 2010, global trade of goods and services products. Owned by 11,000 New Zealand dairy
will amount to a staggering $15 trillion. That’s a lit- farmers, Fonterra is a cooperative that exports 95
tle bigger than the entire United States economy percent of its products to 140 countries—of all the
($14 trillion). There are many complex challenges dairy goods it manufactures, only 5 percent are
that managers face when conducting business on an consumed within its domestic market. Fonterra is
international scale. Chief among these challenges is primarily an exporting firm. Fonterra has $10 billion
managing the import and export business process. in assets, annual revenues of $12.1 billion, and
Managing an import/export business involves man- produces 3.6 billion gallons of milk each year. If you
aging three processes: compliance with foreign and wonder how that’s possible, the answer is Fonterra
domestic laws, customs clearance procedures, and relies on the contributions of 4.3 million New
risk management. Each country you export to has Zealand cows, and over 15,000 employees. Fonterra
different laws governing imported products and dif- accounts for over 25 percent of New Zealand’s export
ferent customs procedures. Trading across bound- trade, and about 30 percent of all global trade in milk
aries raises financial and contractual risks. What if and milk products.
you export to a foreign company and it doesn’t pay
you? What kinds of credit assessments can you Fonterra’s operations generate a substantial
perform in various countries? What if your goods amount of transactional data. “The volume going
are stalled at a foreign port for lack of proper through this platform is quite significant in both
documents? What are the proper documents? The dollar and transactional terms,” says Clyde Fletcher,
potential pitfalls are numerous. Documentation Center Manager at Fonterra. “But we
don’t just rely on New Zealand. We procure our
In the past, time-consuming and error-prone man- products from multiple countries to try to spread the
ual methods were incapable of handling the complex risk. We also export out of Australia, the United
challenges of global trade. To conduct business in States, Latin America, Europe, and Asia.” This data
other countries, your company must comply with needs to be captured in an enterprise database, then
local laws, satisfy trade security measures, meet doc- moved into a data warehouse so management can
umentation requirements, understand complicated monitor the firms operations. To handle more
tariffs and duties, and coordinate the involvement of complex import/export processes, Fonterra turned to
all parties. Handling these responsibilities manually the SAP BusinessObjects Global Trade Services
increases the risk of errors. According to a United solution.
Nations study, the inefficient administration of cus-
toms regulations and documents accounts for 7 per- SAP Global Trade Services (SAP GTS) automates
cent of the cost of international trade. That’s $1 tril- import/export processes, while ensuring that
lion lost annually on a global basis to inefficient transactions comply with all customs and security
handling of customs documents. Poor management regulations. SAP GTS helps companies standardize
of compliance and risk accounts for even more and streamline trade processes across their entire
losses. enterprise and business units. And it fosters use of
shared data and shared collaboration knowledge,
Increasingly, international firms are turning to replacing high-maintenance manual processes.
enterprise software and business intelligence
applications to manage their import/export business With SAP GTS, Fonterra has been able to lower the
processes on a global scale. One world, one business, cost, and reduce the risk, of doing business interna-
one set of software tools with pre-defined business tionally. To date, SAP GTS has helped Fonterra stan-
processes that are the same the world over. That’s dardize and streamline trade processes across its
the dream. Fonterra provides an example of a firm entire enterprise and business units. And it has fos-
tered the sharing of data, greater collaboration, and
sharing of knowledge throughout the firm. SAP GTS
manages the complexities of global trade and ensures
576 Part Four Building and Managing Systems and errors that can result in expensive penalties—
and even revoked import/export privileges.
full regulatory compliance. The solution helps
reduce buffer stock by improving transparency Sources: David Barboza, “Supply Chain for iPhone Highlights Costs
throughout the supply chain—sharing cross-border in China,” New York Times, July 5, 2010; Lauren Bonneau,
trade information will all partners, including freight “Mastering Global Trade at Fonterra,” CustomProfiles, SAP.com, July
forwarders, insurance agencies, banks, and regula- 1, 2010; Kevin Keller, “iPhone Carries Bill of Materials of $187.51,”
tory entities. SAP GTS has helped Fonterra avoid sup- iSuppli.com/Teardowns, June 28, 2010.
ply chain bottlenecks, costly production downtime,
CASE STUDY QUESTIONS MIS IN ACTION
1. Describe the various capabilities of SAP GTS. How Explore Fonterra’s Web site (Fonterra.com) and then
does using this software help Fonterra manage its answer the following questions:
export trade? What quantifiable benefits does this
system provide? 1. Go the Web site SAP.com and search on “GTS.”
Click on the article entitled “SAP GRC Global Trade
2. How would you characterize Fonterra’s global Services: Streamline and Secure Your Global Supply
business strategy and structure (review Table 15-3). Chain.” What benefits does SAP promise to deliver
What kind of a global business is it? Has Fonterra’s for global trading companies? Create a summary
structure and strategy shaped its uses of SAP GTS? table for your class.
Would a transnational company choose a different
solution? 2. Visit SAP’s largest competitor, Oracle.com, and
identify similar applications provided by Oracle.
3. What influence does the global business environ- What do you think are the most important
ment have on firms like Fonterra, and how does management and business considerations in
that influence their choice of systems? deciding between Oracle and SAP solutions for
global projects? Discover one global firm that uses
Oracle’s global trade offerings, and compare that
firm to Fonterra.
Even with the proper organizational structure and appropriate management
choices, it is still possible to stumble over technology issues. Choices of tech-
nology platforms, networks, hardware, and software are the final element in
building transnational information systems architectures.
15.4 TECHNOLOGY ISSUES AND OPPORTUNITIES FOR
GLOBAL VALUE CHAINS
Once firms have defined a global business model and systems strategy, they
must select hardware, software, and networking standards along with key
system applications to support global business processes. Hardware, software,
and networking pose special technical challenges in an international setting.
One major challenge is finding some way to standardize a global computing
platform when there is so much variation from operating unit to operating unit
and from country to country. Another major challenge is finding specific
software applications that are user friendly and that truly enhance the produc-
Chapter 15 Managing Global Systems 577
tivity of international work teams. The universal acceptance of the Internet
around the globe has greatly reduced networking problems. But the mere
presence of the Internet does not guarantee that information will flow
seamlessly throughout the global organization because not all business units
use the same applications, and the quality of Internet service can be highly
variable (just as with the telephone service). For instance, German business
units may use an open source collaboration tool to share documents and
communicate, which is incompatible with American headquarters teams,
which use Lotus Notes. Overcoming these challenges requires systems integra-
tion and connectivity on a global basis.
COMPUTING PLATFORMS AND SYSTEMS INTEGRATION
The development of a transnational information systems architecture based on
the concept of core systems raises questions about how the new core systems
will fit in with the existing suite of applications developed around the globe by
different divisions, different people, and for different kinds of computing
hardware. The goal is to develop global, distributed, and integrated systems to
support digital business processes spanning national boundaries. Briefly, these
are the same problems faced by any large domestic systems development
effort. However, the problems are magnified in an international environment.
Just imagine the challenge of integrating systems based on the Windows,
Linux, Unix, or proprietary operating systems running on IBM, Sun, HP, and
other hardware in many different operating units in many different countries!
Moreover, having all sites use the same hardware and operating system does
not guarantee integration. Some central authority in the firm must establish data
standards, as well as other technical standards with which sites are to comply. For
instance, technical accounting terms such as the beginning and end of the fiscal
year must be standardized (review the earlier discussion of the cultural
challenges to building global businesses), as well as the acceptable interfaces
between systems, communication speeds and architectures, and network
software.
CONNECTIVITY
Truly integrated global systems must have connectivity—the ability to link
together the systems and people of a global firm into a single integrated network
just like the phone system but capable of voice, data, and image transmissions.
The Internet has provided an enormously powerful foundation for providing
connectivity among the dispersed units of global firms. However, many issues
remain. The public Internet does not guarantee any level of service (even in the
U.S.). Few global corporations trust the security of the Internet and generally
use private networks to communicate sensitive data, and Internet virtual private
networks (VPNs) for communications that require less security. Not all coun-
tries support even basic Internet service that requires obtaining reliable circuits,
coordinating among different carriers and the regional telecommunications
authority, and obtaining standard agreements for the level of telecommunica-
tions service provided. Table 15-5 lists the major challenges posed by interna-
tional networks.
While private networks have guaranteed service levels and better security
than the Internet, the Internet is the primary foundation for global corporate
networks when lower security and service levels are acceptable. Companies
can create global intranets for internal communication or extranets to exchange
578 Part Four Building and Managing Systems
TABLE 15-5 PROBLEMS OF INTERNATIONAL NETWORKS
Quality of service
Security
Costs and tariffs
Network management
Installation delays
Poor quality of international service
Regulatory constraints
Network capacity
information more rapidly with business partners in their supply chains. They
can use the public Internet to create global networks using VPNs from Internet
service providers, which provide many features of a private network using the
public Internet (see Chapter 7). However, VPNs may not provide the same level
of quick and predictable response as private networks, especially during times
of the day when Internet traffic is very congested, and they may not be able to
support large numbers of remote users.
The high cost of PCs, and low incomes, limit access to Internet service in
many developing countries (see Figure 15-5). Where an Internet infrastructure
exists in less-developed countries, it often lacks bandwidth capacity, and is
unreliable in part due to power grid issues. The purchasing power of most
people in developing countries makes access to Internet services very
expensive in local currencies. In addition, many countries monitor transmis-
FIGURE 15-5 INTERNET PENETRATION BY REGION
The percentage of the total population using the Internet in developing countries is much smaller than
in the United States and Europe, but the fastest growth is in Asia.
Source: Internetworldstats.com, 2010.
Chapter 15 Managing Global Systems 579
sions. Governments in China, Singapore, Iran, and Saudi Arabia monitor
Internet traffic and block access to Web sites considered morally or politically
offensive. On the other hand, the rate of growth in the Internet population is far
faster in Asia, Africa, and the Middle East than in North America and Europe,
where the Internet population is growing slowly if at all. In 2010, China, for
instance, has more than 420 million Internet users compared to the United
States with about 221 million. Therefore, in the future, Internet connectivity
will be much more widely available and reliable in less-developed regions of
the world, and it will play a significant role in integrating these economies with
the world economy.
The Interactive Session on Organizations describes how cell phones
provide a partial solution to this problem. Their use is mushrooming in
developing countries, and they are starting to become engines for economic
development.
SOFTWARE LOCALIZATION
The development of core systems poses unique challenges for application
software: How will the old systems interface with the new? Entirely new
interfaces must be built and tested if old systems are kept in local areas (which
is common). These interfaces can be costly and messy to build. If new
software must be created, another challenge is to build software that can be
realistically used by multiple business units from different countries given
that business units are accustomed to their unique business processes and def-
initions of data.
Aside from integrating the new with the old systems, there are problems of
human interface design and functionality of systems. For instance, to be truly
useful for enhancing productivity of a global workforce, software interfaces
must be easily understood and mastered quickly. Graphical user interfaces are
This page from the Pearson
Prentice Hall Web site was
translated into Japanese.
Web sites and software
interfaces for global systems
may have to be translated
into multiple languages to
accommodate users in other
parts of the world.
580 Part Four Building and Managing Systems
INTERACTIVE SESSION: ORGANIZATIONS
HOW CELL PHONES SUPPORT ECONOMIC DEVELOPMENT
As cell phones, the Internet, high-speed Internet Cellular phone companies such as Nokia are
connections, and other information and communica- sending what they call “human-behavior
tion technologies become increasingly widespread, researchers” or “user anthropologists” to gather as
more and more people are experiencing the benefits much useful information as they can about con-
each technology has to offer. Many of these tech- sumer habits and the lives of potential cell phone
nologies have not yet closed the “digital divide” buyers. They pass on that information to cell phone
separating the world’s well-developed and underde- designers and technology architects. This process
veloped nations. Some countries, like the United represents a new approach to designing phones
States, have access to most new technologies, but known as “human-centered design”. Human-cen-
most residents of poorer countries still struggle with tered design is important to high-tech companies
challenges like obtaining reliable electricity and trying to build products that people find appealing
abject poverty. Recent trends in cell phone design and easy to use, and are thus more likely to be
and consumer research indicate that cellular phones bought.
are crossing the digital divide and are becoming a
truly ubiquitous technology (far more so than Nokia and other companies face significant
personal computers), enhancing the quality of life challenges in marketing their phones to the poorest
for millions of people while also increasing the segment of Africa and Asia’s populations. Barriers
strength of the global economy. As in the United include lack of electricity in many areas, incomes
States, by 2015, cell phones will be the primary too low to afford a cell phone, and potential lack of
means of access to the Internet in the developing service in non-urban areas. India currently leads the
world. way in cell phone subscriptions, with an astounding
756 million (63 percent of its total population), but
For instance, mobile phone use in Africa is many other countries lag far behind both in cell
booming. Despite their high costs (the price of a phone usage and rates of Internet access. For
phone in Niger is equal to five days of income), example, Morocco, one of Africa’s leaders in cell
mobile phone subscriptions in Africa have risen phone and Internet usage, boasts 20 million Internet
from 16 million in 2000, to 376 million in 2008. users, or 58 percent of its total population. By
Sixty-eight percent of the world’s mobile phone comparison, the United States. has over 221 million
subscriptions are in developing countries, compared Internet users of all ages, or 79 percent of its total
with 20 percent of the world’s Internet users. population.
Because cell phones combine features of watches,
alarm clocks, cameras and video cameras, stereos, The World Resources Institute published a report
televisions, and perhaps even wallets soon due to detailing how the poor in developing countries
the growing popularity of mobile banking, they are allocate their money. Even the poorest families dedi-
growing in usefulness even as they decrease in cated significant portions of their small budgets to
price. Most importantly, cell phones are increasingly communication technologies such as cell phones.
becoming the most convenient and affordable way Having a cell phone is a tremendous advantage for
to connect to the Internet and perform other tasks members of populations that are constantly on the
traditionally associated with computers. And cell move due to war, drought, natural disasters, or
phones are much less costly than personal comput- extreme poverty, primarily because it allows people
ers. to remain reachable under practically any circum-
stances. Cell phones also have implications for medi-
The possession of a cell phone greatly increases cine in these countries: patients can more easily
efficiency and quality of life, so the global economy reach doctors, and doctors can more easily acquire
would stand to benefit on a proportionally large information pertaining to diseases and ailments they
scale. Many economists believe that widespread cell may need to treat.
phone usage in developing countries is having a
profound and revolutionary effect on their economic In addition to the benefit of being able to stay in
well-being in a way that traditional methods of touch with others, cell phones are also useful as a
foreign aid have failed to achieve. business tool. Evidence suggests that possession of a
cell phone increases profits on an individual level,
allowing people to more easily identify and take Chapter 15 Managing Global Systems 581
advantage of business opportunities. A recent study
by the Centre for Economic Policy Research also fishermen to call around to different markets while at
showed that for every additional 10 cellular phones sea, choose the market with the best price, and sell
per 100 people a country acquires, that country’s accordingly. Mobile phones resulted in financial
gross domestic product (GDP) rises 0.5 percent. improvements for both fishermen and consumers:
fishermen’s profits increased by 8 percent, and con-
In Niger, millet is a household staple sold in sumer prices declined by 4 percent.
traditional village markets across thousands of
square miles. According to economists, the growth of Economists and others who believe that poor
mobile phone coverage reduced grain price countries need to radically change their economic
differences across markets by 15 percent between structure in order to develop, and who also discour-
2001 and 2007, with a greater impact on markets age reliance on international aid given to failing
isolated by distance and poor-quality roads. Traders economies, are enthusiastic about the positive
could respond to surpluses and shortages in the mar- impact that cell phones and other information tech-
ket, making better decisions about price and deliv- nologies can have on underdeveloped countries.
ery. As a result, trader profits rose and prices fell. Access to the Internet via cell phones also promises
to bring about societal and political change in devel-
Harvard economist Robert Jensen discovered that oping countries in which repressive governments
the introduction of mobile phones in the Indian exert control over all forms of media.
coastal state of Kerala reduced price differences across
fish markets by almost 60 percent between 1997 and Sources: Worldwide Worx, “Businesses Across Africa Are Expecting
2001, providing an almost-perfect example of the “Law a Revolution in Internet Access, Technology and Costs as a Result
of One Price”: when markets work efficiently, identi- of the Rush of New Undersea Cables Connecting the Continent,”
cal goods have the same price. In addition, mobile Telecom Trends in Africa Report 2010, September 16, 2010;
phones almost completely eliminated waste—the Jenny C. Aker and Isaac M. Mbiti, “Mobile Phones and Economic
catch left unsold at the end of the day—by allowing Development in Africa,” Center for Global Development, June 1,
2010; Jenny Aker and Isaac Mbiti, “Africa Calling: Can Mobile
Phones Make a Miracle,” Boston Review, March/April 2010; “Top 20
Countries—Internet Usage,” Internetworldstats.com, November
2010.
CASE STUDY QUESTIONS MIS IN ACTION
1. What strategies are cell phone companies using to Explore the Web site for One Laptop Per Child
‘close the digital divide’ and market phones to the (www.laptop.org) and then answer the following
poorest segment of the world’s population? questions:
2. Why do economists predict that widespread cell 1. What are the capabilities of the XO laptop
phone usage in developing countries would have (especially the latest version, XO-3) ? How well-
an unprecedented effect on the growth of those suited is this machine for developing countries?
countries?
2. How would use of the XO laptop narrow the
3. What are some examples of how cell phones global digital divide? Compare the potential
might increase quality of life for residents of impact of this machine to that of cell phones in
developing countries? developing nations.
4. Do you believe that cell phones will proliferate
widely through Africa and Asia? Why or why not?
ideal for this but presuppose a common language—often English. When
international systems involve knowledge workers only, English may be the
assumed international standard. But as international systems penetrate deeper
into management and clerical groups, a common language may not be assumed
and human interfaces must be built to accommodate different languages and
even conventions. The entire process of converting software to operate in a
second language is called software localization.
582 Part Four Building and Managing Systems
What are the most important software applications? Many international
systems focus on basic transaction and management reporting systems.
Increasingly, firms are turning to supply chain management and enterprise
systems to standardize their business processes on a global basis and to create
coordinated global supply chains. However, these cross-functional systems are not
always compatible with differences in languages, cultural heritages, and business
processes in other countries (Martinons, 2004; Liang et al., 2004; Davison, 2002).
Company units in countries that are not technically sophisticated may also
encounter problems trying to manage the technical complexities of enterprise
applications.
Electronic Data Interchange (EDI) systems and supply chain management
systems are widely used by manufacturing and distribution firms to connect to
suppliers on a global basis. Collaboration systems, e-mail, and videoconferenc-
ing are especially important worldwide collaboration tools for knowledge- and
data-based firms, such as advertising firms, research-based firms in medicine
and engineering, and graphics and publishing firms. Internet-based tools will
be increasingly employed for such purposes.
15.5 HANDS-ON MIS PROJECTS
The projects in this section give you hands-on experience analyzing interna-
tional systems issues for an expanding business, conducting international mar-
ket research, and building a job posting database and Web page for an interna-
tional company.
Management Decision Problems
1. United Parcel Service (UPS) has been expanding its package delivery and
logistics services in China, serving both multinational companies and local
businesses. UPS drivers in China need to use UPS systems and tools such as its
handheld Driver Information Acquisition Device for capturing package delivery
data. UPS wants to make its WorldShip, CampusShip, and other shipping
management services accessible to Chinese and multinational customers via
the Web. What are some of the international systems issues UPS must consider
in order to operate successfully in China?
2. Your company manufactures and sells tennis rackets and would like to start
selling outside the United States. You are in charge of developing a global Web
strategy, and the first countries you are thinking of targeting are Brazil, China,
Germany, Italy, and Japan. Using the statistics in the CIA World Factbook,
which of these countries would you target first? What criteria would you use?
What other considerations should you address in your Web strategy? What
features would you put on your Web site to attract buyers from the countries
you target?
Chapter 15 Managing Global Systems 583
Achieving Operational Excellence: Building a Job
Database and Web Page for an International
Consulting Firm
Software skills: Database and Web page design
Business skills: Human resources internal job postings
Companies with many overseas locations need a way to inform employees
about available job openings in these locations. In this project, you’ll use
database software to design a database for posting internal job openings and a
Web page for displaying this information.
KTP Consulting operates in various locations around the world. KTP special-
izes in designing, developing, and implementing enterprise systems for
medium- to large-size companies. KTP offers its employees opportunities to
travel, live, and work in various locations throughout the United States, Europe,
and Asia. The firm’s human resources department has a simple database that
enables its staff to track job vacancies. When an employee is interested in
relocating, he or she contacts the human resources department for a list of KTP
job vacancies. KTP also posts its employment opportunities on the company
Web site.
What type of data should be included in the KTP job vacancies database?
What information should not be included in this database? Based on your
answers to these questions, build a job vacancies database for KTP. Populate the
database with at least 20 records. You should also build a simple Web page that
incorporates job vacancy data from your newly created database. Send a copy of
the KTP database and Web page to your professor.
Improving Decision Making: Conducting International
Marketing and Pricing Research
Software skills: Internet-based software
Business skills: International pricing and marketing
When companies sell overseas, it’s important to determine whether their
products are priced properly for non-domestic markets. In this project, you’ll
use the Web to research overseas distributors and customs regulations and use
Internet-based software to calculate prices in foreign currencies.
You are in charge of marketing for a U.S. manufacturer of office furniture
that has decided to enter the international market. You have been given the
name of Sorin SRL, a major Italian office furniture retailer, but your source
had no other information. You want to test the market by contacting this firm
to offer it a specific desk chair that you have to sell at about $125. Using the
Web, locate the information needed to contact this firm and to find out how
many European euros you would need to get for the chair in the current
market. One source for locating European companies is the Europages
Business Directory (www.europages.com). In addition, consider using the
Universal Currency Converter Web site (www.xe.net/ucc/), which deter-
mines the value of one currency expressed in other currencies. Obtain both
the information needed to contact the firm and the price of your chair in
their local currency. Then locate and obtain customs and legal restrictions
on the products you will export from the United States and import into Italy.
Finally, locate a company that will represent you as a customs agent and
gather information on shipping costs.
584 Part Four Building and Managing Systems
Review Summary
1. What major factors are driving the internationalization of business?
The growth of inexpensive international communication and transportation has created a world
culture with stable expectations or norms. Political stability and a growing global knowledge base that
is widely shared also contribute to the world culture. These general factors create the conditions for
global markets, global production, coordination, distribution, and global economies of scale.
2. What are the alternative strategies for developing global businesses?
There are four basic international strategies: domestic exporter, multinational, franchiser, and
transnational. In a transnational strategy, all factors of production are coordinated on a global scale.
However, the choice of strategy is a function of the type of business and product.
3. How can information systems support different global business strategies?
There is a connection between firm strategy and information systems design. Transnational firms
must develop networked system configurations and permit considerable decentralization of develop-
ment and operations. Franchisers almost always duplicate systems across many countries and use
centralized financial controls. Multinationals typically rely on decentralized independence among
foreign units with some movement toward development of networks. Domestic exporters typically
are centralized in domestic headquarters with some decentralized operations permitted.
4. What are the challenges posed by global information systems and management solutions for
these challenges?
Global information systems pose challenges because cultural, political, and language diversity
magnifies differences in organizational culture and business processes and encourages proliferation of
disparate local information systems that are difficult to integrate. Typically, international systems have
evolved without a conscious plan. The remedy is to define a small subset of core business processes
and focus on building systems to support these processes. Tactically, managers will have to coopt
widely dispersed foreign units to participate in the development and operation of these systems, being
careful to maintain overall control.
5. What are the issues and technical alternatives to be considered when developing international
information systems?
Implementing a global system requires an implementation strategy that considers both business
design and technology platforms. The main hardware and telecommunications issues are systems
integration and connectivity. The choices for integration are to go either with a proprietary architec-
ture or with open systems technology. Global networks are extremely difficult to build and operate.
Firms can build their own global networks or they can create global networks based on the Internet
(intranets or virtual private networks). The main software issues concern building interfaces to
existing systems and selecting applications that can work with multiple cultural, language, and
organizational frameworks.
Key Terms Legitimacy, 574
Multinational, 567
Business driver, 562 Particularism, 565
Cooptation, 574 Software localization, 581
Core systems, 572 Transborder data flow, 565
Domestic exporter, 567 Transnational, 568
Franchisers, 567
Global culture, 563
International information systems architecture, 562
Review Questions Chapter 15 Managing Global Systems 585
1. What major factors are driving the international- 4. What are the challenges posed by global informa-
ization of business? tion systems and management solutions for these
challenges?
• List and describe the five major dimensions
for developing an international information • List and describe the major management
systems architecture. issues in developing international systems.
• Describe the five general cultural factors • Identify and describe three principles to
leading toward growth in global business and follow when organizing the firm for global
the four specific business factors. Describe business.
the interconnection among these factors.
• Identify and describe three steps of a
• List and describe the major challenges to the management strategy for developing and
development of global systems. implementing global systems.
• Explain why some firms have not planned for • Define cooptation and explain how can it be
the development of international systems. used in building global systems.
2. What are the alternative strategies for developing 5. What are the issues and technical alternatives to
global businesses? be considered when developing international
• Describe the four main strategies for global information systems?
business and organizational structure.
• Describe the main technical issues facing
3. How can information systems support different global systems.
global business strategies?
• Identify some technologies that will help
• Describe the four different system configura- firms develop global systems.
tions that can be used to support different
global strategies.
Discussion Questions Video Cases
1. If you were a manager in a company that oper- You will find Video Cases illustrating some of the
ates in many countries, what criteria would you concepts in this chapter on the Laudon Web site along
use to determine whether an application should with questions to help you analyze the cases.
be developed as a global application or as a local
application?
2. Describe ways the Internet can be used in
international information systems.
Collaboration and Teamwork: Identifying Technologies for Global Business
Strategies
With a group of students, identify an area of clothing franchise, such as Express, as example
information technology and explore how this businesses. Which applications would you make
technology might be useful for supporting global global, which core business processes would you
business strategies. For instance, you might choose choose, and how would the technology be helpful?
an area such as digital telecommunications (e.g., If possible, use Google Sites to post links to Web
e-mail, wireless communications, virtual private pages, team communication announcements, and
networks), enterprise systems, collaboration soft- work assignments; to brainstorm; and to work col-
ware, or the Web. It will be necessary to choose a laboratively on project documents. Try to use
business scenario to discuss the technology. You Google Docs to develop a presentation of your find-
might choose an automobile parts franchise or a ings for the class.
586 Part Four Building and Managing Systems
WR Grace Consolidates its General Ledger System
CASE STUDY
W R Grace is a chemical manufacturer ity, and all three of the ledgers were driven by
headquartered in Columbia, Maryland. separate data sources.
Founded in 1854, the company develops
and sells specialty chemicals and con- The “classic” general ledger is used for reporting
struction products and has been a worldwide leader revenues and expenditures for all subsidiaries,
in those fields. Grace has over 6,300 employees and accounts, and business areas. The Grace Davison
earned $2.8 billion in revenues in 2009. The com- ledger stored information on company codes
pany has two operating segments: Grace Davison, (subsidiary ID numbers), accounts, profit centers,
which focuses on specialty chemicals and formula- plants, and trading partners. The Grace Construction
tion technologies, and Grace Construction Products, Products management ledger stored information on
which focuses on specialty construction materials, company codes, accounts, business areas, profit
systems, and services. Between these two divisions, centers, trading partners, and destination countries.
there are over 200 separate subsidiaries and several Grace Davison used profit-center accounting for its
different legal entities that comprise the full com- management reporting, and Grace Construction
pany. Grace has operations in 45 countries around Products used special-purpose ledgers to gather the
the world. same financial information. If this sounds like a
confusing arrangement, that’s because it was.
Though Grace is a strong and successful company,
global companies with separate divisions often strug- Consolidating this data across the two divisions
gle to unify their information systems. Grace is not a and across its many subdivisions proved difficult,
single, cohesive business unit—it’s an amalgam of and compiling company financial reports was a
many operating divisions, subsidiaries, and business painstaking and time-consuming task. Reconciling
units, all of which use different financial data, the financial data from each of the three reporting
reports, and reconciliation methods. Though this sources resulted in lengthy financial close cycles and
“fractured” structure is common to most global com- consumed excessive amounts of employee time and
panies, it created problems for the company’s general resources. Michael Brown, director of finance
ledger. The general ledger of a business is its main productivity at Grace, said that “from a financials
accounting record. General ledgers use double-entry point of view, we were basically three different
bookkeeping, which means that all of the transactions companies.” Grace management decided that the
made by a company are entered into two different company needed to eliminate the financial reporting
accounts, debits and credits. General ledgers include ‘silos’ and create a system that served all parts of
accounts for current assets, fixed assets, liabilities, Grace’s business.
revenues and expense items, gains, and losses.
WR Grace hoped to create a global financial
It’s no surprise that a global company that earns standard for its financial reporting system, using the
several billion dollars in revenues would have a slogan “one Grace” to rally the company to work
complicated ledger system, but Grace’s general towards that standard. SAP General Ledger was the
ledger setup was more than just complicated. It was most important factor in Grace’s ability to accomplish
a disorganized tangle of multiple ledgers, redundant its goal. SAP General Ledger was attractive to Grace
data, and inefficiency processes. The company had because of its many unique and useful features. It has
three separate ledger systems from SAP: one for its the ability to automatically and simultaneously post
legal reporting requirements team, and two more for all sub-ledger items in the appropriate general
each of its two major operating segments, Grace accounts, simultaneously update general ledger and
Davison and Grace Construction Products. But each cost accounting areas, and evaluate and report on
of the three implementations for these systems current accounting data in real time. Grace also liked
occurred several years apart, so the differences SAP’s centralized approach to general ledger, up-to-
between the ledgers were substantial. All three date references for the rendering of accounts across
ledgers had different configurations and different all of its divisions.
levels of granularity within the reporting functional-
Consolidating multiple ledgers is a difficult task.
SAP General Ledger helped Grace to simplify the
process. SAP Consulting and an SAP General Ledger Chapter 15 Managing Global Systems 587
migration team assisted the company along the way.
SAP implementations feature an SAP team leader special document types used by those interfaces. SAP
and project manager as well as a migration cockpit. and Grace both knew that a significant effort would
The migration cockpit is a feature of SAP implemen- be required to properly test the general ledger, and
tations that offers a graphical representation and SAP’s experience with similar upgrades in the past
overview of the general ledger migration process. was helpful in ensuring that SAP performed the
The cockpit displays steps of the migration in proper amount of tests.
sequence and manages logs, attachments, and other
materials important to the general ledger. The migra- After the data migration was completed, Grace
tion cockpit helps to ensure that sufficient planning still had to decommission its old ledgers, which were
goes into the general ledger consolidation process, still pivotal sources for many of the custom reports
and that the necessary business process changes that the company was generating on a regular basis.
accompany the technical changes of implementing a For example, reports are automatically generated
unified general ledger. from the special-purpose ledger, or reports that group
all the transactions that took place within a particu-
SAP and Grace split the project into two main com- lar country in the past year, and so on. To decommis-
ponents: General Ledger Data Migration, and sion its old ledgers, Grace had to eliminate as many
Business Process Testing. General Ledger Data of those custom reports as it could, and move the
Migration involved acquiring all of the relevant data essential ones over to the new general ledger. Grace
from Grace’s three separate ledgers, combining it and recruited employees from all areas of their financial
eliminating redundancies, and supplying it to the SAP division to identify the most critical reports.
General Ledger. A small team executed this half of
the project. Grace decided to standardize its reporting With the general ledger migration completed, all of
processes around profit-center accounting and built WR Grace shares a common accounting infrastructure,
its general ledger design with that standard in mind. management can quickly develop an overall picture of
Business Process Testing was completed by a global the company’s financial status, and most of the ledger
SAP team performing multiple full-cycle tests. In can be accessed or updated in real time. The financial
other words, SAP testers accessed the system reconciliation processes at the end of each reporting
remotely and tested all of the functions of SAP period were totally eliminated, allowing Grace to
General Ledger to ensure that the system would work devote less energy on managing its ledgers and more
as planned. The SAP General Ledger project manager on actually running its business. The eventual savings
oversaw both components of the project. in all areas of the business figure to pay for the installa-
tion in short order. Grace’s accountants and financial
During the testing process, SAP testers used a planners will be much more efficient. Managers will
technique called “unit testing,” common to many spend less time getting the information they need. IT
system upgrades of this type. The testers set up a costs for maintaining a single ledger will total far less
“dummy” system with a prototype version of the than the costs for maintaining three, and fewer errors
general ledger and used it to test different types of will make their way into the general ledger system.
accounting documents. Grace wanted to modify the Best of all for Grace, the implementation was com-
configuration of the general ledger to conform to the pleted on time and under budget.
company’s unique needs and circumstances, and
made sure that the people who knew what was Grace hopes to use the General Ledger platform to
needed were building the system and designing its continue making other improvements with SAP.
specifications. Because of these adjustments, unit Grace plans to upgrade its consolidation systems,
testing was critical to ensure that configuration financial planning, and analytics functions to SAP
changes had not affected the overall integrity of the systems. Grace already had a strong relationship with
system. SAP. In 1997, Grace installed SAP software for the
first time, and prior to the general ledger migration,
SAP testers also performed basic scenario tests, Grace was already using SAP Business Information
complex scenario tests, and tests on special account- Warehouse and NetWeaver Portal globally. This
ing document types in an effort to ensure that the pre-existing relationship made the process of imple-
general ledger was equipped to handle all of the menting SAP General Ledger much easier. It’s also
tasks Grace expected it to perform. They also tested the reason why Grace is so optimistic that it will
inbound finance interfaces, such as the HR interface, achieve similar gains in other areas of its business by
bank statements, and upload programs, as well as switching to SAP solutions.
588 Part Four Building and Managing Systems 2. What made SAP a logical partner for Grace’s
upgrade?
Sources: Christ Maxcer, “Global Enterprise Unites as One: W.R.
Grace Migrates to SAP General Ledger,” insiderPROFILES 5, no. 1, 3. What obstacles did SAP and Grace face in their
January 2, 2009; SAP AG, “One Grace Project Builds Single Source attempts to consolidate Grace’s ledgers?
of Truth Using SAP General Ledger,” 2008; and Ed Taylor, “The
Business Benefits of a General Ledger Migration at W.R. Grace & 4. How successful was the general ledger migration?
Co.” May 6, 2008. What are some of the risks of adopting a single
general ledger system from a single vendor to run
CASE STUDY QUESTIONS a global business?
1. Why did WR Grace’s general ledger system need
an overhaul?
References
CHAPTER 1 Teece, David. Economic Performance and Theory of the Firm: The
Selected Papers of David Teece. London: Edward Elgar
Belson, Ken. “Technology Lets High-End Hotels Anticipate Guests’ Publishing (1998).
Whims.” The New York Times (November 16, 2005).
Tuomi, Ilkka. “Data Is More Than Knowledge. Journal of
Brynjolfsson, Erik and Lorin M. Hitt. "Beyond Computation: Management Information Systems 16, no. 3 (Winter
Information Technology, Organizational Transformation, and 1999–2000).
Business Performance." Journal of Economic Perspectives 14,
no. 4 (2000). U.S. Bureau of Labor Statistics. Occupational Outlook Handbook,
2009-2010 Edition. Washington D.C.: Bureau of Labor
Brynjolfsson, Erik. “VII Pillars of IT Productivity.” Optimize Statistics (2010).
(May 2005).
U.S. Department of Commerce, Bureau of the Census. Statistical
Bureau of Economic Analysis. National Income and Product Abstract of the United States, 2009. Washington D.C. (2010).
Accounts, 2009. Table 5.3.5. Private Fixed Investment by
Type (A) (Q) Verisign Inc., The Domain Name Industry Brief, Volume 7,
September 2010.
Carr, Nicholas. “IT Doesn’t Matter.” Harvard Business Review
(May 2003). Weill, Peter and Jeanne Ross. IT Savvy: What Top Executives
Must Know to Go from Pain to Gain. Boston: Harvard
Dataxis Intelligence Press Release (February 11, 2010). Business School Press (2009).
Davern, Michael J. and Robert J. Kauffman. “Discovering Potential
Weill, Peter, Jeanne Ross, and David Robertson. “Digitizing Down
and Realizing Value form Information Technology to the Core.” Optimize Magazine (September 2006).
Investments.” Journal of Management Information Systems 16,
no. 4 (Spring 2000). CHAPTER 2
Dedrick, Jason, Vijay Gurbaxani, and Kenneth L. Kraemer.
“Information Technology and Economic Performance: A "The Radicati Group Releases 'Instant Messaging Market, 2008-
Critical Review of the Empirical Evidence.” Center for 2012.'" Reuters.com (January 7, 2009).
Research on Information Technology and Organizations,
University of California, Irvine (December 2001). Alter, Allan. "Unlocking the Power of Teams." CIO Insight (March
EMarketer. "Always-On Devices and Networks." (January 2010). 2008).
Friedman, Thomas. The World is Flat. New York: Farrar, Straus,
and Giroux (2006). Aral, Sinan; Erik Brynjolfsson; and Marshall Van Alstyne,
Garretson, Rob. “IT Still Matters.” CIO Insight 81 (May 2007). "Productivity Effects of Information Diffusion in Networks,"
Hughes, Alan and Michael S. Scott Morton. “The Transforming MIT Center for Digital Business (July 2007).
Power of Complementary Assets.” MIT Sloan Management
Review 47. No. 4 (Summer 2006). Berlind, David. "Google Apps Refresh Sets up Death Match with
Ives, Blake, Joseph S. Valacich, Richard T. Watson, and Robert W. Microsoft," Information Week, April 12, 2010;
Zmud. “What Every Business Student Needs to Know about
Information Systems.” CAIS 9, Article 30 (December 2002). Bernoff, Josh and Charlene Li."Harnessing the Power of Social
Lamb, Roberta, Steve Sawyer, and Rob Kling. “A Social Informatics Applications." MIT Sloan Management Review (Spring 2008).
Perspective of Socio-Technical Networks.”
http://lamb.cba.hawaii.edu/pubs (2004). Boulton, Clint. "Google Wave Used for Disparate Collaboration
Laudon, Kenneth C. Computers and Bureaucratic Reform. New York: Cases." eWeek (February 22, 2010).
Wiley (1974).
Lev, Baruch. “Intangibles: Management, Measurement, and Broadbent, Marianne and Ellen Kitzis. The New CIO Leader.
Reporting.” The Brookings Institution Press (2001). Boston, MA: Harvard Business Press (2004).
Marchand, Donald A. “Exgtracting the Business Value of IT: IT Is
Usage, Not Just Deployment that Counts!” The Copco Cash, James I. Jr., Michael J. Earl, and Robert Morison. "Teaming
Institute Journal of Financial Transformation (2004). Up to Crack Innovation and Enterprise Integration." Harvard
Nevo, Saggi and Michael R. Wade. "The Formation and Value of IT- Business Review (November 2008).
Enabled Resources: Antecedents and Consequences of
Synergistic Relationships."MIS Quarterly 34, No. 1 (March Chen, Daniel Q., David S. Preston, and Weidong Xia. "Antecedents
2010). and Effects of CIO Supply-Side and Demand-Side Leadership:
Pew Internet and American Life Project. “Internet Activities.” A Staged Maturity Model."Journal of Management
(2008). wwwpewinternet.org, accessed 9/20/08. Information Systems 27, No. 1 (Summer 2010).
Pew Internet & American Life Project. "Daily Internet Activity,"
September 2010. Easley, Robert F., Sarv Devaraj, and J. Michael Crant."Relating
Quinn, Francis J. “eBusiness Evangelist; An Interview with Erik Collaborative Technology Use to Teamwork Quality and
Brynjolfsson.” Supply Chain Management Review (May/June Performance: An Empirical Analysis." Journal of
2006). Management Information Systems 19, no. 4 (Spring 2003)
Ross, Jeanne W., and Peter Weill. “Six IT Decisions Your IT People
Shouldn’t Make.” Harvard Business Review (November 2002). Frost & White. "Meetings Around the World II: Charting the
Course of Advanced Collaboration." (October 14, 2009).
IBM. "EuroChem Finds the Right Chemistry for Collaboration with
IBM." (June 30, 2009).
Johnson, Bradfor, James Manyika, and Lareina Yee. "The Next
Revolution in Interactions," McKinsey Quarterly No. 4
(2005).
Johnston, Russell, and Michael J. Vitale. "Creating Competitive
Advantage with Interorganizational Information Systems."
MIS Quarterly 12, no. 2 (June 1988).
R1
R 2 References Chen, Daniel Q., Martin Mocker, David S. Preston, and Alexander
Teubner. "Information Systems Strategy:
Lardi-Nadarajan, Kamales. "Doing Business in Virtual Worlds." Reconceptualization, Measurement, and Implications." MIS
CIO Insight (March 2008). Quarterly 34, no. 2 (June 2010).
Malone, Thomas M., Kevin Crowston, Jintae Lee, and Brian Christensen, Clayton M. The Innovator's Dilemma : The
Pentland. "Tools for Inventing Organizations: Toward a Revolutionary Book That Will Change the Way You Do
Handbook of Organizational Processes." Management Business, New York: HarperCollins (2003)
Science 45, no. 3 (March 1999).
Christensen, Clayton. "The Past and Future of Competitive
McAfee, Andrew P. "Shattering the Myths About Enterprise 2.0." Advantage." Sloan Management Review 42, no. 2 (Winter
Harvard Business Review (November 2009). 2001).
Microsoft Corporation. "Sony Electronics Improves Collaboration, Clemons, Eric K. "Evaluation of Strategic Investments in
Information Access, and Productivity." (May 12, 2010). Information Technology." Communications of the ACM
(January 1991).
Nolan, Richard, and F. Warren McFarland. "Information
Technology and the Board of Directors." Harvard Business Clemons, Eric. "The Power of Patterns and Pattern Recognition
Review (October 1, 2005). When Developing Information-Based Strategy. Journal of
Management Information Systems 27, No. 1 (Summer 2010).
Oracle Corporation. "Alcoa Implements Oracle Solution 20%
below Projected Cost, Eliminates 43 Legacy Systems." Coase, Ronald H. "The Nature of the Firm."(1937) in Putterman,
www.oracle.com, accessed August 21, 2005. Louis and Randall Kroszner. The Economic Nature of the
Firm: A Reader, Cambridge University Press, 1995.
Perez, Dan. "The New Data-Driven U.S. Government." SIPA News
(January 2010). Drucker, Peter. "The Coming of the New Organization." Harvard
Business Review (January-February 1988).
Picarelle, Lisa. Planes, Trains, and Automobiles." Customer
Relationship Management (February 2004). Eisenhardt, Kathleen M. "Has Strategy Changed?" Sloan
Management Review 43, no.2 (Winter 2002).
Poltrock, Steven and Mark Handel. "Models of Collaboration as the
Foundation for Collaboration Technologies. Journal of Feeny, David E., and Blake Ives. "In Search of Sustainability:
Management Information Systems 27, No. 1 (Summer 2010). Reaping Long-Term Advantage from Investments in
Information Technology." Journal of Management
Premier Global Services. "Evaluating Shift to Online Information Systems (Summer 1990).
Communication Tools."(2010).
Ferguson, Glover, Sanjay Mathur, and Baiju Shah. "Evolving from
Raghupathi, W. "RP". "Corporate Governance of IT: A Framework Information to Insight." MIT Sloan Management Review 46,
for Development." Communications of the ACM 50, No. 8 no. 2 (Winter 2005).
(August 2007).
Fine, Charles H., Roger Vardan, Robert Pethick, and Jamal E-Hout.
Rapoza, Jim. "SharePoint Moves into the Modern Web Age." eWeek "Rapid-Response Capability in Value-Chain Design." Sloan
(January 18, 2010). Management Review 43, no.2 (Winter 2002).
Reinig, Bruce A. "Toward an Understanding of Satisfaction with the Freeman, John, Glenn R. Carroll, and Michael T. Hannan. "The
Process and Outcomes of Teamwork." Journal of Liability of Newness: Age Dependence in Organizational
Management Information Systems 19, no. 4 (Spring 2003) Death Rates." American Sociological Review 48 (1983).
SAP. "Alcan Packaging Implements mySAP SCM to Increase Gallaugher, John M. and Yu-Ming Wang. "Understanding Network
Shareholder Value." www.mysap.com, accessed August 20, Effects in Software Markets: Evidence from Web Server
2005. Pricing." MIS Quarterly 26, no. 4 (December 2002).
Siebdrat, Frank, Martin Hoegl, and Holger Ernst. "How to Manage Garretson, Rob."IS IT Still Strategic?" CIO Insight (May 2007).
Virtual Teams." MIT Sloan Management Review 50, No. 4 Gilbert, Clark and Joseph L. Bower, "Disruptive Change." Harvard
(Summer 2009).
Business Review (May 2002),
Soat, John. "Tomorrow's CIO." Information Week (June 16, 2008). Gurbaxani, V., and S. Whang, "The Impact of Information Systems
Vance, Ashlee. "Microsoft's SharePoint Thrives in the Recession."
on Organizations and Markets." Communications of the ACM
The New York Times (August 7, 2009). 34, no. 1 (Jan. 1991).
Weill, Peter and Jeanne W. Ross. IT Governance. Boston: Harvard Hitt, Lorin M. "Information Technology and Firm Boundaries:
Evidence from Panel Data." Information Systems Research
Business School Press (2004). 10, no. 2 (June 1999).
Weill, Peter, and Jeanne Ross. "A Matrixed Approach to Designing Hitt, Lorin M., and Erik Brynjolfsson. "Information Technology
and Internal Firm Organization: An Exploratory Analysis."
IT Governance." MIT Sloan Management Review 46, no. 2 Journal of Management Information Systems 14, no. 2 (Fall
(Winter 2005). 1997).
Huber, George. "Organizational Learning: The Contributing
CHAPTER 3 Processes and Literature." Organization Science, 2 (1991), pp.
88-115.
Attewell, Paul, and James Rule. "Computing and Organizations: ------. "The Nature and Design of Post-Industrial Organizations."
What We Know and What We Don't Know." Communications Management Science 30, no. 8 (August 1984).
of the ACM 27, no. 12 (December 1984). Iansiti, Marco, and Roy Levien. "Strategy as Ecology." Harvard
Business Review (March 2004).
Bhatt, Ganesh D., and Varun Grover. "Types of Information Ives, Blake and Gabriele Piccoli. "Custom Made Apparel and
Technology Capabilities and Their Role in Competitive Individualized Service at Lands' End." Communications of
Advantage." Journal of Management Information Systems 22, the AIS 11 (2003).
no.2 (Fall 2005). Iyer, Bala and Thomas H. Davenport. "Reverse Engineering
Google's Innovation Machine." Harvard Business Review
Bresnahan, Timohy F., Erik Brynjolfsson, and Lorin M. Hitt, (April 2008).
"Information Technology, Workplace Organization, and the Jensen, M. C., and W. H. Meckling. "Specific and General
Demand for Skilled Labor." Quarterly Journal of Economics Knowledge and Organizational Science." In Contract
117 (February 2002).
Bughin, Jacques, Michael Chui, and Brad Johnson. "The Next Step
in Open Innovation." The McKinsey Quarterly (June 2008).
Cash, J. I., and Benn R. Konsynski. "IS Redraws Competitive
Boundaries." Harvard Business Review (March-April 1985).
Champy, James. Outsmart: How to Do What Your Competitors
Can't. Upper Saddle River, NJ: FT Press (2008).
Economics, edited by L. Wetin and J. Wijkander. Oxford: Basil References R 3
Blackwell (1992).
Jensen, Michael C., and William H. Meckling. "Theory of the Mendelson, Haim, and Ravindra R. Pillai. "Clock Speed and
Firm: Managerial Behavior, Agency Costs, and Ownership Informational Response: Evidence from the Information
Structure." Journal of Financial Economics 3 (1976). Technology Industry." Information Systems Research 9, no. 4
Kauffman, Robert J. and Yu-Ming Wang. "The Network (December 1998).
Externalities Hypothesis and Competitive Network Growth."
Journal of Organizational Computing and Electronic Mintzberg, Henry. "Managerial Work: Analysis from Observation."
Commerce 12, no. 1 (2002). Management Science 18 (October 1971).
Kettinger, William J., Varun Grover, Subashish Guhan, and Albert
H. Segors. "Strategic Information Systems Revisited: A Study ------. The Structuring of Organizations. Englewood Cliffs, NJ:
in Sustainability and Performance." MIS Quarterly 18, no. 1 Prentice Hall (1979).
(March 1994).
King, J. L., V. Gurbaxani, K. L. Kraemer, F. W. McFarlan, K. S. Murray, Alan. "The End of Management." The Wall Street Journal
Raman, and C. S. Yap. "Institutional Factors in Information (August 21, 2010).
Technology Innovation." Information Systems Research 5, no.
2 (June 1994). Orlikowski, Wanda J., and Daniel Robey. "Information Technology
Kling, Rob. "Social Analyses of Computing: Theoretical and the Structuring of Organizations." Information Systems
Perspectives in Recent Empirical Research." Computing Research 2, no. 2 (June 1991).
Survey 12, no. 1 (March 1980).
Kolb, D. A., and A. L. Frohman. "An Organization Development Piccoli, Gabriele, and Blake Ives. "Review: IT-Dependent Strategic
Approach to Consulting." Sloan Management Review 12, no. 1 Initiatives and Sustained Competitive Advantage: A Review
(Fall 1970). and Synthesis of the Literature." MIS Quarterly 29, no. 4
Koulopoulos, Thomas, and James Champy. "Building Digital Value (December 2005).
Chains." Optimize (September 2005).
Kraemer, Kenneth, John King, Debora Dunkle, and Joe Lane. Pindyck, Robert S., and Daniel L. Rubinfeld. Microeconomics,
Managing Information Systems. Los Angeles: Jossey-Bass Seventh Ed. Upper Saddle River, NJ: Prentice Hall (2009).
(1989).
Lamb, Roberta and Rob Kling. "Reconceptualizing Users as Social Porter, Michael E. "The Five Competitive Forces that Shape
Actors in Information Systems Research." MIS Quarterly 27, Strategy." Harvard Business Review (January 2008).___
no. 2 (June 2003).
Laudon, Kenneth C. "A General Model of the Relationship Porter, Michael E. and Scott Stern. "Location Matters." Sloan
Between Information Technology and Organizations." Center Management Review 42, no. 4 (Summer 2001).
for Research on Information Systems, New York University.
Working paper, National Science Foundation (1989). Porter, Michael. Competitive Advantage. New York: Free Press
------. "Environmental and Institutional Models of Systems (1985).
Development." Communications of the ACM 28, no. 7 (July
1985). ------. Competitive Strategy. New York: Free Press (1980).
------. Dossier Society: Value Choices in the Design of National ------ "Strategy and the Internet." Harvard Business Review (March
Information Systems. New York: Columbia University Press
(1986). 2001).
Laudon, Kenneth C. and Kenneth L. Marr, "Information Prahalad, C.K.and M.S.Krishnan. The New Age of Innovation.
Technology and Occupational Structure." (April 1995).
Lawrence, Paul, and Jay Lorsch. Organization and Environment. Driving Cocreated Value Through Global Networks. New
Cambridge, MA: Harvard University Press (1969). York: McGraw Hill (2008).
Leavitt, Harold J. "Applying Organizational Change in Industry: Robey, Daniel and Marie-Claude Boudreau. "Accounting for the
Structural, Technological, and Humanistic Approaches." In Contradictory Organizational Consequences of Information
Handbook of Organizations, edited by James G. March. Technology: Theoretical Directions and Methodological
Chicago: Rand McNally (1965). Implications." Information Systems Research 10, no. 42
Leavitt, Harold J., and Thomas L. Whisler. "Management in the (June1999).
1980s." Harvard Business Review (November-December Shapiro, Carl, and Hal R. Varian. Information Rules. Boston, MA:
1958). Harvard Business School Press (1999).
Luftman, Jerry. Competing in the Information Age: Align in the Shpilberg, David, Steve Berez, Rudy Puryear, and Sachin Shah.
Sand,. Oxford University Press , USA; 2 edition (August 6, "Avoiding the Alignment Trap in Information Technology."
2003). MIT Sloan Management Review 49, no. 1 (Fall 2007).
Malone, Thomas W., JoAnne Yates, and Robert I. Benjamin. Starbuck, William H. "Organizations as Action Generators."
"Electronic Markets and Electronic Hierarchies." American Sociological Review 48 (1983).
Communications of the ACM (June 1987). Tushman, Michael L., and Philip Anderson. "Technological
March, James G., and Herbert A. Simon. Organizations. New York: Discontinuities and Organizational Environments."
Wiley (1958). Administrative Science Quarterly 31 (September 1986).
Markus, M. L. "Power, Politics, and MIS Implementation." Wallace, Amy. "Putting Customers In Charge of Design." The New
Communications of the ACM 26, no. 6 (June 1983). York Times (May 14, 2010).
McAfee, Andrew and Erik Brynjolfsson. "Investing in the IT That Watson, Brian P. "Is Strategic Alignment Still a Priority?" CIO
Makes a Competitive Difference." Harvard Business Review Insight (October 2007).
(July/August 2008). Weber, Max. The Theory of Social and Economic Organization.
McFarlan, F. Warren. "Information Technology Changes the Way Translated by Talcott Parsons. New York: Free Press (1947).
You Compete." Harvard Business Review (May-June 1984). Williamson, Oliver E. The Economic Institutions of Capitalism.
New York: Free Press, (1985).
CHAPTER 4
Angst, Corey M. and Ritu Agarwal. "Adoption of Electronic Health
Records in the Presence of Privacy Concerns: The
Elaboration Likelihood Model and Individual Persuasion."
MIS Quarterly 33, No. 2 (June 2009).
Baumstein, Avi. "New Tools Close Holes in Cam-Spam."
Information Week (February 23, 2009).
Beck, Melinda. "Becoming a Squinter Nation." The Wall Street
Journal (August 17, 2010).
R 4 References Smith, H. Jeff, and John Hasnas. "Ethics and Information Systems:
The Corporate Domain." MIS Quarterly 23, no. 1 (March
Bhattacharjee, Sudip, Ram D. Gopal, and G. Lawrence Sanders. 1999).
"Digital Music and Online Sharing: Software Piracy 2.0?"
Communications of the ACM 46, no.7 (July 2003). Smith, H. Jeff. "The Shareholders vs. Stakeholders Debate." MIS
Sloan Management Review 44, no. 4 (Summer 2003).
Bowen, Jonathan. "The Ethics of Safety-Critical
Systems."Communications of the ACM 43, no. 3 (April 2000). Steel, Emily and Jessica E. Vascellaro. "Facebook, MySpace
Confront Privacy Loophole." The Wall Street Journal (May 21,
Brown Bag Software vs. Symantec Corp. 960 F2D 1465 (Ninth 2010).
Circuit, 1992).
Steel, Emily and Julia Angwin,"On the Web's Cutting Edge,
Carr, Nicholas. "Tracking Is an Assault on Liberty, with Real Anonymity in Name Only." The Wall Street Journal (August
Dangers." The Wall Street Journal (August 7, 2010). 4, 2010).
Chellappa, Ramnath K. and Shivendu Shivendu. "An Economic Steel, Emily. "Marketers Watch Friends Interact Online." The Wall
Model of Privacy: A Property Rights Approach to Regulatory Street Journal (April 15, 2010)
Choices for Online Personalization." Journal of Management
Information Systems 24, no. 3 (Winter 2008). ________"Exploring Ways to Build a Better Consumer Profile," The
Wall Street Journal (March 15, 2010)
Clifford, Stephanie. "Web Coupons Know Lots About You, and
They Tell." The New York Times (April 16, 2010) Story, Louise. "To Aim Ads, Web Is Keeping Closer Eye on You."
The New York Times (March 10, 2008).
Culnan, Mary J. and Cynthia Clark Williams. "How Ethics Can
Enhance Organizational Privacy." MIS Quarterly 33, No. 4 Stout, Hilary. "Antisocial Networking?" The New York Times (May
(December 2009). 2, 2010).
Farmer, Dan and Charles C. Mann. "Surveillance Nation." Part I United States Department of Health, Education, and Welfare.
Technology Review (April 2003) and Part II (Technology Records, Computers, and the Rights of Citizens. Cambridge:
Review (May 2003).. MIT Press (1973).
Goodman, Joshua, Gordon V. Cormack, and David Heckerman. Urbaczewski, Andrew and Leonard M. Jessup. "Does Electronic
"Spam and the Ongoing Battle for the Inbox." Monitoring of Employee Internet Usage Work?"
Communications of the ACM 50, No. 2 (February 2007). Communications of the ACM 45, no. 1 (January 2002).
Grimes, Galen A. "Compliance with the CAN-SPAM Act of 2003." Valentino-Devries, Jennifer and Emily Steel. "'Cookies' Cause
Communications of the ACM 50, No. 2 (February 2007). Bitter Backlash." The Wall Street Journal (September 19,
2010).
Harper, Jim. "It's Modern Trade: Web Users Get as Much as They
Give." The Wall Street Journal (August 7, 2010). Vascellaro, Jessica E. "Google Agonizes on Privacy as Ad World
Vaults Ahead." The Wall Street Journal (August 10, 2010).
Hsieh, J.J. Po-An, Arun Rai, and Mark Keil. "Understanding Digital
Inequality: Comparing Continued Use Behavioral Models of Xu, Heng, Hock-Hai Teo, Bernard C.Y. Tan, and Ritu Agarwal.
the Socio-Economically Advantaged and Disadvantaged." MIS "The Role of Push-Pull Technology in Privacy Calculus: The
Quarterly 32, no. 1 (March 2008). Case of Location-Based Services." Journal of Management
Information Systems 26, No. 3 (Winter 2010).
Jackson, Linda A., Alexander von Eye, Gretchen Barbatsis, Frank
Biocca, Hiram E. Fitzgerald, and Yong Zhao. "The Impact of CHAPTER 5
Internet Use on the Other Side of the Digital Divide."
Communications of the ACM 47, no. 7 (July 2004). "IBM Launches New Autonomic Offerings for Self-Managing IT
Systems." IBM Media Relations (June 30, 2005).
Jackson, Thomas W., Ray Dawson, and Darren Wilson.
"Understanding Email Interaction Increases Organizational Amazon Web Services."AWS Case Study: Envoy Media Group."
Productivity." Communications of the ACM 46, no. 8 (August (January 2010).
2003).
Babcock, Charles. "Linux No Longer the Cool New Kid on the
Laudon, Kenneth C. and Carol Guercio Traver. E-Commerce: Block. Now What?" Information Week (April 14, 2008).
Business, Technology, Society 7th Edition. Upper Saddle
River, NJ: Prentice-Hall (2011). Carr, Nicholas. The Big Switch. New York: Norton (2008).
Cheng, Roger. "'Cloud Computing': What Exactly Is It Anyway?"
Laudon, Kenneth C. Dossier Society: Value Choices in the Design
of National Information Systems. New York: Columbia The Wall Street Journal (February 8, 2010).
University Press (1986b). Chickowski, Ericka."How Good Are Your Service-Level
Lohr, Steve. "How Privacy Vanishes Online." The New York Times Agreements?" Baseline (January 2008).
(March 16, 2010.) Choi, Jae, Derek L. Nazareth, and Hemant K. Jain. "Implementing
Matt Richtel, "Hooked on Gadgets,and Paying a Mental Price," The Service-Oriented Architecture in Organizations." Journal of
New York Times, June 7, 2010. Management Information Systems 26, No. 4 (Spring 2010).
Cole, Arthur. "Mainframes They Are A'Changin,"
Nord, G. Daryl, Tipton F. McCubbins, and Jeretta Horn Nord. "E- ITBusinessEdge.com, January 20, 2009.
Monitoring in the Workplace: Privacy, Legislation, and David, Julie Smith, David Schuff, and Robert St. Louis. "Managing
Surveillance Software. Communications of the ACM 49, No. 8 Your IT Total Cost of Ownership." Communications of the
(August 2006). ACM 45, no. 1 (January 2002).
Dempsey, Bert J.. Debra Weiss, Paul Jones, and Jane Greenberg.
Okerson, Ann. "Who Owns Digital Works?" Scientific American "What Is an Open Source Software Developer?"
(July 1996). Communications of the ACM 45, no. 1 (January 2001).
Dubney, Abhijit and Dilip Wagle. "Delivering Software as a
Payton, Fay Cobb."Rethinking the Digital Divide." Service." The McKinsey Quarterly (June 2007).
Communications of the ACM 46, no. 6 (June 2003) Fitzgerald, Brian. "The Transformation of Open Source Software."
MIS Quarterly 30, No. 3 (September 2006).
Rapoza, Jim. "Web Bug Alert." EWeek (June 15, 2009). Fox, Armando, and David Patterson. "Self-Repairing Computers."
Rifkin, Jeremy. "Watch Out for Trickle-Down Technology." The Scientific American (May 2003.).
Ganek, A. G., and T. A. Corbi. "The Dawning of the Autonomic
New York Times (March 16, 1993). Computing Era." IBM Systems Journal 42, no 1, (2003).
Rigdon, Joan E. "Frequent Glitches in New Software Bug Users."
The Wall Street Journal (January 18, 1995).
Risen, James and Eric Lichtblau. "E-Mail Surveillance Renews
Concerns in Congress." The New York Times (June 17, 2009).
Schwartz, Matthew J. "Sophos: U.S. Leads List of Spam
Originators." Information Week (July 15, 2010).
Singer, Natasha. "Shoppers Who Can't Have Secrets." The New
York Times (April 30, 2010).
Gerlach, James, Bruce Neumann, Edwin Moldauer, Martha Argo, References R 5
and Daniel Frisby." Determining the Cost of IT
Services."Communications of the ACM 45, no. 9 (September Stango, Victor. "The Economics of Standards Wars." Review of
2002). Network Economics 3, Issue 1 (March 2004).
Glader, Paul and Don Clark. "IBM Launches Next Generation of Stone, Brad and Ashlee Vance. "Companies Slowly Join Cloud
Chips and Servers." The Wall Street Journal (February 7, Computing," The New York Times (April 18, 2010).
2010).
Susarla, Anjana, Anitesh Barua, and Andrew B. Whinston. "A
Gomes, Lee and Taylor Buley. "Is the PC Dead?" Forbes Transaction Cost Perspective of the 'Software as a Service'
(December 28, 2010). Business Model. " Journal of Management Information
Systems 26, No. 2 (Fall 2009).
Google Inc., "Cloud Computing: Latest Buzzword or a Glimpse of
the Future?" CBS Interactive (2009). Tuomi, Ilkka. "The Lives and Death of Moore's Law." FirstMonday,
Col 7, No. 11
Duvall, Mel. "Study Predicts Big Shift to Cloud By 2020."
Information Management (June 10, 2010). (November 2002). www.firstmonday.org.
Vance, Ashlee. "Open Source as a Model for Business Is Elusive."
Hagel III, John and John Seeley Brown. "Your Next IT Strategy."
Harvard Business Review (October, 2001). The New York Times (November 29, 2009).
Vance, Ashlee. "Microsoft Office 2010 Starts Ascension to the
Hay, Timothy."IBM Survey Says Mobile Apps Will Dominate
Enterprise." The Wall Street Journal (October 7, 2010). Cloud." The New York Times (July 13, 2009).
Walsh, Lawrence. "Outsourcing: A Means of Business
Helft, Miguel. "Google Offers Peek at Operating System, a
Potential Challenger to Windows." The New York Times Enablement." Baseline (May 2008).
(November 20, 2009). Weill, Peter, and Marianne Broadbent. Leveraging the New
IBM. "IBM Launches New Autonomic Offerings for Self-Managing Infrastructure. Cambridge, MA: Harvard Business School
IT Systems." IBM Media Relations (June 30, 2005). Press (1998).
Weill, Peter, Mani Subramani and Marianne Broadbent. "Building
IBM. "Seeding the Clouds: Key Infrastructure Elements for Cloud IT Infrastructure for Strategic Agility." Sloan Management
Computing." (February 2009). Review 44, no. 1 (Fall 2002).
Weitzel, Tim. Economics of Standards in Information Networks.
IBM. "The Benefits of Cloud Computing." (2009). Springer (2004).
Kauffman, Robert J. and Julianna Tsai. "The Unified Procurement
CHAPTER 6
Strategy for Enterprise Software: A Test of the 'Move to the
Middle' Hypothesis." Journal of Management Information Cappiello, Cinzia, Chiara Francalanci, and Barbara Pernici. "Time-
Systems 26, No. 2 (Fall 2009). Related Factors of Data Quality in Multichannel Information
King, John. "Centralized vs. Decentralized Computing: Systems." Journal of Management Information Systems 20,
Organizational Considerations and Management Options." no. 3 (Winter 2004).
Computing Surveys (October 1984).
Kurzweil, Ray. "Exponential Growth an Illusion?: Response to Chen, Andrew N. K., Paulo B. Goes, and James R. Marsden. "A
Ilkka Tuomi." KurzweilAI.net, September 23, 2003 Query-Driven Approach to the Design and Management of
Leong, Lydia and Ted Chamberlin. "Magic Quadrant for Web Flexible Database Systems." Journal of Management
Hosting and Hosted Cloud System Infrastructure Services Information Systems 19, no. 3 (Winter 2002-2003).
(On Demand)." Gartner Inc. (July 2, 2009).
Lohr, Steve. "Bundling Hardware and Software to Do Big Jobs." Clifford, James, Albert Croker, and Alex Tuzhilin. "On Data
The New York Times (February 8, 2010). Representation and Use in a Temporal Relational DBMS."
Markoff, John. "After the Transistor, a Leap into the Microcosm." Information Systems Research 7, no. 3 (September 1996).
The New York Times, August 31, 2009
McAfee, Andrew. "Will Web Services Really Transform Eckerson, Wayne W. "Data Quality and the Bottom Line." The Data
Collaboration?" MIT Sloan Management Review 46, no. 2 Warehousing Institute (2002).
(Winter 2005).
McCafferty, Dennis. "Cloudy Skies: Public Vs. Private Option Still Fayyad, Usama, Ramasamy Ramakrishnan, and Ramakrisnan
Up in the Air." Baseline (March/April 2010). Srikant. "Evolving Data Mining into Solutions for Insights."
Mell, Peter and Tim Grance. "The NIST Definition of Cloud Communications of the ACM 45, no.8 (August 2002).
Computing" Version 15. NIST (October 17, 2009).
Metrics 2.0. "Worldwide PC Shipments to Reach 334 Million in Foshay, Neil, Avinandan Mukherjee and Andrew Taylor. "Does
2010." Metrics2.com, accessed October 2, 2010. Data Warehouse End-User Metadata Add Value?
Moore, Gordon. "Cramming More Components Onto Integrated Communications of the ACM 50, no. 11 (November 2007).
Circuits," Electronics 38, Number 8 (April 19, 1965).
Mueller, Benjamin, Goetz Viering, Christine Legner, and Gerold Gartner Inc. "'Dirty Data' is a Business Problem, not an IT
Riempp. "Understanding the Economic Potential of Service- Problem, Says Gartner." Sydney, Australia (March 2, 2007).
Oriented Architecture." Journal of Management Information
Systems 26, No. 4 (Spring 2010). Henschen, Doug. "Text Mining for Customer Insight." Information
Oltsik, Jon. "What's Needed For Cloud Computing." Enterprise Week (November 30, 2009).
Strategy Group (June 2010).
Patel, Samir, and Suneel Saigal. "When Computers Learn to Talk: Henschen, Doug. "Big and Fast." Information Week (August 9,
A Web Services Primer." McKinsey Quarterly no. 1 (2002). 2010).
Rogow, Rruce."Tracking Core Assets." Optimize Magazine (April
2006). Henschen, Doug. "The Data Warehouse Revised." Information
Schuff, David and Robert St. Louis. "Centralization vs. Week (May 26, 2008).
Decentralization of Application Software." Communications
of the ACM 44, no. 6 (June 2001). Henschen, Doug."Wendy's Taps Text Analytics to Mine Customer
Seltzer, Larry. "OS of the Future: Built for Security." eWeek (April Feedback," Information Week (March 23, 2010).
19,2010).
Hoffer, Jeffrey A., Mary Prescott, and Heikki Toppi. Modern
Database Management, 10th ed. Upper Saddle River, NJ:
Prentice-Hall (2011).
Jinesh Radadia. "Breaking the Bad Data Bottlenecks." Information
Management (May/June 2010).
Kim, Yong Jin, Rajiv Kishore, and G. Lawrence Sanders. "From DQ
to EQ: Understanding Data Quality in the Context of E-
Business System"Communications of the ACM 48, no. 10
(October 2005).
Klau, Rick. "Data Quality and CRM." Line56.com, accessed March
4, 2003.
R 6 References Xiao, Bo and Izak Benbasat. "E-Commerce Product
Recommendation Agents: Use, Characteristics, and Impact."
Kroenke, David M. and David Auer. Database Processing 11e. MIS Quarterly 31, no. 1 (March 2007).
Upper Saddle River, NJ: Prentice-Hall (2010).
CHAPTER 8
Lee, Yang W., and Diane M. Strong. "Knowing-Why about Data
Processes and Data Quality." Journal of Management Ante, Spencer E. "Dark Side Arises for Phone Apps." The Wall
Information Systems 20, no. 3 (Winter 2004). Street Journal (June 6, 2010).
Loveman, Gary. "Diamonds in the Datamine." Harvard Business ------. "Get Smart: Targeting Phone Security Flaws." The Wall Street
Review (May 2003). Journal (June 15, 2010).
McKnight, William. "Seven Sources of Poor Data Quality." Bernstein, Corinne. "The Cost of Data Breaches." Baseline (April
Information Management (April 2009). 2009)
Pierce, Elizabeth M. "Assessing Data Quality with Control Bray, Chad. "Global Cyber Scheme Hits Bank Accounts." The Wall
Matrices." Communications of the ACM 47, no. 2 (February Street Journal (October 1, 2010.)
2004).
Brenner, Susan W. "U.S. Cybercrime Law: Defining Offenses."
Redman, Thomas. Data Driven: Profiting from Your Most Information Systems Frontiers 6, no. 2 (June 2004).
Important Business Asset. Boston: Harvard Business Press
(2008). Cavusoglu, Huseyin, Birendra Mishra, and Srinivasan
Raghunathan. "A Model for Evaluating IT Security
Stodder, David."Customer Insights." Information Week (February Investments." Communications of the ACM 47, no. 7 (July
1, 2010) 2004).
CHAPTER 7 Chickowski, Ericka. "Is Your Information Really Safe?" Baseline
(April 2009).
Borland, John. "A Smarter Web." Technology Review
(March/April 2007). Choe Sang-Hun, "Cyberattacks Hit U.S. and South Korean Web
Sites," The New York Times, July 9, 2009.
Bustillo, Maguel. "Wal-Mart Radio Tags to Track Clothing." The
Wall Street Journal (July 23, 2010). Computer Security Institute. "2009 CSI Computer Crime and
Security Survey" (2009).
Cheng, Roger. "Verizon Readies 4G Launch." The Wall Street
Journal (October 7, 2010). Consumer Reports. "State of the Net 2010." (June 2010).
Coopes, Amy. "Australian 17-Year-Old Takes Blame for Twitter
Dekleva, Sasha, J.P. Shim, Upkar Varshney, and Geoffrey
Knoerzer. "Evolution and Emerging Issues in Mobile Wireless Chaos." AFP (September 22, 2010).
Networks." Communications of the ACM 50, No. 6 (June D'Arcy, John and Anat Hovav. "Deterring Internal Information
2007).
Systems Use." Communications of the ACM 50, no. 10
EMarketer. "US Ad Spending." (June 2010) (October 2007).
Fish, Lynn A. and Wayne C. Forrest. "A Worldwide Look at RFID." Danchev, Dancho."Malware Watch: Rogue Facebook Apps, Fake
Amazon Orders, and Bogus Adobe Updates." ZD Net (May 19,
Supply Chain Management Review (April 1, 2007). 2010).
Furchgott, Roy. "That's a Nice Phone, But How's the Network?" Dash, Eric. "Online Woes Plague Chase for 2nd Day." The New
York Times (September 15, 2010).
The New York Times (June 30, 2010). Ely, Adam. "Browser as Attack Vector." Information Week (August
Helft, Miguel. "Google Makes a Case That It Isn't So Big." The New 9, 2010).
Feretic, Eileen. "Security Lapses More Costly."baselinemag.com,
York Times (June 29, 2009) January 26, 2010
Housel, Tom, and Eric Skopec. Global Telecommunication Foley, John. "P2P Peril." Information Week (March 17, 2008).
Fratto, Mike. "What's Your Appetite for Risk?" Information Week
Revolution: The Business Perspective. New York: McGraw- (June 22, 2009).
Hill (2001). Giordano, Scott M. "Electronic Evidence and the Law." Information
ICANN. "ICANN Policy Update." 10, No. 9 (September 2010). Systems Frontiers 6, No. 2 (June 2004).
Kocas, Cenk. "Evolution of Prices in Electronic Markets under Galbreth, Michael R. and Mikhael Shor. "The Impact of Malicious
Diffusion of Price-Comparison Shopping." Journal of Agents on the Enterprise Software Industry." MIS Quarterly
Management Information Systems 19, no. 3 (Winter 2002- 34, no. 3 (September 2010).
2003). Gorman, Siobhan. "Broad New Hacking Attack Detected." The Wall
Nicopolitidis, Petros, Georgios Papademitriou, Mohammad S. Street Journal (February 18, 2010).
Obaidat, and Adreas S. Pomportsis. "The Economics of Housley, Russ, and William Arbaugh. "Security Problems in
Wireless Networks." Communications of the ACM 47, no. 4 802.11b Networks." Communications of the ACM 46, no. 5
(April 2004). (May 2003).
Panko, Raymond. Business Data Networks and IBM. "Secure By Design: Building Identity-Based Security into
Telecommunications 8e. Upper Saddle River, NJ: Prentice- Today's Information Systems." (March 2010).
Hall (2011). Ives, Blake, Kenneth R. Walsh, and Helmut Schneider. "The
Papazoglou, Mike P. "Agent-Oriented Technology in Support of E- Domino Effect of Password Reuse." Communications of the
Business." Communications of the ACM 44, no. 4 (April ACM 47, no.4 (April 2004).
2001). Jagatic Tom, Nathaniel Johnson, Markus Jakobsson, and Filippo
Phillips, Lisa E. "US Internet Users, 2010."eMarketer (April 2010). Menczer. "Social Phishing." Communications of the ACM 50,
Pottie, G. J., and W.J Kaiser. "Wireless Integrated Network no. 10 (October 2007).
Sensors." Communications of the ACM 43, no. 5 (May 2000). Javelin Strategy & Research. "2010 Identity Fraud Survey Report."
St. Clair, Scott and Keefe Bailey. "Prognosis: Opportunity." (2010).
Information Week (March 8, 2010). Markoff, John. "Vast Spy System Loots Computers in 103
"The Internet of Things." McKinsey Quarterly (March 2010). Countries." The New York Times (March 29, 2009).
Varshney, Upkar, Andy Snow, Matt McGivern, and Christi Howard.
"Voice Over IP." Communications of the ACM 45, no. 1
(January 2002).
Wingfield, Nick and Amir Efrati. "Google Rekindles the Browser
War." The Wall Street Journal (July 7, 2010).
McDougall, Paul. "High Cost of Data Loss." Information Week References R 7
(March 20,2006).
Barrett, Joe. "Whirlpool Cleans Up Its Delivery Act." The Wall
McGraw, Gary. "Real-World Software Security." Information Week Street Journal (September 24, 2009).
(August 9, 2010).
Chickowski, Ericka. "5 ERP Disasters
Meckbach, Greg. "MasterCard's Robust Data Centre: Priceless." Explained."www.Baselinemag.com, accessed October 8, 2009.
Computerworld Canada (March 26, 2008).
D'Avanzo, Robert, Hans von Lewinski, and Luk N. Van
Mercuri, Rebeca T. "Analyzing Security Costs." Communications of Wassenhove. "The Link between Supply Chain and Financial
the ACM 46, no. 6 (June 2003). Performance." Supply Chain Management Review (November
1, 2003).
Mills, Elinor. "Facebook Disables Rogue Data-Stealing, Spamming
Apps." CNET News (August 20, 2009). Davenport, Thomas H. Mission Critical: Realizing the Promise of
Enterprise Systems. Boston: Harvard Business School Press
Mitchell, Dan. "It's Here: It's There; It's Spyware." The New York (2000).
Times (May 20, 2006).
Ferrer, Jaume, Johan Karlberg, and Jamie Hintlian."Integration:
Null, Christopher. "WPA Cracked in 1 Minute." Yahoo! Tech The Key to Global Success." Supply Chain Management
(August 27, 2009). Review (March 1, 2007).
Panko, Raymond R. Corporate Computer and Network Security Fleisch, Elgar, Hubert Oesterle, and Stephen Powell. "Rapid
2e. Upper Saddle River, NJ: Pearson Prentice Hall (2010). Implementation of Enterprise Resource Planning Systems."
Journal of Organizational Computing and Electronic
"Plea in Case of Stolen Code from Goldman," Reuters, February 17, Commerce 14, no. 2 (2004).
2010
Garber, Randy and Suman Sarkar. "Want a More Flexible Supply
Prince, Brian. "The Growing E-Mail Security Challenge." eWeek Chain?" Supply Chain Management Review (January 1,
(April 21, 2008). 2007).
Pug, Ivan P.L. and Qiu-Hong Wang. "Information Security: Goodhue, Dale L., Barbara H. Wixom, and Hugh J. Watson.
Facilitating User Precautions Vis a Vis Enforcement Against "Realizing Business Benefits through CRM: Hitting the Right
Attackers. "Journal of Management Information Systems 26, Target in the Right Way." MIS Quarterly Executive 1, no. 2
No. 2 (Fall 2009). (June 2002).
Roche, Edward M., and George Van Nostrand. Information Greenbaum, Joshiua. "Is ERP Dead? Or Has It Just Gone
Systems, Computer Crime and Criminal Justice. New York: Underground?" SAP NetWeaver Magazine 3 (2007).
Barraclough Ltd. (2004).
Guinipero, Larry, Robert B. Handfield, and Douglas L. Johansen.
Ryan Naraine, "ActiveX Under Siege," eWeek (February 11, 2008). "Beyond Buying." The Wall Street Journal (March 10, 2008).
Sample, Char and Diana Kelley. "Cloud Computing Security:
Handfield, Robert B. and Ernest L. Nichols. Supply Chain
Infrastructure Issues." Security Curve June 23, 2009). Redesign: Transforming Supply Chains into Integrated Value
Sarrel, Matthew. "The Biggest Security Threats Right Now." eWeek Systems. Financial Times Press (2002).
(May 6, 2010). Henschen, Doug. "Salesforce's Facebook Envy Goes Mobile."
Schwerha, Joseph J., IV. "Cybercrime: Legal Standards Governing Information Week (September 13, 2010).
the Collection of Digital Evidence." Information Systems _________ "SAP Tries One Platform for Mobile Devices,"
Frontiers 6, no. 2 (June 2004). Information Week (March 8, 2010).
Sophos. "Security Threat Report: Midyear 2010." (2010).
Spears. Janine L. and Henri Barki. "User Participation in Hitt, Lorin, D. J. Wu, and Xiaoge Zhou. "Investment in Enterprise
Information Systems Security Risk Management." MIS Resource Planning: Business Impact and Productivity
Quarterly 34, No. 3 (September 2010). Measures." Journal of Management Information Systems 19,
Steel, Emily. "Web Ad Sales Open Door to Viruses." The Wall no. 1 (Summer 2002).
Street Journal (June 15, 2009).
Symantec. "Symantec Global Internet Security Threat Report: Johnson, Maryfran."What's Happening with ERP Today." CIO
Trends for 2009." (April 2010). (January 27, 2010).
Vance, Ashlee. "If Your Password is 123456, Just Make It HackMe."
The New York Times (January 20, 2010). Kalakota, Ravi, and Marcia Robinson. E-Business 2.0. Boston:
Volonino, Linda and Stephen R. Robinson. Principles and Practice Addison-Wesley (2001).
of Information Security. Upper Saddle River, NJ: Pearson
Prentice Hall (2004). ____________. Services Blueprint: Roadmap for Execution.
Wang, Huaiqing, and Chen Wang. "Taxonomy of Security Boston: Addison-Wesley (2003).
Considerations and Software Quality." Communications of
the ACM 46, no. 6 (June 2003). Kanakamedala, Kishore, Glenn Ramsdell, and Vats Srivatsan.
Warkentin, Merrill, Xin Luo, and Gary F. Templeton. "A "Getting Supply Chain Software Right." McKinsey Quarterly
Framework for Spyware Assessement." Communications of No. 1 (2003).
the ACM 48, no. 8 (August 2005).
Westerman, George. IT Risk: Turning Business Threats into Klein, Richard and Arun Rai. "Interfirm Strategic Information
Competitive Advantage. Harvard Business School Publishing Flows in Logistics Supply Chain Relationships. MIS
(2007) Quarterly 33, No. 4 (December 2009).
Wright, Ryan T. and Kent Marrett."The Influence of Experiental
and Dispositional Factors in Phishing: An Empirical Kopczak, Laura Rock, and M. Eric Johnson. "The Supply-Chain
Investigation of the Deceived." Journal of Management Management Effect." MIT Sloan Management Review 44, no.
Information Systems 27, No. 1 (Summer 2010). 3 (Spring 2003).
CHAPTER 9 Laudon, Kenneth C. "The Promise and Potential of Enterprise
Systems and Industrial Networks." Working paper, The
Aeppel, Timothy."'Bullwhip' Hits Firms as Growth Snaps Back." Concours Group. Copyright Kenneth C. Laudon (1999).
The Wall Street Journal (January 27, 2010).
Lee, Hau, L., V. Padmanabhan, and Seugin Whang. "The Bullwhip
Effect in Supply Chains." Sloan Management Review (Spring
1997).
Lee, Hau. "The Triple-A Supply Chain." Harvard Business Review
(October 2004).
Li, Xinxin and Lorin M. Hitt. "Price Effects in Online Product
Reviews: An Analytical Model and Empirical Analysis." MIS
Quarterly 34, No. 4 (December 2010).
Liang, Huigang, Nilesh Sharaf, Quing Hu, and Yajiong Xue.
"Assimilation of Enterprise Systems: The Effect of
R 8 References Predictions. "Journal of Management Information Systems
26, No. 2 (Fall 2009).
Institutional Pressures and the Mediating Role of Top Clifford, Stephanie. "Aisle by Aisle, an App that Pushes Bargains."
Management." MIS Quarterly 31, no. 1 (March 2007). The New York Times (August 17, 2010).
Malhotra, Arvind, Sanjay Gosain, and Omar A. El Sawy. Clifford, Stephanie."Web Coupons Know Lots About You, and They
"Absorptive Capacity Configurations in Supply Chains: Tell." The New York Times (April 16, 2010).
Gearing for Partner-Enabled Market Knowledge Creation." ComScore. "Facebook Takes Lead In Time Spent. comScore
MIS Quarterly 29, no. 1 (March 2005). Media Metrix. Press Release. (September 9, 2010).
Oracle Corporation. "Alcoa Implements Oracle Solution 20% ComScore. "Facebook Takes Lead In Time Spent." comScore
below Projected Cost, Eliminates 43 Legacy Systems." Media Metrix Press Release (September 9, 2010).
www.oracle.com, accessed August 21, 2005. Dou, Wenyu, Kai H. Lim, Chenting Su, Nan Zhou, and Nan Cui.
Rai, Arun, Ravi Patnayakuni, and Nainika Seth. "Firm Performance "Brand Positioning Strategy Using Search Engine Marketing."
Impacts of Digitally Enabled Supply Chain Integration MIS Quarterly 34, no.2 (June 2010).
Capabilities." MIS Quarterly 30 No. 2 (June 2006). EMarketer, "US Mobile Subscribers." eMarketer Chart (March
Ranganathan, C. and Carol V. Brown. "ERP Iinvestments and the 2010d)
Market Value of Firms: Toward an Understanding of EMarketer. "Paid Music Content." eMarketer Report (January
Influential ERP Project Variables." Information Systems 2010c).
Research 17, No. 2 (June 2006). EMarketer. "US Internet Users, 2010." eMarketer Report (April
Robey, Daniel, Jeanne W. Ross, and Marie-Claude Boudreau. 2010b).
"Learning to Implement Enterprise Systems: An Exploratory EMarketer. "US Portal Advertising Revenues." Report. April 2010e
Study of the Dialectics of Change." Journal of Management EMarketer. "US Retail E-commerce Forecast." eMarketer Report
Information Systems 19, no. 1 (Summer 2002). (March 2010a).
Schwartz, Ephraim. "Does ERP Matter-Industry Stalwarts Speak Evans, Philip and Thomas S. Wurster. Blown to Bits: How the
Out." InfoWorld (April 10, 2007). New Economics of Information Transforms Strategy. Boston,
Scott, Judy E., and Iris Vessey. "Managing Risks in Enterprise MA: Harvard Business School Press (2000).
Systems Implementations." Communications of the ACM 45, Fuller, Johann, Hans Muhlbacher, Kurt Matzler, and Gregor
no. 4 (April 2002). Jawecki. "Customer Empowerment Through Internet-Based
Seldon, Peter B., Cheryl Calvert, and Song Yang. "A Multi-Project Co-Creation." Journal of Management Information Systems
Model of Key Factors Affecting Organizational Benefits from 26, No. 3 (Winter 2010).
Enterprise Systems." MIS Quarterly 34, no. 2 (June 2010). Hallerman, David. "US Advertising Spending: The New Reality."
Strong, Diane M. and Olga Volkoff. "Understanding Organization- EMarketer (April 2009a).
Enterprise System Fit: A Path to Theorizing the Information Helft, Miguel. "Data, Not Design, Is King in the Age of Google."
Technology Artifact." MIS Quarterly 34, No.4 (December The New York Times (May 10, 2009).
2010). Howe, Heff. Crowdsourcing: Why the Power of the Crowd Is
Wailgum, Thomas. "Why ERP Is Still So Hard." CIO (September 9. Driving the Future of Business. New York: Random House
2009). (2008).
Wailgum, Thomas. "The Future of ERP." Parts I and II. CIO Internetworldstats.com. "Internet Usage Statistics: The Big
(November 20, 2009). Picture." Internetworldstats.com, (June 2010).
Wing, George. "Unlocking the Value of ERP." Baseline Jiang, Zhengrui and Sumit Sarkar. "Speed Matters: The Role of
(January/February 2010). Free Software Offer in Software Diffusion." Journal of
Management Information Systems 26, No. 3 (Winter 2010).
CHAPTER 10 Kaplan, Steven and Mohanbir Sawhney. "E-Hubs: the New B2B
Marketplaces." Harvard Business Review (May-June 2000).
Adomavicius, Gediminas and Alexander Tuzhilin. "Personalization Kauffman, Robert J. and Bin Wang. "New Buyers' Arrival Under
Technologies: A Process-Oriented Perspective." Dynamic Pricing Market Microstructure: The Case of Group-
Communications of the ACM 48, no. 10 (October 2005). Buying Discounts on the Internet, Journal of Management
Information Systems 18, no. 2 (Fall 2001).
Bakos, Yannis. "The Emerging Role of Electronic Marketplaces and Laseter, Timothy M., Elliott Rabinovich, Kenneth K. Boyer, and M.
the Internet." Communications of the ACM 41, no. 8 (August Johnny Rungtusanatham. "Critical Issues in Internet
1998). Retailing." MIT Sloan Management Review 48, no. 3 (Spring
2007).
Bluefly, Inc. Form 10K Report for Fiscal Year Ended December 31, Laudon, Kenneth C. and Carol Guercio Traver. E-Commerce:
2009, filed with the Securities and Exchange Commission Business, Technology, Society, 7th edition. Upper Saddle
(February 19, 2010). River, NJ: Prentice-Hall (2011).
Leimeister, Jan Marco, Michael Huber, Ulrich Bretschneider, and
Bluefly, Inc. "Form 10K Report for Fiscal Year Ended December 31, Helmut Krcmar." Leveraging Crowdsourcing: Activation-
2009." Filed with the Securities and Exchange Commission Supporting Components for IT-Based Ideas Competition."
(February 19, 2010). Journal of Management Information Systems 26, No. 1
(Summer 2009).
Bo, Xiao and Izak Benbasat. "E-Commerce Product Magretta, Joan. "Why Business Models Matter." Harvard Business
Recommendation Agents: Use, Characteristics, and Impact." Review (May 2002).
MIS Quarterly 31, no. 1 (March 2007). Markoff, John. "The Cellphone, Navigating Our Lives." The New
York Times (February 17, 2009).
Brynjolfsson, Erik,Yu Hu, and Michael D. Smith."Consumer Mattioli, Dana. "Retailers Answer Call of Smartphones." The Wall
Surpus in the Digital Economy: Estimating the Value of Street Journal (June 11, 2010).
Increased Product Variety at Online Booksellers." Michael D. Smith and Rahul Telang. "Competing with Free: The
Management Science 49, no. 11 (November 2003). Impact of Movie Broadcasts on DVD Sales and Internet
Piracy." MIS Quarterly 33, No. 2 (June 2009).
Cain Miller, Claire and Jenna Wortham. "Technology Aside, Most
People Still Decline to be Located." The New York Times
(August 29, 2010).
Cain Miller, Claire. "Take a Step Closer for an Invitation to Shop."
The New York Times (February 23, 2010).
Clemons, Eric K. "Business Models for Monetizing Internet
Applications and Web Sites: Experience, Theory, and
Miller, Claire Cain. "Google Campaign to Build Up Its Display References R 9
Ads." The New York Times (September 21, 2010).
Bargeron, David, Jonathan Grudin, Anoop Gupta, Elizabeth
Pavlou, Paul A., Huigang Liang, and Yajiong Xue. "Understanding Sanocki, Francis Li, and Scott Le Tiernan."Asynchronous
and Mitigating Uncertainty in Online Exchange Collaboration Around Multimedia Applied to On-Demand
Relationships: A Principal-Agent Perspective." MIS Quarterly Education." Journal of Management Information Systems 18,
31, no. 1 (March 2007). No. 4 (Spring 2002).
Pew Internet & American Life Project. "US Daily Internet Barker, Virginia E., and Dennis E. O'Connor. "Expert Systems for
Activities." (2010). Configuration at Digital: XCON and Beyond."
Communications of the ACM (March 1989).
Pew Internet & American Life Project. "US Daily Internet
Activities." Pew Internet & American Life Project, 2010. Becerra-Fernandez, Irma, Avelino Gonzalez, and Rajiv Sabherwal.
Knowledge Management. Upper Saddle River, NJ: Prentice-
Philips, Jeremy. "To Rake It In, Give It Away." The Wall Street Hall (2004).
Journal (July 8, 2009).
Bieer, Michael, Douglas Englebart Richard Furuta, Starr Roxanne
Rayport, Jeffrey. "Demand-Side Innovation: Where IT Meets Hiltz, John Noll, Jennifer Preece, Edward A. Stohr, Murray
Marketing." Optimize Magazine (February 2007). Turoff, and Bartel Van de Walle." Toward Virtual Community
Knowledge Evolution." Journal of Management Information
Resnick, Paul and Hal Varian. "Recommender Systems." Systems 18, No. 4 (Spring 2002).
Communications of the ACM (March 2007).
Birkinshaw, Julian and Tony Sheehan. "Managing the Knowledge
Rosenbloom, Stephanie. "Cellphones Let Shoppers Point, Click, Life Cycle." MIT Sloan Management Review 44, no. 1 (Fall
and Purchase." The New York Times (February 26, 2010). 2002).
Schoder, Detlef and Alex Talalavesky. "The Price Isn't Right." MIT Booth, Corey and Shashi Buluswar. "The Return of Artificial
Sloan Management Review (August 22, 2010). Intelligence," The McKinsey Quarterly No. 2 ( 2002 ).
Schultze, Ulrike and Wanda J. Orlikowski. "A Practice Perspective Burtka, Michael. "Generic Algorithms." The Stern Information
on Technology-Mediated Network Relations: The Use of Systems Review 1, no. 1 (Spring 1993).
Internet-Based Self-Serve Technologies." Information Systems
Research 15, no. 1 (March 2004). Churchland, Paul M., and Patricia Smith Churchland. "Could a
Machine Think?" Scientific American (January 1990).
Smith, Michael D., Joseph Bailey and Erik
Brynjolfsson."Understanding Digital Markets: Review and Cross, Rob and Lloyd Baird."Technology is Not Enough: Improving
Assessment" in Erik Brynjolfsson and Brian Kahin, ed. Performance by Building Organizational Memory." Sloan
Understanding the Digital Economy. Cambridge, MA: MIT Management Review 41, no. 3 (Spring 2000).
Press (1999).
Cross, Rob, Nitin Nohria, and Andrew Parker. "Six Myths about
Steel, Emily, "Exploring Ways to Build a Better Consumer Profile." Informal Networks-and How to Overcome Them," Sloan
The Wall Street Journal (March 15, 2010). Management Review 43, no. 3 (Spring 2002)
Steel, Emily."Marketers Watch Friends Interact Online." The Wall Davenport, Thomas H., and Lawrence Prusak. Working
Street Journal (April 15, 2010). Knowledge: How Organizations Manage What They Know.
Boston, MA: Harvard Business School Press (1997).
Story, Louise. "To Aim Ads, Web Is Keeping Closer Eye on You. "
The New York Times (March 10, 2008). Davenport, Thomas H., David W. DeLong, and Michael C. Beers.
"Successful Knowledge Management Projects." Sloan
Stross, Randall. "Just Browsing? A Web Store May Follow You Out Management Review 39, no. 2 (Winter 1998).
the Door." The New York Times (May 17, 2009).
Davenport, Thomas H., Laurence Prusak, and Bruce Strong.
Surowiecki, James. The Wisdom of Crowds: Why the Many Are "Putting Ideas to Work." The Wall Street Journal (March 10,
Smarter Than the Few and How Collective Wisdom Shapes 2008).
Business, Economies, Societies and Nations. Boston: Little,
Brown (2004). Davenport, Thomas H., Robert J. Thomas and Susan Cantrell.
"The Mysterious Art and Science of Knowledge-Worker
Tsai, Jessica. "Social Media: The Five-Year Forecast." Performance." MIT Sloan Management Review 44, no. 1 (Fall
destinationcrm.com (April 27, 2009). 2002).
United States Census Bureau. "E-Stats Report. Measuring the Davis, Gordon B. "Anytime/ Anyplace Computing and the Future
Electronic Economy." (May 27, 2010). of Knowledge Work." Communications of the ACM 42, no.12
(December 2002).
United States Census Bureau. "E-Stats Report. Measuring the
Electronic Economy." (May 27, 2010). www.census.gov. Desouza, Kevin C. "Facilitating Tacit Knowledge Exchange."
Communications of the ACM 46, no. 6 (June 2003).
Worthen, Ben. "Branching Out: Mobile Banking Finds New Users."
The Wall Street Journal (February 3, 2009). Dhar, Vasant, and Roger Stein. Intelligent Decision Support
Methods: The Science of Knowledge Work. Upper Saddle
CHAPTER 11 River, NJ: Prentice Hall (1997).
Alavi, Maryam and Dorothy Leidner. "Knowledge Management Du, Timon C., Eldon Y. Li, and An-pin Chang. "Mobile Agents in
and Knowledge Management Systems: Conceptual Distributed Network Management." Communications of the
Foundations and Research Issues," MIS Quarterly 25, No. ACM 46, no.7 (July 2003).
1ARTON (March 2001).
Earl, Michael J., and Ian A. Scott. "What Is a Chief Knowledge
Alavi, Maryam, Timothy R. Kayworth, and Dorothy E. Leidner. Officer?" Sloan Management Review 40, no. 2 (Winter 1999).
"An Empirical Investigation of the Influence of
Organizational Culture on Knowledge Management Earl, Michael. "Knowledge Management Strategies: Toward a
Practices." Journal of Management Information Systems 22, Taxonomy." Journal of Management Information Systems
No.3 (Winter 2006). 18, no. 1 (Summer 2001).
Allen, Bradley P. "CASE-Based Reasoning: Business Applications." El Najdawi, M. K., and Anthony C. Stylianou. "Expert Support
Communications of the ACM 37, no. 3 (March 1994). Systems: Integrating AI Technologies." Communications of
the ACM 36, no. 12 (December 1993).
Anthes, Gary H. "Agents Change."Computerworld (January 27,
2003). Flash, Cynthia. "Who is the CKO?" Knowledge Management (May
2001).
Awad, Elias and Hassan M Ghaziri. Knowledge Management.
Upper Saddle River, NJ: Prentice-Hall (2004). Gelernter, David. "The Metamorphosis of Information
Management." Scientific American (August 1989).
R 10 References Journal of Management Information Systems 18, no. 1
(Summer 2001).
Gordon, Steven R. and Monideepa Tarafdar. "The IT Audit that Maryam Alavi and Dorothy E. Leidner. "Knowledge Management
Boosts Innovation." MIT Sloan Management Review (June 26, and Knowledge Management Systems." MIS Quarterly 25, no.
2010). 1 (March 2001).
McCarthy, John. "Generality in Artificial Intelligence."
Gregor, Shirley and Izak Benbasat. "Explanations from Intelligent Communications of the ACM (December 1987).
Systems: Theoretical Foundations and Implications for Moravec, Hans. "Robots, After All." Communications of the ACM
Practice." MIS Quarterly 23, no. 4 (December 1999). 46, no. 10 (October 2003).
Nidumolu, Sarma R. Mani Subramani and Alan Aldrich. " Situated
Griffith, Terri L., John E. Sawyer, and Margaret A Neale. Learning and the Situated Knowledge Web: Exploring the
"Virtualness and Knowledge in Teams: Managing the Love Ground Beneath Knowledge Management." Journal of
Triangle of Organizations, Individuals, and Information Management Information Systems 18, no. 1 (Summer 2001).
Technology." MIS Quarterly 27, no. 2 (June 2003). Open Text Corporation. "Barrick Gold Turns to Open Text to Help
Streamline Information Flow." (2010).
Grover, Varun and Thomas H. Davenport. "General Perspectives Orlikowski, Wanda J. "Knowing in Practice: Enacting a Collective
on Knowledge Management: Fostering a Research Agenda." Capability in Distributed Organizing." Organization Science
Journal of Management Information Systems 18, no. 1 13, no. 3 (May-June 2002).
(Summer 2001). Patterson, Scott. "Letting the Machines Decide." The Wall Street
Journal (July 13, 2010).
Gu, Feng and Baruch Lev. "Intangible Assets. Measurements, Ranft, Annette L. and Michael D. Lord. "Acquiring New
Drivers, Usefulness." http://pages.stern.nyu.edu/~blev/. Technologies and Capabilities: A Grounded Model of
Acquisition Implementation." Organization Science 13, no. 4
Holland, John H. "Genetic Algorithms." Scientific American (July (July-August 2002).
1992). Sadeh, Norman, David W. Hildum, and Dag Kjenstad."Agent-Based
E-Supply Chain Decision Support." Journal of Organizational
Housel Tom and Arthur A. Bell. Measuring and Managing Computing and Electronic Commerce 13, no. 3 & 4 (2003)
Knowledge. New York: McGraw-Hill (2001). Samuelson, Douglas A. and Charles M. Macal. "Agent-Based
Simulation." OR/MS Today (August 2006).
Jarvenpaa, Sirkka L. and D. Sandy Staples. "Exploring Perceptions Sanders, Peter. "Boeing 787 Training Takes Virtual Path." The Wall
of Organizational Ownership of Information and Street Journal (September 2, 2010).
Expertise."Journal of Management Information Systems 18, Schultze, Ulrike and Dorothy Leidner."Studying Knowledge
no. 1 (Summer 2001). Management in Information Systems Research: Discourses
and Theoretical Assumptions." MIS Quarterly 26, no. 3
Jones, Quentin, Gilad Ravid, and Sheizaf Rafaeli. "Information (September 2002).
Overload and the Message Dynamics of Online Interaction Spangler, Scott, Jeffrey T. Kreulen, and Justin Lessler. "Generating
Spaces: A Theoretical Model and Empirical Exploration." and Browsing Multiple Taxonomies over a Document
Information Systems Research 15, no. 2 (June 2004). Collection." Journal of Management Information Systems 19,
no. 4 (Spring 2003)
Kankanhalli, Atreyi, Frasiska Tanudidjaja, Juliana Sutanto, and Spender, J. C. "Organizational Knowledge, Learning and Memory:
Bernard C.Y Tan."The Role of IT in Successful Knowledge Three Concepts In Search of a Theory." Journal of
Management Initiatives." Communications of the ACM 46, Organizational Change Management 9, 1996.
no. 9 (September 2003). Starbuck, William H. "Learning by Knowledge-Intensive Firms."
Journal of Management Studies 29, no. 6 (November 1992).
King, William R., Peter V. Marks, Jr. and Scott McCoy. "The Most Tiwana, Amrit. "Affinity to Infinity in Peer-to-Peer Knowledge
Important Issues in Knowledge Management." Platforms." Communications of the ACM 46, no. 5 (May
Communications of the ACM 45, no.9 (September 2002). 2003).
Trippi, Robert, and Efraim Turban. "The Impact of Parallel and
Kuo, R.J., K. Chang, and S.Y.Chien."Integration and Self- Neural Computing on Managerial Decision Making." Journal
Organizing Feature Maps and Genetic-Algorithm-Based of Management Information Systems 6, no. 3 (Winter 1989-
Clustering Method for Market Segmentation." Journal of 1990).
Organizational Computing and Electronic Commerce 14, no. Voekler, Michael. "Staying a Step Ahead of Fraud." Intelligent
1 (2004). Enterprise (September 2006).
Walczak, Stephen."An Emprical Analysis of Data Requirements for
Lamont, Judith."Communities of Practice Leverage Knowledge." Financial Forecasting with Neural Networks." Journal of
KMWorld (July/August 2006). Management Information Systems 17, no. 4 (Spring 2001).
Wang, Huaiqing, John Mylopoulos, and Stephen Liao. "Intelligent
Lamont, Judith."Open Source ECM Platforms Bring Mobility to Agents and Financial Risk Monitoring Systems."
Market," KMWorld March 2010. Communications of the ACM 45, no. 3 (March 2002).
Yimam-Seid, Dawit and Alfred Kobsa." Expert-Finding Systems for
Leonard-Barton, Dorothy and Walter Swap. "Deep Smarts.' Harvard Organizations: Problem and Domain Analysis and the
Business Review (September 1, 2004). DEMOIR Approach." Journal of Organizational Computing
and Electronic Commerce 13, no. 1 (2003)
Leonard-Barton, Dorothy, and John J. Sviokla. "Putting Expert Zack, Michael H "Rethinking the Knowledge-Based Organization."
Systems to Work." Harvard Business Review (March-April MIS Sloan Management Review 44, no. 4 (Summer 2003).
1988). Zadeh, Lotfi A. "Fuzzy Logic, Neural Networks, and Soft
Computing." Communications of the ACM 37, no. 3 (March
Lev, Baruch, and Theodore Sougiannis. "Penetrating the Book-to- 1994).
Market Black Box: The R&D Effect," Journal of Business
Finance and Accounting (April/May 1999).
Lev, Baruch. "Sharpening the Intangibles Edge." Harvard Business
Review (June 1, 2004).
Maes, Patti. "Agents that Reduce Work and Information Overload."
Communications of the ACM 38, no. 7 (July 1994).
Maglio, Paul P. and Christopher S. Campbell. "Attentive Agents."
Communications of the ACM 46, no. 3 (March 2003).
Malone, Thomas W., Robert Laubacher, and Chrysanthos
Dellarocas. "The Collective Intelligence Genome." MIT Sloan
Management Review 51, No. 3 (Spring 2010).
Maltby, Emily. "Affordable 3-D Arrives." The Wall Street Journal
(July 29, 2010).
Markus, M. Lynne, Ann Majchrzak, and Less Gasser." A Design
Theory for Systems that Support Emergent Knowledge
Processes." MIS Quarterly 26, no. 3 (September 2002).
Markus, M. Lynne. "Toward a Theory of Knowledge Reuse: Types
of Knowledge Reuse Situations and Factors in Reuse Success."
Zadeh, Lotfi A. "The Calculus of Fuzzy If/Then Rules." AI Expert References R 11
(March 1992).
Kaplan, Robert S. and David P. Norton. "The Balanced Scorecard:
CHAPTER 12 Measures that Drive Performance", Harvard Business Review
(Jan - Feb 1992).
Anson, Rob and Bjorn Erik Munkvold. "Beyond Face-to-Face: A
Field Study of Electronic Meetings in Different Time and Kaplan, Robert S. and David P. Norton. Strategy Maps: Converting
Place Modes." Journal of Organizational Computing and Intangible Assets into Tangible Outcomes. Boston: Harvard
Electronic Commerce 14, no. 2 (2004). Business School Press (2004).
Barkhi, Reza.'The Effects of Decision Guidance and Problem LaValle, Steve, Michael S. Hopkins, Eric Lesser, Rebecca Shockley,
Modeling on Group Decision-Making. "Journal of and Nina Kruschwitz. "Analytics: The New Path to Value."
Management Information Systems 18, no. 3 (Winter 2001- MIT Sloan Management Review and IBM Institute for
2002). Business Value (Fall 2010).
Bazerman, Max H. and Dolly Chugh. "Decisions Without Blinders." Leidner, Dorothy E., and Joyce Elam. "The Impact of Executive
Harvard Business Review (January 2006). Information Systems on Organizational Design, Intelligence,
and Decision Making." Organization Science 6, no. 6
BPM Working Group. "Performance Management Industry (November-December 1995).
Leaders Form BPM Standards Group." Working Group to
Establish Common Definition for BPM and Deliver Business Lilien, Gary L., Arvind Rangaswamy, Gerrit H. Van Bruggen, and
Performance Management Framework Press Release. Katrin Starke. "DSS Effectiveness in Marketing Resource
Stamford, CT (March 25, 2004) Allocation Decisions: Reality vs. Perception. "Information
Systems Research 15, no. 3 (September 2004).
Clark, Thomas D., Jr., Mary C. Jones, and Curtis P. Armstrong.
"The Dynamic Structure of Management Support Systems: Rockart, John F., and David W. DeLong. Executive Support
Theory Development, Research Focus, and Direction." MIS Systems: The Emergence of Top Management Computer Use.
Quarterly 31, no. 3 (September 2007). Homewood, IL: Dow-Jones Irwin (1988).
Davenport, Thomas H. and Jeanne G. Harris. Competing on Rockart, John F., and Michael E. Treacy. "The CEO Goes On-Line."
Analytics: The New Science of Winning. Boston: Harvard Harvard Business Review (January-February 1982).
Business School Press (2007).
Scanlon, Robert J. "A New Route to Performance Management."
Davenport, Thomas H., Jeanne Harris, and Jeremy Shapiro. Baseline Magazine. (January/February 2009).
"Competing on Talent Analytics." Harvard Business Review
(October 2010). Schwabe, Gerhard. "Providing for Organizational Memory in
Computer-Supported Meetings." Journal of Organizational
Davenport, Thomas H., Jeanne G. Harris, and Robert Morison. Computing and Electronic Commerce 9, no. 2 and 3 (1999).
Analytics at Work: Smarter Decisions, Better Results.
Boston: Harvard Business Press (2010). Simon, H. A. The New Science of Management Decision. New
York: Harper & Row (1960).
Dennis, Alan R., Jay E. Aronson, William G. Henriger, and Edward
D. Walker III. "Structuring Time and Task in Electronic Turban, Efraim, Ramesh Sharda, and Dursun Delen. Decision
Brainstorming." MIS Quarterly 23, no. 1 (March 1999). Support and Business Intelligence Systems, 9th ed. Upper
Saddle River, NJ: Prentice Hall (2011).
Dennis, Alan R., Joey F. George, Len M. Jessup, Jay F.
Nunamaker, and Douglas R. Vogel. "Information Technology Turban, Efraim, Ramesh Sharda, Dursun Delen, and David King.
to Support Electronic Meetings." MIS Quarterly 12, no. 4 Business Intelligence, 2nd ed. Upper Saddle River, NJ:
(December 1988). Prentice Hall (2011).
DeSanctis, Geraldine, and R. Brent Gallupe. "A Foundation for the Yoo, Youngjin and Maryam Alavi. "Media and Group Cohesion:
Study of Group Decision Support Systems." Management Relative Influences on Social Presence, Task Participation,
Science 33, no. 5 (May 1987). and Group Consensus." MIS Quarterly 25, no. 3 (September
2001).
El Sherif, Hisham, and Omar A. El Sawy. "Issue-Based Decision
Support Systems for the Egyptian Cabinet." MIS Quarterly 12, CHAPTER 13
no. 4 (December 1988).
Albert, Terri C., Paulo B. Goes, and Alok Gupta. "GIST: A Model
Gallupe, R. Brent, Geraldine DeSanctis, and Gary W. Dickson. for Design and Management of Content and Interactivity of
"Computer-Based Support for Group Problem-Finding: An Customer-Centric Web Sites." MIS Quarterly 28, no. 2 (June
Experimental Investigation." MIS Quarterly 12, no. 2 (June 2004).
1988).
Alter, Allan E. "I.T. Outsourcing: Expect the Unexpected." CIO
Gartner, Inc. "Gartner, Inc. Business intelligence market grows Insight (March 7, 2007).
22%." Press Release, June 15, 2010.
Armstrong, Deborah J. and Bill C. Hardgrove. "Understanding
Gorry, G. Anthony, and Michael S. Scott Morton. "A Framework Mindshift Learning: The Transition to Object-Oriented
for Management Information Systems." Sloan Management Development." MIS Quarterly 31, no. 3 (September 2007).
Review 13, no. 1 (Fall 1971).
Aron, Ravi, Eric K.Clemons, and Sashi Reddi. "Just Right
Greengard, Samuel. "Business Intelligence and Business Analytics, Outsourcing: Understanding and Managing Risk." Journal of
Big Time." Baseline (February 2010). Management Information Systems 22, no. 1 (Summer 2005).
Henschen, Doug. "Next-Gen BI Is Here." Information Week Ashrafi, Noushin and Hessam Ashrafi. Object-Oriented Systems
(August 31, 2009). Analysis and Design. Upper Saddle River, NY: Prentice-Hall
(2009).
Hoover, J. Nicholas." Search, Mobility BI Keys to Hotel Chain's
Growth." Information Week (September 13, 2010). Avison, David E. and Guy Fitzgerald."Where Now for
Development Methodologies?" Communications of the ACM
Jensen, Matthew, Paul Benjamin Lowry, Judee K. Burgoon, and 41, no. 1 (January 2003).
Jay Nunamaker. "Technology Dominance in Complex
Decisionmaking." Journal of Management Information Babcock, Charles. "Platform as a Service: What Vendors Offer."
Systems 27, No. 1 (Summer 2010). Information Week (October 3, 2009).
Baily, Martin N. and Diana Farrell."Exploding the Myths of
Offshoring." The McKinsey Quarterly (July 2004).
Barthelemy, Jerome. "The Hidden Costs of IT Outsourcing." Sloan
Management Review (Spring 2001).
R 12 References Hammer, Michael, and James Champy. Reengineering the
Corporation. New York: HarperCollins (1993).
Broadbent, Marianne, Peter Weill, and Don St. Clair. "The
Implications of Information Technology Infrastructure for Hammer, Michael."Process Management and the Future of Six
Business Process Redesign." MIS Quarterly 23, no. 2 (June Sigma." "Sloan Management Review 43, no.2 (Winter 2002)
1999).
Hickey, Ann M., and Alan M. Davis. "A Unified Model of
Brown, Susan A., Norman L. Chervany, and Bryan A. Reinicke. Requirements Elicitation." Journal of Management
"What Matters When Introducing New Technology." Information Systems 20, no. 4 (Spring 2004).
Communications of the ACM 50, No. 9 (September 2007).
Hirscheim, Rudy and Mary Lacity."The Myths and Realities of
Cha, Hoon S., David E. Pingry, and Matt E. Thatcher. "A Learning Information Technology Insourcing." Communications of the
Model of Information Technology Outsourcing: Normative ACM 43, no. 2 (February 2000).
Implications. "Journal of Management Information Systems
26, No. 2 (Fall 2009). Hoffer, Jeffrey, Joey George, and Joseph Valacich. Modern
Systems Analysis and Design, 5th ed. Upper Saddle River,
Champy, James A.X-Engineering the Corporation: Reinventing NJ: Prentice Hall (2008).
Your Business in the Digital Age. New York: Warner Books
(2002). Hopkins, Jon. "Component Primer." Communications of the ACM
43, no. 10 (October 2000).
Curbera, Francisco, Rania Khalaf, Nirmal Mukhi, Stefan Tai, and
Sanjiva Weerawarana."The Next Step in Web Services." Irwin, Gretchen. "The Role of Similarity in the Reuse of Object-
Communications of the ACM 46, no 10 (October 2003). Oriented Analysis Models." Journal of Management
Information Systems 19, no. 2 (Fall 2002).
Davidson, Elisabeth J. "Technology Frames and Framing: A Socio-
Cognitive Investigation of Requirements Determination. MIS Ivari, Juhani, Rudy Hirscheim, and Heinz K. Klein. "A Dynamic
Quarterly 26, no. 4 (December 2002). Framework for Classifying Information Systems
Development Methodologies and Approaches." Journal of
DeMarco, Tom. Structured Analysis and System Specification. New Management Information Systems 17, no. 3 (Winter 2000-
York: Yourdon Press (1978). 2001).
Den Hengst, Marielle and Gert-Jan DeVreede. "Collaborative Iyer, Bala, Jim Freedman, Mark Gaynor, and George Wyner. "Web
Business Engineering: A Decade of Lessons from the Field." Services: Enabling Dynamic Business Networks."
Journal of Management Information Systems 20, no. 4 Communications of the Association for Information Systems
(Spring 2004). 11 (2003).
Dibbern, Jess, Jessica Winkler, and Armin Heinzl. "Explaining Johnson, Richard A. The Ups and Downs of Object-Oriented
Variations in Client Extra Costs between Software Projects Systems Development." Communications of the ACM 43,
Offshored to India." MIS Quarterly 32, no. 2 (June 2008). no.10 (October 2000).
El Sawy, Omar A.Redesigning Enterprise Processes for E-Business. Kendall, Kenneth E., and Julie E. Kendall. Systems Analysis and
McGraw-Hill (2001). Design, 9th ed. Upper Saddle River, NJ: Prentice Hall (2011).
Erickson, Jonathan. "Dr Dobb's Report: Agile Development." Kettinger, William J., and Choong C. Lee. "Understanding the IS-
Information Week (April 27, 2009). User Divide in IT Innovation." Communications of the ACM
45, no.2 (February 2002).
Feeny, David, Mary Lacity, and Leslie P. Willcocks. "Taking the
Measure of Outsourcing Providers." MIT Sloan Management Kindler, Noah B., Vasantha Krishnakanthan, and Ranjit Tinaikar.
Review 46, No. 3 (Spring 2005). "Applying Lean to Application Development and
Maintenance." The McKinsey Quarterly (May 2007).
Fischer, G., E. Giaccardi. Y.Ye, A.G. Sutcliffe, and N. Mehandjiev. "
Meta-Design: A Manifesto for End-User Development." Koh, Christine, Song Ang, and Detmar W. Straub. "IT Outsourcing
Communications of the ACM 47, no. 9 (September 2004). Success: A Psychological Contract Perspective." Information
Systems Research 15 no. 4 (December 2004).
Gefen, David and Catherine M. Ridings. "Implementation Team
Responsiveness and User Evaluation of Customer Krishna, S., Sundeep Sahay, and Geoff Walsham. "Managing Cross-
Relationship Management: A Quasi-Experimental Design Cultural Issues in Global Software Outsourcing."
Study of Social Exchange Theory." Journal of Management Communications of the ACM 47, No. 4 (April 2004).
Information Systems 19, no. 1 (Summer 2002).
Lee, Gwanhoo and Weidong Xia. "Toward Agile: An Integrated
Gefen, David and Erran Carmel. "Is the World Really Flat? A Look Analysis of Quantitative and Qualitative Field Data." MIS
at Offshoring in an Online Programming Marketplace." MIS Quarterly 34, no. 1 (March 2010).
Quarterly 32, no. 2 (June 2008).
Lee, Jae Nam, Shaila M. Miranda, and Yong-Mi Kim."IT
Gemino, Andrew and Yair Wand." Evaluating Modeling Techniques Outsourcing Strategies: Universalistic, Contingency, and
Based on Models of Learning." Communications of the ACM Configurational Explanations of Success." Information
46, no. 10 (October 2003). Systems Research 15, no. 2 (June 2004).
George, Joey, Dinesh Batra, Joseph S. Valacich, and Jeffrey A. Levina, Natalia, and Jeanne W. Ross. "From the Vendor's
Hoffer. Object Oriented System Analysis and Design, 2nd ed. Perspective: Exploring the Value Proposition in Information
Upper Saddle River, NJ: Prentice Hall (2007). Technology Outsourcing." MIS Quarterly 27, no. 3
(September 2003).
Goo, Jahyun, Rajive Kishore, H. R. Rao, and Kichan Nam. The
Role of Service Level Agreements in Relational Management Limayem, Moez, Mohamed Khalifa, and Wynne W. Chin. "Case
of Information Technology Outsourcing: An Empirical Tools Usage and Impact on System Development
Study." MIS Quarterly 33, No. 1 (March 2009). Performance." Journal of Organizational Computing and
Electronic Commerce 14, no. 3 (2004).
Grunbacher, Paul, Michael Halling, Stefan Biffl, Hasan Kitapci,
and Barry W. Boehm. "Integrating Collaborative Processes Majchrzak, Ann, Cynthia M. Beath, and Ricardo A. Lim.
and Quality Assurance Techniques: Experiences from "Managing Client Dialogues during Information Systems
Requirements Negotiation." Journal of Management Design to Facilitate Client Learning." MIS Quarterly 29, no. 4
Information Systems 20, no. 4 (Spring 2004). (December 2005).
Hahn, Eugene D., Jonathan P. Doh, and Kraiwinee Bunyaratavej. Mani, Deepa, Anitesh Barua, and Andrew Whinston. "An
"The Evolution of Risk in Information Systems Offshoring: Empirical Analysis of the Impact of Information Capabilities
The Impact of Home Country Risk, Firm Learning, and Design on Business Process Outsourcing Performance." MIS
Competitive Dynamics. MIS Quarterly 33, No. 3 (September Quarterly 34, no. 1 (March 2010).
2009).
Nelson, H. James, Deborah J. Armstrong, and Kay M. Nelson. References R 13
Patterns of Transition: The Shift from Traditional to Object-
Oriented Development." Journal of Management Information Armstrong, Curtis P. and V. Sambamurthy."Information
Systems 25, No. 4 (Spring 2009). Technology Assimilation in Firms: The Influence of Senior
Leadership and IT Infrastructures." Information Systems
Nidumolu, Sarma R. and Mani Subramani."The Matrix of Control: Research 10, no. 4 (December 1999).
Combining Process and Structure Approaches to Managing
Software Development." Journal of Management Banker, Rajiv. "Value Implications of Relative Investments in
Information Systems 20, no. 4 (Winter 2004). Information Technology." Department of Information
Systems and Center for Digital Economy Research,
O'Donnell, Anthony. "BPM: Insuring Business Success." Optimize University of Texas at Dallas, January 23, 2001.
Magazine (April 2007).
Barki, Henri and Jon Hartwick. "Interpersonal Conflict and Its
Overby, Stephanie, "The Hidden Costs of Offshore Outsourcing," Management in Information Systems Development. " MIS
CIO Magazine (Sept.1, 2003). Quarterly 25, no.2 (June 2001).
Palmer, Jonathan W. "Web Site Usability, Design and Performance Barki, Henri, Suzanne Rivard, and Jean Talbot. "An Integrative
Metrics." Information Systems Research 13, no.3 (September Contingency Model of Software Project Risk Management."
2002). Journal of Management Information Systems 17, no. 4
(Spring 2001).
Phillips, James and Dan Foody. "Building a Foundation for Web
Services." EAI Journal (March 2002). Beath, Cynthia Mathis, and Wanda J. Orlikowski. "The
Contradictory Structure of Systems Development
Pitts, Mitzi G. and Glenn J. Browne."Stopping Behavior of Systems Methodologies: Deconstructing the IS-User Relationship in
Analysts During Information Requirements Elicitation." Information Engineering." Information Systems Research 5,
Journal of Management Information Systems 21, no. 1 no. 4 (December 1994).
(Summer 2004).
Benaroch, Michel and Robert J. Kauffman. "Justifying Electronic
Prahalad, C. K. and M.S.. Krishnan."Synchronizing Strategy and Banking Network Expansion Using Real Options Analysis."
Information Technology." Sloan Management Review 43, no. MIS Quarterly 24, no. 2 (June 2000).
4 (Summer 2002).
Benaroch, Michel, Sandeep Shah, and Mark Jeffrey. "On the
Ravichandran, T. and Marcus A. Rothenberger."Software Reuse Valuation of Multistage Information Technology Investments
Strategies and Component Markets." Communications of the Embedding Nested Real Options." Journal of Management
ACM 46, no. 8 (August 2003). Information Systems 23, No. 1 (Summer 2006).
Silva, Leiser and Rudy Hirschheim. "Fighting Against Windmills: Benaroch, Michel. "Managing Information Technology Investment
Strategic Information Systems and Organizational Deep Risk: A Real Options Perspective." Journal of Management
Structures." MIS Quarterly 31, no. 2 (June 2007). Information Systems 19, no. 2 (Fall 2002).
Sircar, Sumit, Sridhar P. Nerur, and Radhakanta Mahapatra. Bhattacherjee, Anol and G. Premkumar. "Understanding Changes
"Revolution or Evolution? A Comparison of Object-Oriented In Belief and Attitude Toward Information Technology Usage:
and Structured Systems Development Methods." MIS A Theoretical Model and Longitudinal Test." MIS Quarterly
Quarterly 25, no. 4 (December 2001). 28, no. 2 (June 2004).
Smith, Howard and Peter Fingar. Business Process Management: Blair, Leslie. "Reconciling IT Spend with C-Suite Expectations."
The Third Wave Tampa, Florida: Meghan-Kiffer Press (2002). Baseline (March/April 2010).
Swanson, E. Burton and Enrique Dans. "System Life Expectancy Bostrom, R. P., and J. S. Heinen. "MIS Problems and Failures: A
and the Maintenance Effort: Exploring their Equilibration." Socio-Technical Perspective. Part I: The Causes." MIS
MIS Quarterly 24, no. 2 (June 2000). Quarterly 1 (September 1977); "Part II: The Application of
Socio-Technical Theory." MIS Quarterly 1 (December 1977).
Turetken, Ozgur, David Schuff, Ramesh Sharda, and Terence T.
Ow. "Supporting Systems Analysis and Design through Brewer, Jeffrey and Kevin Dittman. Methods of IT Project
Fisheye Views." Communications of the ACM 47, no. 9 Management. Upper Saddle River, NJ: Prentice-Hall (2010).
(September 2004).
Brooks, Frederick P. "The Mythical Man-Month." Datamation
Van Den Heuvel, Willem-Jan and Zakaria Maamar. "Moving (December 1974).
Toward a Framework to Compose Intelligent Web Services."
Communications of the ACM 46, no. 10 (October 2003). Brynjolfsson, Erik, and Lorin M. Hitt. "Information Technology
and Organizational Design: Evidence from Micro Data."
Vitharana, Padmal."Risks and Challenges of Component-Based (January 1998).
Software Development." Communications of the ACM 46, no.
8 (August 2003). Bullen, Christine, and John F. Rockart. "A Primer on Critical
Success Factors." Cambridge, MA: Center for Information
Watad, Mahmoud M. and Frank J. DiSanzo. "Case Study: The Systems Research, Sloan School of Management (1981).
Synergism of Telecommuting and Office Automation." Sloan
Management Review 41, no. 2 (Winter 2000). Chatterjee, Debabroto, Rajdeep Grewal, and V. Sabamurthy.
"Shaping Up for E-Commerce: Institutional Enablers of the
Wulf, Volker, and Matthias Jarke. "The Economics of End-User Organizational Assimilation of Web Technologies." MIS
Development." Communications of the ACM 47, no. 9 Quarterly 26, no. 2 (June 2002).
(September 2004).
Chickowski, Ericka. "Projects Gone Wrong." Baseline (May 15,
Yourdon, Edward, and L. L. Constantine. Structured Design. New 2009).
York: Yourdon Press (1978).
Clement, Andrew, and Peter Van den Besselaar. "A Retrospective
CHAPTER 14 Look at PD Projects." Communications of the ACM 36, no. 4
(June 1993).
Aladwani, Adel M. "An Integrated Performance Model of
Information Systems Projects." Journal of Management Concours Group. "Delivering Large-Scale System Projects." (2000).
Information Systems 19, no.1 (Summer 2002). Cooper, Randolph B. "Information Technology Development
Alleman, James."Real Options Real Opportunities." Optimize Creativity: A Case Study of Attempted Radical Change." MIS
Magazine (January 2002). Quarterly 24, no. 2 (June 2000).
Datz, Todd. "Portfolio Management: How to Do It Right," CIO
Andres, Howard P. and Robert W. Zmud. "A Contingency Approach Magazine ( May 1, 2003).
to Software Project Coordination." Journal of Management De Meyer, Arnoud, Christoph H. Loch and Michael T. Pich."
Information Systems 18, no. 3 (Winter 2001-2002). Managing Project Uncertainty: From Variation to Chaos."
Sloan Management Review 43, no.2 (Winter 2002).
R 14 References Quo Bias Perspective." MIS Quarterly 33, No. 3 (September
2009).
Delone, William H. and Ephraim R. McLean. "The Delone and Klein, Gary, James J. Jiang, and Debbie B. Tesch. "Wanted: Project
McLean Model of Information Systems Success: A Ten-Year Teams with a Blend of IS Professional Orientations."
Update. Journal of Management Information Systems 19, no. Communications of the ACM 45, no. 6 (June 2002).
4 (Spring 2003). Kolb, D. A., and A. L. Frohman. "An Organization Development
Approach to Consulting." Sloan Management Review 12 (Fall
Doll, William J., Xiaodung Deng, T. S. Raghunathan, Gholamreza 1970).
Torkzadeh, and Weidong Xia. "The Meaning and Lapointe, Liette, and Suzanne Rivard. "A Multilevel Model of
Measurement of User Satisfaction: A Multigroup Invariance Resistance to Information Technology Implementation." MIS
Analysis of End-User Computing Satisfaction Instrument." Quarterly 29, no. 3 (September 2005).
Journal of Management Information Systems 21, no. 1 Laudon, Kenneth C. "CIOs Beware: Very Large Scale Systems."
(Summer 2004). Center for Research on Information Systems, New York
University Stern School of Business, working paper (1989).
Feldman, Jonathan. "Get Your Projects In Line." Information Week Liang, Huigang, Nilesh Sharaf, Qing Hu, and Yajiong Xue.
(March 8, 2010). "Assimilation of Enterprise Systems: The Effect of
Institutional Pressures and the Mediating Role of Top
Fichman, Robert G. "Real Options and IT Platforms Adoption: Management." MIS Quarterly 31, no 1 (March 2007).
Implications for Theory and Practice." Information Systems Lipin, Steven and Nikhil Deogun. "Big Mergers of 90s Prove
Research 15, no. 2 (June 2004). Disappointing to Shareholders." The Wall Street Journal
(October 30, 2000).
Fuller, Mark, Joe Valacich, and Joey George. Information Systems Mahmood, Mo Adam, Laura Hall, and Daniel Leonard Swanberg,
Project Management: A Process and Team Approach. Upper "Factors Affecting Information Technology Usage: A Meta-
Saddle River, NJ: Prentice Hall (2008). Analysis of the Empirical Literature." Journal of
Organizational Computing and Electronic Commerce 11, no.
Geng, Xianjun, Lihui Lin, and Andrew B. Whinston."Effects of 2 (November 2, 2001)
Organizational Learning and Knowledge Transfer on Markus, M. Lynne, and Robert I. Benjamin. "Change Agentry-The
Investment Decisions Under Uncertainty." "Journal of Next IS Frontier." MIS Quarterly 20, no. 4 (December 1996).
Management Information Systems 26, No. 2 (Fall 2009). Markus, M. Lynne, and Robert I. Benjamin. "The Magic Bullet
Theory of IT-Enabled Transformation." Sloan Management
Goff, Stacy A. "The Future of IT Project Management Software." Review (Winter 1997).
CIO (January 6, 2010). McFarlan, F. Warren. "Portfolio Approach to Information Systems."
Harvard Business Review (September-October 1981).
Gordon, Steven R. and Monideepa Tarafdar. "The IT Audit that McGrath, Rita Gunther and Ian C.McMillan. "Assessing
Boosts Innovation." MIT Sloan Management Review 51, No. 4 Technology Projects Using Real Options Reasoning."
(Summer 2010). Industrial Research Institute (2000)
Mumford, Enid, and Mary Weir. Computer Systems in Work
Hitt, Lorin, D.J. Wu, and Xiaoge Zhou. "Investment in Enterprise Design: The ETHICS Method. New York: John Wiley (1979).
Resource Planning: Business Impact and Productivity Murray, Diane and Al Kagan. "Reinventing Program
Measures." Journal of Management Information Systems 19, Management." CIO Insight (2nd Quarter 2010).
no. 1 (Summer 2002). Nidumolu, Sarma R. and Mani Subramani. "The Matrix of Control:
Combining Process and Structure Approaches to
Housel, Thomas J., Omar El Sawy, Jianfang Zhong, and Waymond Management Software Development." Journal of
Rodgers. "Measuring the Return on e-Business Initiatives at Management Information Systems 20, no. 3 (Winter 2004).
the Process Level: The Knowledge Value-Added Approach." Palmer, Jonathan W. "Web Site Usability, Design and Performance
ICIS (2001). Metrics." Information Systems Research 13, no.3 (September
2002).
Iversen, Jakob H., Lars Mathiassen, and Peter Axel Peffers, Ken and Timo Saarinen. "Measuring the Business Value of
Nielsen."Managing Risk in Software Process Improvement: IT Investments: Inferences from a Study of Senior Bank
An Action Research Approach." MIS Quarterly 28, no. 3 Executives." Journal of Organizational Computing and
(September 2004). Electronic Commerce 12, no. 1 (2002).
Quan, Jin "Jim", Quing Hu, and Paul J. Hart."Information
Jeffrey, Mark, and Ingmar Leliveld. "Best Practices in IT Portfolio Technology Investments and Firms' Performance-A Duopoly
Management." MIT Sloan Management Review 45, no. 3 Perspective." Journal of Management Information Systems
(Spring 2004). 20, no. 3 (Winter 2004).
Rai, Arun, Sandra S. Lang, and Robert B. Welker. "Assessing the
Jiang, James J., Gary Klein, Debbie Tesch, and Hong-Gee Chen. Validity of IS Success Models: An Empirical Test and
"Closing the User and Provider Service Quality Gap," Theoretical Analysis." Information Systems Research 13, no.
Communications of the ACM 46, no.2 (February 2003). 1 (March 2002).
Rapoza, Jim. "Next-Gen Project Management." eWeek (March 3,
Jun He and William R. King. "The Role of User Participation In 2008).
Information Systems Development: Implications from a Robey, Daniel, Jeanne W. Ross, and Marie-Claude Boudreau.
Meta-Analysis." Journal of Management Information Systems "Learning to Implement Enterprise Systems: An Exploratory
25, no. 1 (Summer 2008). Study of the Dialectics of Change." Journal of Management
Information Systems 19, no. 1 (Summer 2002).
Keen, Peter W. "Information Systems and Organizational Change." Ross, Jeanne W. and Cynthia M. Beath." Beyond the Business
Communications of the ACM 24 (January 1981). Case: New Approaches to IT Investment." Sloan
Management Review 43, no.2 (Winter 2002).
Keil, Mark and Daniel Robey. "Blowing the Whistle on Troubled
Software Projects." Communications of the ACM 44, no. 4
(April 2001).
Keil, Mark and Ramiro Montealegre. "Cutting Your Losses:
Extricating Your Organization When a Big Project Goes
Awry." Sloan Management Review 41, no. 3 (Spring 2000).
Keil, Mark, Joan Mann, and Arun Rai. "Why Software Projects
Escalate: An Empirical Analysis and Test of Four Theoretical
Models." MIS Quarterly 24, no. 4 (December 2000).
Keil, Mark, Paul E. Cule, Kalle Lyytinen, and Roy C. Schmidt. "A
Framework for Identifying Software Project Risks."
Communications of the ACM 41, 11 (November 1998).
Kettinger, William J. and Choong C. Lee. "Understanding the IS-
User Divide in IT Innovation." Communications of the ACM
45, no.2 (February 2002).
Kim, Hee Woo and Atreyi Kankanhalli. "Investigating User
Resistance to Information Systems Implementation: A Status
Ryan, Sherry D. and David A. Harrison. "Considering Social References R 15
Subsystem Costs and Benefits in Information Technology
Investment Decisions: A View from the Field on Anticipated Tornatsky, Louis G., J. D. Eveland, M. G. Boylan, W. A. Hetzner, E.
Payoffs." Journal of Management Information Systems 16, C. Johnson, D. Roitman, and J. Schneider. The Process of
no. 4 (Spring 2000). Technological Innovation: Reviewing the Literature.
Washington, DC: National Science Foundation (1983).
Ryan, Sherry D., David A. Harrison, and Lawrence L Schkade."
Information Technology Investment Decisions: When Do Venkatesh, Viswanath, Michael G. Morris, Gordon B Davis, and
Cost and Benefits in the Social Subsystem Matter?" Journal Fred D. Davis." User Acceptance of Information Technology:
of Management Information Systems 19, no. 2 (Fall 2002). Toward a Unified View." MIS Quarterly 27, No. 3 (September
2003).
Sakthivel, S. "Managing Risk in Offshore Systems Development."
Communications of the ACM 50, No. 4 (April 2007). Wallace, Linda and Mark Keil. "Software Project Risks and Their
Effect on Outcomes." Communications of the ACM 47, no. 4
Sambamurthy, V., Anandhi Bharadwaj, and Varun Grover. (April 2004).
"Shaping Agility Through Digital Options: Reconceptualizing
the Role of Information Technology in Contemporary Firms." Wang, Eric T.G., Gary Klein, and James J. Jiang. "ERP Misfit:
MIS Quarterly 27, no. 2 (June 2003). Country of Origin and Organizational Factors." Journal of
Management Information Systems 23, No. 1 (Summer 2006).
Santhanam, Radhika and Edward Hartono. "Issues in Linking
Information Technology Capability to Firm Performance." Xia, Weidong and Gwanhoo Lee. "Grasping the Complexity of IS
MIS Quarterly 27, no. 1 (March 2003). Development Projects." Communications of the ACM 47, no.
5 (May 2004).
Sauer, Chris and Leslie P. Willcocks, "The Evolution of the
Organizational Architect." Sloan Management Review 43, no. Xia, Weidong, and Gwanhoo Lee. "Complexity of Information
3 (Spring 2002). Systems Development Projects." Journal of Management
Information Systems 22, no. 1 (Summer 2005).
Sauer, Chris, Andrew Gemino, and Blaize Horner Reich. "The
Impact of Size and Volatility on IT Project Performance. Xue, Yajion, Huigang Liang, and William R. Boulton. "Information
"Communications of the ACM 50, no. 11 (November 2007). Technology Governance in Information Technology
Investment Decision Processes: The Impact of Investment
Schmidt, Roy, Kalle Lyytinen, Mark Keil, and Paul Cule. Characteristics, External Environment, and Internal Context."
"Identifying Software Project Risks: An International Delphi MIS Quarterly 32, no. 1 (March 2008).
Study." Journal of Management Information Systems 17, no.
4 (Spring 2001) Yin, Robert K. "Life Histories of Innovations: How New Practices
Become Routinized." Public Administration Review (January-
Schneiderman, Ben." Universal Usability." Communications of the February 1981).
ACM 43, no. 5 (May 2000).
Zhu, Kevin and Kenneth L. Kraemer."E-Commerce Metrics for
Schwalbe, Kathy. Information Technology Project Management, Net-Enhanced Organizations: Assessing the Value of e-
6/e. Course Technology (2010). Commerce to Firm Performance in the Manufacturing
Sector." Information Systems Research 13, no.3 (September
Shank, Michael E., Andrew C. Boynton, and Robert W. Zmud. 2002).
"Critical Success Factor Analysis as a Methodology for MIS
Planning." MIS Quarterly (June 1985). Zhu, Kevin, Kenneth L. Kraemer, Sean Xu, and Jason Dedrick.
"Information Technology Payoff in E-Business Environments:
Sharma, Rajeev and Philip Yetton. "The Contingent Effects of An International Perspective on Value Creation of E-business
Training, Technical Complexity, and Task Interdependence in the Financial Services Industry." Journal of Management
on Successful Information Systems Implementation." MIS Information Systems 21, no. 1 (Summer 2004).
Quarterly 31, no. 2 (June 2007).
Zhu, Kevin. "The Complementarity of Information Technology
Siewiorek, Daniel P. "New Frontiers of Application Design." Infrastructure and E-Commerce Capability: A Resource-Based
Communications of the ACM 45, no.12 (December 2002.) Assessment of Their Business Value." Journal of
Management Information Systems 21, no. 1 (Summer 2004).
Smith, H. Jeff, Mark Keil, and Gordon Depledge. "Keeping Mum as
the Project Goes Under." Journal of Management Information CHAPTER 15
Systems 18, no. 2 (Fall 2001)
Barboza, David. "Supply Chain for IPhone Highlights Costs in
Speier, Cheri and Michael. G. Morris. "The Influence of Query China." The New York Times (July 5, 2010).
Interface Design on Decision-Making Performance." MIS
Quarterly 27, no. 3 (September 2003). Biehl, Markus. "Success Factors For Implementing Global
Information Systems." Communications of the ACM 50, No.
Straub, Detmar W., Arun Rai and Richard Klein. "Measuring Firm 1 (January 2007).
Performance at the Network Level: A Nomology of the
Business Impact of Digital Supply Networks." Journal of Bisson, Peter, Elizabeth Stephenson, and S. Patrick Viguerie.
Management Information Systems 21, no 1 (Summer 2004). "Global Forces: An Introduction." McKinsey Quarterly (June
2010).
Swanson, E. Burton. Information System Implementation.
Homewood, IL: Richard D. Irwin (1988). Cox, Butler. Globalization: The IT Challenge. Sunnyvale, CA:
Amdahl Executive Institute (1991).
Tallon, Paul P, Kenneth L. Kraemer, and Vijay Gurbaxani.
"Executives' Perceptions of the Business Value of Information Davis. Bob. "Rise of Nationalism Frays Global Ties." The Wall
Technology: A Process-Oriented Approach." Journal of Street Journal (April 28, 2008).
Management Information Systems 16, no. 4 (Spring 2000).
Davison, Robert. "Cultural Complications of ERP."
Taudes, Alfred, Markus Feurstein, and Andreas Mild. "Options Communications of the ACM 45, no. 7 (July 2002).
Analysis of Software Platform Decisions: A Case Study." MIS
Quarterly 24, no. 2 (June 2000). Deans, Candace P., and Michael J. Kane. International Dimensions
of Information Systems and Technology. Boston, MA: PWS-
Thatcher, Matt E. and Jim R. Oliver. "The Impact of Technology Kent (1992).
Investments on a Firm's Production Efficiency, Product
Quality, and Productivity." Journal of Management Ein-Dor, Philip, Seymour E. Goodman, and Peter Wolcott." From
Information Systems 18, no. 2 (Fall 2001). Via Maris to Electronic Highway: The Internet in Canaan."
Communications of the ACM 43, no. 7 (July 2000).
Tiwana, Amrit, and Mark Keil. "Control in Internal and
Outsourced Software Projects." Journal of Management Farhoomand, Ali, Virpi Kristiina Tuunainen, and Lester W. Yee.
Information Systems 26, No. 3 (Winter 2010). "Barrier to Global Electronic Commerce: A Cross-Country
R 16 References
Study of Hong Kong and Finland." Journal of Organizational
Computing and Electronic Commerce 10, no. 1 (2000).
Ghislanzoni, Giancarlo, Risto Penttinen, an David Turnbull. "The
Multilocal Challenge: Managing Cross-Border Functions."
The McKinsey Quarterly (March 2008).
Giridharadas, Anand. "Where a Cellphone Is Still Cutting Edge,"
The New York Times (April 11, 2010).
Ives, Blake, and Sirkka Jarvenpaa. "Applications of Global
Information Technology: Key Issues for Management." MIS
Quarterly 15, no. 1 (March 1991).
Ives, Blake, S. L. Jarvenpaa, R. O. Mason, "Global business drivers:
Aligning Information Technology to Global Business
Strategy," IBM Systems Journal Vol 32, No 1, 1993.
King, William R. and Vikram Sethi. "An Empirical Analysis of the
Organization of Transnational Information Systems." Journal
of Management Information Systems 15, no. 4 (Spring 1999).
Kirsch, Laurie J. "Deploying Common Systems Globally: The
Dynamic of Control." Information Systems Research 15, no. 4
(December 2004).
Lai, Vincent S. and Wingyan Chung. "Managing International Data
Communication." Communications of the ACM 45, no.3
(March 2002).
Liang, Huigang, Yajiong Xue, William R. Boulton, and Terry
Anthony Byrd. "Why Western Vendors Don't Dominate
China's ERP Market." Communications of the ACM 47, no. 7
(July 2004).
Mann, Catherine L. "What Global Sourcing Means for U.S. I.T.
Workers and for the U.S. Economy." Communications of the
ACM 47, no. 7 (July 2004)
Martinsons, Maris G. "ERP In China: One Package Two Profiles,"
Communications of the ACM 47, no. 7 (July 2004).
Petrazzini, Ben, and Mugo Kibati. "The Internet in Developing
Countries." Communications of the ACM 42, no. 6 (June
1999).
Quelch, John A., and Lisa R. Klein. "The Internet and
International Marketing." Sloan Management Review (Spring
1996).
Roche, Edward M. Managing Information Technology in
Multinational Corporations. New York: Macmillan (1992).
Shore, Barry. "Enterprise Integration Across the Globally
Dispersed Service Organization. Communications of the
ACM 49, NO. 6 (June 2006).
Soh, Christina, Sia Siew Kien, and Joanne Tay-Yap. "Cultural Fits
and Misfits: Is ERP a Universal Solution? "Communications
of the ACM 43, no. 3 (April 2000).
Steel, Emily and Amol Sharma. "U.S. Web Sites Draw Traffic from
Abroad but Few Ads." The Wall Street Journal (July 10, 2008).
Tan, Zixiang, William Foster, and Seymour Goodman. "China's
State-Coordinated Internet Infrastructure." Communications
of the ACM 42, no. 6 (June 1999).
Tractinsky, Noam, and Sirkka L. Jarvenpaa. "Information Systems
Design Decisions in a Global Versus Domestic Context." MIS
Quarterly 19, no. 4 (December 1995).
Watson, Richard T., Gigi G. Kelly, Robert D. Galliers, and James C.
Brancheau. "Key Issues in Information Systems Management:
An International Perspective." Journal of Management
Information Systems 13, no. 4 (Spring 1997)
Glossary
3G networks Cellular networks based on packet-switched technology apps Small pieces of software that run on the Internet, on your
with speeds ranging from 144 Kbps for mobile users to over 2 Mbps computer, or on your cell phone and are generally delivered
for stationary users, enabling users to transmit video, graphics, and over the Internet.
other rich media, in addition to voice.
artificial intelligence (AI) The effort to develop computer-based
4G networks The next evolution in wireless communication is systems that can behave like humans, with the ability to learn
entirely packet switched and capable of providing between 1 languages, accomplish physical tasks, use a perceptual apparatus,
Mbps and 1 Gbps speeds; up to ten times faster than 3G and emulate human expertise and decision making.
networks. Not widely deployed in 2010.
attribute A piece of information describing a particular entity.
acceptable use policy (AUP) Defines acceptable uses of the firm’s augmented reality A technology for enhancing visualization.
information resources and computing equipment, including
desktop and laptop computers, wireless devices, telephones, and Provides a live direct or indirect view of a physical real-world
the Internet, and specifies consequences for noncompliance. environment whose elements are augmented by virtual computer-
generated imagery.
acceptance testing Provides the final certification that the system is authentication The ability of each party in a transaction to ascertain
ready to be used in a production setting. the identity of the other party.
authorization management systems Systems for allowing each user
accountability The mechanisms for assessing responsibility for access only to those portions of a system or the Web that person
decisions made and actions taken. is permitted to enter, based on information established by a set of
access rules.
accumulated balance digital payment systems Systems enabling authorization policies Determine differing levels of access to
users to make micropayments and purchases on the Web, information assets for different levels of users in an organization.
accumulating a debit balance on their credit card or telephone automation Using the computer to speed up the performance of
bills. existing tasks.
autonomic computing Effort to develop systems that can manage
affiliate revenue model an e-commerce revenue model in which themselves without user intervention.
Web sites are paid as "affiliates" for sending their visitors to other
sites in return for a referral fee. backward chaining A strategy for searching the rule base in an
agent-based modeling Modeling complex phenomena as systems of expert system that acts like a problem solver by beginning with a
autonomous agents that follow relatively simple rules for
interaction. hypothesis and seeking out more information until the
agency theory Economic theory that views the firm as a nexus of hypothesis is either proved or disproved.
contracts among self-interested individuals who must be
supervised and managed. balanced scorecard method Framework for operationalizing a firms
agile development Rapid delivery of working software by breaking a strategic plan by focusing on measurable financial, business
large project into a series of small sub-projects that are completed
in short periods of time using iteration and continuous feedback. process, customer, and learning and growth outcomes of firm
Ajax Development technique for creating interactive Web performance.
applications capable of updating the user interface without
reloading the entire browser page. bandwidth The capacity of a communications channel as measured
analog signal A continuous waveform that passes through a by the difference between the highest and lowest frequencies
communications medium; used for voice communications.
that can be transmitted by that channel.
analytical CRM Customer relationship management applications
dealing with the analysis of customer data to provide information banner ad A graphic display on a Web page used for advertising. The
for improving business performance.
banner is linked to the advertiser’s Web site so that a person
Android A mobile operating system developed by Android, Inc.
(purchased by Google) and later the Open Handset Alliance as a clicking on it will be transported to the advertiser’s Web site.
flexible, upgradeable mobile device platform.
batch processing A method of collecting and processing data in
antivirus software Software designed to detect, and often eliminate,
computer viruses from an information system. which transactions are accumulated and stored until a specified
application controls: Specific controls unique to each computerized time when it is convenient or necessary to process them as a
application that ensure that only authorized data are completely
and accurately processed by that application. group.
application server Software that handles all application operations baud A change in signal from positive to negative or vice versa that is
between browser-based computers and a company’s back-end
business applications or databases. used as a measure of transmission speed.
application software package A set of prewritten, precoded behavioral models Descriptions of management based on behavioral
application software programs that are commercially available for
sale or lease. scientists’ observations of what managers actually do in their
application software Programs written for a specific application to jobs.
perform functions specified by end users.
behavioral targeting Tracking the click-streams (history of clicking
behavior) of individuals across multiple Web sites for the purpose
of understanding their interests and intentions, and exposing
them to advertisements which are uniquely suited to their
interests.
benchmarking Setting strict standards for products, services, or
activities and measuring organizational performance against
those standards.
best practices The most successful solutions or problem-solving
methods that have been developed by a specific organization or
industry.
G1
G 2 Glossary capacity planning The process of predicting when a computer
hardware system becomes saturated to ensure that adequate
biometric authentication Technology for authenticating system computing resources are available for work of different priorities
users that compares a person’s unique characteristics such as and that the firm has enough computing power for its current
fingerprints, face, or retinal image, against a stored set profile of and future needs.
these characteristics.
capital budgeting The process of analyzing and selecting various
bit A binary digit representing the smallest unit of data in a computer proposals for capital expenditures.
system. It can only have one of two states, representing 0 or 1.
carpal tunnel syndrome (CTS) Type of RSI in which pressure on
blade server Entire computer that fits on a single, thin card (or blade) the median nerve through the wrist’s bony carpal tunnel
and that is plugged into a single chassis to save space, power and structure produces pain.
complexity.
case-based reasoning (CBR) Artificial intelligence technology that
blog Popular term for Weblog, designating an informal yet structured represents knowledge as a database of cases and solutions.
Web site where individuals can publish stories, opinions, and
links to other Web sites of interest. cell phone A device that transmits voice or data, using radio waves to
communicate with radio antennas placed within adjacent
blogosphere Totality of blog-related Web sites. geographic areas called cells.
Bluetooth Standard for wireless personal area networks that can
centralized processing Processing that is accomplished by one large
transmit up to 722 Kbps within a 10-meter area. central computer.
botnet A group of computers that have been infected with bot
change agent In the context of implementation, the individual acting
malware without users’ knowledge, enabling a hacker to use the as the catalyst during the change process to ensure successful
amassed resources of the computers to launch distributed denial- organizational adaptation to a new system or innovation.
of-service attacks, phishing campaigns or spam.
broadband High-speed transmission technology. Also designates a change management Managing the impact of organizational change
single communications medium that can transmit multiple associated with an innovation, such as a new information system.
channels of data simultaneously.
bugs Software program code defects. channel conflict Competition between two or more different
bullwhip effect Distortion of information about the demand for a distribution chains used to sell the products or services of the
product as it passes from one entity to the next across the supply same company.
chain.
bus topology Network topology linking a number of computers by a channel The link by which data or voice are transmitted between
single circuit with all messages broadcast to the entire network. sending and receiving devices in a network.
business continuity planning Planning that focuses on how the
company can restore business operations after a disaster strikes. chat Live, interactive conversations over a public network.
business driver A force in the environment to which businesses chief information officer (CIO) Senior manager in charge of the
must respond and that influences the direction of business.
business ecosystem Loosely coupled but interdependent networks of information systems function in the firm.
suppliers, distributors, outsourcing firms, transportation service chief knowledge officer (CKO) Senior executive in charge of the
firms, and technology manufacturers
business functions Specialized tasks performed in a business organization’s knowledge management program.
organization, including manufacturing and production, sales and chief privacy officer (CPO) Responsible for ensuring the company
marketing, finance and accounting, and human resources.
business intelligence Applications and technologies to help users complies with existing data privacy laws.
make better business decisions. chief security officer (CSO) Heads a formal security function for
business model An abstraction of what an enterprise is and how the
enterprise delivers a product or service, showing how the the organization and is responsible for enforcing the firm’s
enterprise creates wealth. security policy.
business performance management Attempts to systematically choice Simon’s third stage of decision making, when the individual
translate a firm’s strategies (e.g., differentiation, low-cost producer, selects among the various solution alternatives.
market share growth, and scope of operation) into operational Chrome OS Google's lightweight computer operating system for users
targets. who do most of their computing on the Internet; runs on
business process management Business process management (BPM) computers ranging from netbooks to desktop computers.
is an approach to business which aims to continuously improve churn rate Measurement of the number of customers who stop using
and manage business processes. or purchasing products or services from a company. Used as an
business process redesign Type of organizational change in which indicator of the growth or decline of a firm’s customer base.
business processes are analyzed, simplified, and redesigned. classical model of management Traditional description of
business processes The unique ways in which organizations management that focused on its formal functions of planning,
coordinate and organize work activities, information, and organizing, coordinating, deciding, and controlling.
knowledge to produce a product or service. click fraud Fraudulently clicking on an online ad in pay
business-to-business (B2B) electronic commerce Electronic sales per click advertising to generate an improper charge per click.
of goods and services among businesses. clicks-and-mortar Business model where the Web site is an
business-to-consumer (B2C) electronic commerce Electronic extension of a traditional bricks-and-mortar business.
retailing of products and services directly to individual clickstream tracking Tracking data about customer activities at Web
consumers. sites and storing them in a log.
byte A string of bits, usually eight, used to store one number or client The user point-of-entry for the required function in
character in a computer system. client/server computing. Normally a desktop computer,
workstation, or laptop computer.
cable Internet connections Internet connections that use digital client/server computing A model for computing that splits processing
cable lines to deliver high-speed Internet access to homes and between clients and servers on a network, assigning functions to
businesses. the machine most able to perform the function.
cloud computing Web-based applications that are stored on remote
call center An organizational department responsible for handling servers and accessed via the "cloud" of the Internet using a
customer service issues by telephone and other channels. standard Web browser.
coaxial cable A transmission medium consisting of thickly insulated
copper wire; can transmit large volumes of data quickly.
Code Division Multiple Access (CDMA) Major cellular
transmission standard in the United States that transmits over
several frequencies, occupies the entire spectrum, and randomly Glossary G 3
assigns users to a range of frequencies over time.
collaboration Working with others to achieve shared and explicit consumer-to-consumer (C2C) electronic commerce Consumers
goals. selling goods and services electronically to other consumers.
collaborative commerce The use of digital technologies to enable
multiple organizations to collaboratively design, develop, build controls All of the methods, policies, and procedures that ensure
and manage products through their life cycles. protection of the organization’s assets, accuracy and reliability of
collaborative filtering Tracking users’ movements on a Web site, its records, and operational adherence to management standards.
comparing the information gleaned about a user’s behavior
against data about other customers with similar interests to conversion The process of changing from the old system to the new
predict what the user would like to see next. system.
collaborative planning, forecasting, and replenishment (CPFR)
Firms collaborating with their suppliers and buyers to formulate cookies Tiny file deposited on a computer hard drive when an
demand forecasts, develop production plans, and coordinate individual visits certain Web sites. Used to identify the visitor and
shipping, warehousing, and stocking activities. track visits to the Web site.
co-location a kind of Web site hosting in which firm purchase or rent
a physical server computer at a hosting company's location in cooptation Bringing the opposition into the process of designing and
order to operate a Web site. implementing a solution without giving up control of the
community provider a Web site business model that creates a digital direction and nature of the change.
online environment where people with similar interests can
transact (buy and sell goods); share interests, photos, videos; copyright A statutory grant that protects creators of intellectual
communicate with like-minded people; receive interest-related property against copying by others for any purpose for a
information; and even play out fantasies by adopting online minimum of 70 years.
personalities called avatars.
competitive forces model Model used to describe the interaction of core competency Activity at which a firm excels as a world-class
external influences, specifically threats and opportunities, that leader.
affect an organization’s strategy and ability to compete.
complementary assets Additional assets required to derive value core systems Systems that support functions that are absolutely
from a primary investment. critical to the organization.
component-based development Building large software systems by
combining pre-existing software components. cost transparency the ability of consumers to discover the actual
computer Physical device that takes data as an input, transforms the costs merchants pay for products.
data by executing stored instructions, and outputs information to
a number of devices. counterimplementation A deliberate strategy to thwart the
computer abuse The commission of acts involving a computer that implementation of an information system or an innovation in an
may not be illegal but are considered unethical. organization.
computer crime The commission of illegal acts through the use of a
computer or against a computer system. critical success factors (CSFs) A small number of easily identifiable
computer forensics The scientific collection, examination, operational goals shaped by the industry, the firm, the manager,
authentication, preservation, and analysis of data held on or and the broader environment that are believed to assure the
retrieved from computer storage media in such a way that the success of an organization. Used to determine the information
information can be used as evidence in a court of law. requirements of an organization.
computer hardware Physical equipment used for input, processing,
and output activities in an information system. cross-selling Marketing complementary products to customers.
computer literacy Knowledge about information technology, crowdsourcing Using large Internet audiences for advice, market
focusing on understanding of how computer-based technologies
work. feedback, new ideas and solutions to business problems. Related
computer software Detailed, preprogrammed instructions that to the 'wisdom of crowds' theory.
control and coordinate the work of computer hardware culture The set of fundamental assumptions about what products the
components in an information system. organization should produce, how and where it should produce
computer virus Rogue software program that attaches itself to other them, and for whom they should be produced.
software programs or data files in order to be executed, often customer lifetime value (CLTV) Difference between revenues
causing hardware and software malfunctions. produced by a specific customer and the expenses for acquiring
computer vision syndrome (CVS) Eyestrain condition related to and servicing that customer minus the cost of promotional
computer display screen use; symptoms include headaches, marketing over the lifetime of the customer relationship,
blurred vision, and dry and irritated eyes. expressed in today’s dollars.
computer-aided design (CAD) Information system that automates customer relationship management (CRM) Business and
the creation and revision of designs using sophisticated graphics technology discipline that uses information systems to coordinate
software. all of the business processes surrounding the firm’s interactions
computer-aided software engineering (CASE) Automation of step- with its customers in sales, marketing, and service.
by-step methodologies for software and systems development to customer relationship management systems Information systems
reduce the amounts of repetitive work the developer needs to do. that track all the ways in which a company interacts with its
computer-based information systems (CBIS) Information systems customers and analyze these interactions to optimize revenue,
that rely on computer hardware and software for processing and profitability, customer satisfaction, and customer retention.
disseminating information. customization The modification of a software package to meet an
connectivity The ability of computers and computer-based devices to organization’s unique requirements without destroying the
communicate with each other and share information in a package software’s integrity.
meaningful way without human intervention.. cybervandalism Intentional disruption, defacement, or destruction
of a Web site or corporate information system.
data Streams of raw facts representing events occurring in
organizations or the physical environment before they have been
organized and arranged into a form that people can understand
and use.
data administration A special organizational function for managing
the organization’s data resources, concerned with information
policy, data planning, maintenance of data dictionaries, and data
quality standards.
data cleansing Activities for detecting and correcting data in a
database or file that are incorrect, incomplete, improperly
formatted, or redundant. Also known as data scrubbing.
G 4 Glossary from higher priority business-critical data, and sending packets in
order of priority.
data definition DBMS capability that specifies the structure and demand planning Determining how much product a business needs
content of the database. to make to satisfy all its customers’ demands.
denial of service (DoS) attack Flooding a network server or Web
data dictionary An automated or manual tool for storing and server with false communications or requests for services in
organizing information about the data maintained in a database. order to crash the network.
Descartes’ rule of change A principle that states that if an action
data-driven DSS A system that supports decision making by allowing cannot be taken repeatedly, then it is not right to be taken at any
users to extract and analyze useful information that was time.
previously buried in large databases. design Simon’s second stage of decision making, when the individual
conceives of possible alternative solutions to a problem.
data element A field. digital asset management systems Classify, store, and distribute
data flow diagram (DFD) Primary tool for structured analysis that digital objects such as photographs, graphic images, video, and
audio content.
graphically illustrates a system’s component process and the flow digital certificate An attachment to an electronic message to verify
of data between them. the identity of the sender and to provide the receiver with the
data governance Policies and processes for managing the availability, means to encode a reply.
usability, integrity, and security of the firm’s data. digital checking Systems that extend the functionality of existing
data inconsistency The presence of different values for same checking accounts so they can be used for online shopping
attribute when the same data are stored in multiple locations. payments.
data management software Software used for creating and digital credit card payment system Secure services for credit card
manipulating lists, creating files and databases to store data, and payments on the Internet that protect information transmitted
combining information for reports. among users, merchant sites, and processing banks.
data manipulation language A language associated with a database digital dashboard Displays all of a firm’s key performance indicators
management system that end users and programmers use to as graphs and charts on a single screen to provide one-page
manipulate data in the database. overview of all the critical measurements necessary to make key
data mart A small data warehouse containing only a portion of the executive decisions.
organization’s data for a specified function or population of users. digital divide Large disparities in access to computers and the
data mining Analysis of large pools of data to find patterns and rules Internet among different social groups and different locations.
that can be used to guide decision making and predict future digital firm Organization where nearly all significant business
behavior. processes and relationships with customers, suppliers, and
data quality audit A survey and/or sample of files to determine employees are digitally enabled, and key corporate assets are
accuracy and completeness of data in an information system. managed through digital means.
data redundancy The presence of duplicate data in multiple data digital goods Goods that can be delivered over a digital network.
files. digital market A marketplace that is created by computer and
data visualization Technology for helping users see patterns and communication technologies that link many buyers and sellers.
relationships in large amounts of data by presenting the data in Digital Millennium Copyright Act (DMCA) Adjusts copyright laws
graphical form. to the Internet Age by making it illegal to make, distribute, or use
data warehouse A database, with reporting and query tools, that devices that circumvent technology-based protections of copy-
stores current and historical data extracted from various righted materials.
operational systems and consolidated for management reporting digital signal A discrete waveform that transmits data coded into
and analysis. two discrete states as 1-bits and 0-bits, which are represented as
data workers People such as secretaries or bookkeepers who process on-off electrical pulses; used for data communications.
the organization’s paperwork. digital subscriber line (DSL) A group of technologies providing
database A group of related files. high-capacity transmission over existing copper telephone lines.
database (rigorous definition) A collection of data organized to digital wallet Software that stores credit card, electronic cash, owner
service many applications at the same time by storing and identification, and address information and provides this data
managing data so that they appear to be in one location. automatically during electronic commerce purchase transactions.
database administration Refers to the more technical and direct cutover A risky conversion approach where the new system
operational aspects of managing data, including physical database completely replaces the old one on an appointed day.
design and maintenance. disaster recovery planning Planning for the restoration of
database management system (DBMS) Special software to create computing and communications services after they have been
and maintain a database and enable individual business disrupted.
applications to extract the data they need without having to disintermediation The removal of organizations or business process
create separate files or data definitions in their computer layers responsible for certain intermediary steps in a value chain.
programs. disruptive technologies Technologies with disruptive impact on
database server A computer in a client/server environment that is industries and businesses, rendering existing products, services
responsible for running a DBMS to process SQL statements and and business models obsolete.
perform database management tasks. distance learning Education or training delivered over a distance to
dataconferencing Teleconferencing in which two or more users are individuals in one or more locations.
able to edit and modify data files simultaneously. distributed database A database that is stored in more than one
decisional roles Mintzberg’s classification for managerial roles where physical location. Parts or copies of the database are physically
managers initiate activities, handle disturbances, allocate stored in one location, and other parts or copies are stored and
resources, and negotiate conflicts. maintained in other locations.
decision-support systems (DSS) Information systems at the distributed denial-of-service (DDoS) attack Numerous computers
organization’s management level that combine data and inundating and overwhelming a network from numerous launch
sophisticated analytical models or data analysis tools to support points.
semistructured and unstructured decision making.
dedicated lines Telephone lines that are continuously available for
transmission by a lessee. Typically conditioned to transmit data
at high speeds for high-volume applications.
deep packet inspection (DPI) Technology for managing network
traffic by examining data packets, sorting out low-priority data
distributed processing The distribution of computer processing Glossary G 5
work among multiple computers linked by a communications
network. end users Representatives of departments outside the information
systems group for whom applications are developed.
documentation Descriptions of how an information system works
from either a technical or end-user standpoint. enterprise applications Systems that can coordinate activities,
decisions, and knowledge across many different functions, levels,
domain name English-like name that corresponds to the unique 32- and business units in a firm. Include enterprise systems, supply
bit numeric Internet Protocol (IP) address for each computer chain management systems, and knowledge management
connected to the Internet systems.
Domain Name System (DNS) A hierarchical system of servers enterprise content management systems Help organizations
maintaining a database enabling the conversion of domain names manage structured and semistructured knowledge, providing
to their numeric IP addresses. corporate repositories of documents, reports, presentations, and
best practices and capabilities for collecting and organizing e-mail
domestic exporter Form of business organization characterized by and graphic objects.
heavy centralization of corporate activities in the home county of
origin. enterprise portal Web interface providing a single entry point for
accessing organizational information and services, including
downsizing The process of transferring applications from large information from various enterprise applications and in-house
computers to smaller ones. legacy systems so that information appears to be coming from a
single source.
downtime Period of time in which an information system is not
operational. enterprise software Set of integrated modules for applications such
as sales and distribution, financial accounting, investment
drill down The ability to move from summary data to lower and management, materials management, production planning, plant
lower levels of detail. maintenance, and human resources that allow data to be used by
multiple functions and business processes.
due process A process in which laws are well-known and understood
and there is an ability to appeal to higher authorities to ensure enterprise systems Integrated enterprise-wide information systems
that laws are applied correctly. that coordinate key internal processes of the firm.
dynamic pricing Pricing of items based on real-time interactions enterprise-wide knowledge management systems General-
between buyers and sellers that determine what a item is worth purpose, firmwide systems that collect, store, distribute, and
at any particular moment. apply digital content and knowledge.
e-government Use of the Internet and related technologies to entity A person, place, thing, or event about which information must
digitally enable government and public sector agencies’ be kept.
relationships with citizens, businesses, and other arms of
government. entity-relationship diagram A methodology for documenting
databases illustrating the relationship between various entities in
e-learning Instruction delivered through purely digital technology, the database.
such as CD-ROMs, the Internet, or private networks.
ergonomics The interaction of people and machines in the work
efficient customer response system System that directly links environment, including the design of jobs, health issues, and the
consumer behavior back to distribution, production, and supply end-user interface of information systems.
chains.
e-tailer Online retail stores from the giant Amazon to tiny local stores
electronic billing and payment presentation system Systems that have Web sites where retail goods are sold.
used for paying routine monthly bills that allow users to view
their bills electronically and pay them through electronic funds ethical “no free lunch” rule Assumption that all tangible and
transfers from banks or credit card accounts. intangible objects are owned by someone else, unless there is a
specific declaration otherwise, and that the creator wants
electronic business (e-business) The use of the Internet and digital compensation for this work.
technology to execute all the business processes in the enterprise.
Includes e-commerce as well as processes for the internal ethics Principles of right and wrong that can be used by individuals
management of the firm and for coordination with suppliers and acting as free moral agents to make choices to guide their
other business partners. behavior.
electronic commerce The process of buying and selling goods and evil twins Wireless networks that pretend to be legitimate to entice
services electronically involving transactions using the Internet, participants to log on and reveal passwords or credit card
networks, and other digital technologies. numbers.
electronic data interchange (EDI) The direct computer-to- exchange Third-party Net marketplace that is primarily transaction
computer exchange between two organizations of standard oriented and that connects many buyers and suppliers for spot
business transactions, such as orders, shipment instructions, or purchasing.
payments.
executive support systems (ESS) Information systems at the
electronic payment system The use of digital technologies, such as organization’s strategic level designed to address unstructured
credit cards, smart cards and Internet-based payment systems, to decision making through advanced graphics and
pay for products and services electronically. communications.
e-mail The computer-to-computer exchange of messages. expert system Knowledge-intensive computer program that captures
employee relationship management (ERM) Software dealing with the expertise of a human in limited domains of knowledge.
employee issues that are closely related to CRM, such as setting explicit knowledge Knowledge that has been documented.
objectives, employee performance management, performance- external integration tools Project management technique that links
based compensation, and employee training.
encryption The coding and scrambling of messages to prevent their the work of the implementation team to that of users at all
being read or accessed without authorization. organizational levels.
end-user development The development of information systems by extranet Private intranet that is accessible to authorized outsiders.
end users with little or no formal assistance from technical
specialists. Fair Information Practices (FIP) A set of principles originally set
end-user interface The part of an information system through which forth in 1973 that governs the collection and use of information
the end user interacts with the system, such as on-line screens about individuals and forms the basis of most U.S. and European
and commands. privacy laws.
G 6 Glossary global positioning system (GPS) Worldwide satellite navigational
system.
fault-tolerant computer systems Systems that contain extra
hardware, software, and power supply components that can back graphical user interface (GUI) The part of an operating system
a system up and keep it running to prevent system failure. users interact with that uses graphic icons and the computer
mouse to issue commands and make selections.
feasibility study As part of the systems analysis process, the way to
determine whether the solution is achievable, given the Gramm-Leach-Bliley Act Requires financial institutions to ensure
organization’s resources and constraints. the security and confidentiality of customer data.
feedback Output that is returned to the appropriate members of the green computing Refers to practices and technologies for designing,
organization to help them evaluate or correct input. manufacturing, using, and disposing of computers, servers, and
associated devices such as monitors, printers, storage devices,
fiber-optic cable A fast, light, and durable transmission medium and networking and communications systems to minimize
consisting of thin strands of clear glass fiber bound into cables. impact on the environment.
Data are transmitted as light pulses.
grid computing Applying the resources of many computers in a
field A grouping of characters into a word, a group of words, or a network to a single problem.
complete number, such as a person’s name or age.
group decision-support system (GDSS) An interactive computer-
file transfer protocol (FTP) Tool for retrieving and transferring files based system to facilitate the solution to unstructured problems
from a remote computer. by a set of decision makers working together as a group.
file A group of records of the same type. hacker A person who gains unauthorized access to a computer
firewall Hardware and software placed between an organization’s network for profit, criminal mischief, or personal pleasure.
internal network and an external network to prevent outsiders hertz Measure of frequency of electrical impulses per second, with 1
from invading private networks. Hertz equivalent to 1 cycle per second.
focused differentiation Competitive strategy for developing new
market niches for specialized products or services where a high-availability computing Tools and technologies ,including
business can compete in the target area better than its backup hardware resources, to enable a system to recover quickly
competitors. from a crash.
folksonomies User-created taxonomies for classifying and sharing
information. HIPAA Law outlining rules for medical security, privacy, and the
foreign key Field in a database table that enables users find related management of health care records.
information in another database table.
formal control tools Project management technique that helps hotspot A specific geographic location in which an access point
monitor the progress toward completion of a task and fulfillment provides public Wi-Fi network service.
of goals.
formal planning tools Project management technique that hubs Very simple devices that connect network components, sending
structures and sequences tasks, budgeting time, money, and a packet of data to all other connected devices.
technical resources required to complete the tasks.
forward chaining A strategy for searching the rule base in an expert hybrid AI systems Integration of multiple AI technologies into a
system that begins with the information entered by the user and single application to take advantage of the best features of these
searches the rule base to arrive at a conclusion. technologies.
fourth-generation language A programming language that can be
employed directly by end users or less-skilled programmers to hypertext markup language (HTML) Page description language for
develop computer applications more rapidly than conventional creating Web pages and other hypermedia documents.
programming languages.
franchiser Form of business organization in which a product is hypertext transfer protocol (HTTP) The communications standard
created, designed, financed, and initially produced in the home used to transfer pages on the Web. Defines how messages are
country, but for product-specific reasons relies heavily on foreign formatted and transmitted.
personnel for further production, marketing, and human
resources. identity management Business processes and software tools for
free/fremium revenue model an e-commerce revenue model in identifying the valid users of a system and controlling their
which a firm offers basic services or content for free, while access to system resources.
charging a premium for advanced or high value features.
fuzzy logic Rule-based AI that tolerates imprecision by using identity theft Theft of key pieces of personal information, such as
nonspecific terms called membership functions to solve credit card or Social Security numbers, in order to obtain
problems. merchandise and services in the name of the victim or to obtain
false credentials.
Gantt chart Visually representats the timing, duration, and resource
requirements of project tasks. Immanuel Kant’s Categorical Imperative A principle that states
that if an action is not right for everyone to take it is not right for
general controls Overall control environment governing the design, anyone.
security, and use of computer programs and the security of data
files in general throughout the organization's information implementation Simon’s final stage of decision-making, when the
technology infrastructure. individual puts the decision into effect and reports on the
progress of the solution.
genetic algorithms Problem-solving methods that promote the
evolution of solutions to specified problems using the model of industry structure The nature of participants in an industry and
living organisms adapting to their environment. their relative bargaining power. Derives from the competitive
forces and establishes the general business environment in an
geographic information system (GIS) System with software that industry and the overall profitability of doing business in that
can analyze and display data using digitized maps to enhance environment.
planning and decision-making.
inference engine The strategy used to search through the rule base
global culture The development of common expectations, shared in an expert system; can be forward or backward chaining.
artifacts, and social norms among different cultures and peoples
information Data that have been shaped into a form that is
meaningful and useful to human beings.
information asymmetry Situation where the relative bargaining
power of two parties in a transaction is determined by one party
in the transaction possessing more information essential to the
transaction than the other party.
information density The total amount and quality of information Glossary G 7
available to all market participants, consumers, and merchants.
Internet Service Provider (ISP) A commercial organization with a
information policy Formal rules governing the maintenance, permanent connection to the Internet that sells temporary
distribution, and use of information in an organization. connections to subscribers.
information requirements A detailed statement of the information Internet telephony Technologies that use the Internet Protocol’s
needs that a new system must satisfy; identifies who needs what packet-switched connections for voice service.
information, and when, where, and how the information is
needed. Internet2 Research network with new protocols and transmission
speeds that provides an infrastructure for supporting high-
information rights The rights that individuals and organizations bandwidth Internet applications.
have with respect to information that pertains to themselves.
interorganizational systems Information systems that automate the
information system Interrelated components working together to flow of information across organizational boundaries and link a
collect, process, store, and disseminate information to support company to its customers, distributors, or suppliers.
decision making, coordination, control, analysis, and visualization
in an organization. interpersonal roles Mintzberg’s classification for managerial roles
where managers act as figureheads and leaders for the
information systems department The formal organizational unit organization.
that is responsible for the information systems function in the
organization. intranet An internal network based on Internet and World Wide Web
technology and standards.
information systems literacy Broad-based understanding of
information systems that includes behavioral knowledge about intrusion detection system Tools to monitor the most vulnerable
organizations and individuals using information systems as well points in a network to detect and deter unauthorized intruders.
as technical knowledge about computers.
investment workstation Powerful desktop computer for financial
information systems managers Leaders of the various specialists in specialists, which is optimized to access and manipulate massive
the information systems department. amounts of financial data.
information systems plan A road map indicating the direction of IT governance Strategy and policies for using information
systems development: the rationale, the current situation, the technology within an organization, specifying the decision rights
management strategy, the implementation plan, and the budget. and accountabilities to ensure that information technology
supports the organization's strategies and objectives.
information technology (IT) All the hardware and software
technologies a firm needs to achieve its business objectives. iterative A process of repeating over and over again the steps to build
a system.
information technology (IT) infrastructure Computer hardware,
software, data, storage technology, and networks providing a Java Programming language that can deliver only the software
portfolio of shared IT resources for the organization. functionality needed for a particular task, such as a small applet
downloaded from a network; can run on any computer and
informational roles Mintzberg’s classification for managerial roles operating system.
where managers act as the nerve centers of their organizations,
receiving and disseminating critical information. Joint Application Design (JAD) Process to accelerate the
generation of information requirements by having end users and
informed consent Consent given with knowledge of all the facts information systems specialists work together in intensive
needed to make a rational decision. interactive design sessions.
input The capture or collection of raw data from within the just-in-time Scheduling system for minimizing inventory by having
organization or from its external environment for processing in components arrive exactly at the moment they are needed and
an information system. finished goods shipped as soon as they leave the assembly line.
instant messaging Chat service that allows participants to create key field A field in a record that uniquely identifies instances of that
their own private chat channels so that a person can be alerted record so that it can be retrieved, updated, or sorted.
whenever someone on his or her private list is on-line to initiate
a chat session with that particular individual. key performance indicators Measures proposed by senior
management for understanding how well the firm is performing
intangible benefits Benefits that are not easily quantified; they along specified dimensions.
include more efficient customer service or enhanced decision
making. keylogger Spyware that records every keystroke made on a computer
to steal personal information or passwords or to launch Internet
intellectual property Intangible property created by individuals or attacks.
corporations that is subject to protections under trade secret,
copyright, and patent law. knowledge Concepts, experience, and insight that provide a
framework for creating, evaluating, and using information.
intelligence The first of Simon’s four stages of decision making,
when the individual collects information to identify problems knowledge—and information-intense products Products that
occurring in the organization. require a great deal of learning and knowledge to produce.
intelligent agent Software program that uses a built-in or learned knowledge base Model of human knowledge that is used by expert
knowledge base to carry out specific, repetitive, and predictable systems.
tasks for an individual user, business process, or software
application. knowledge discovery Identification of novel and valuable patterns in
large databases.
internal integration tools Project management technique that
ensures that the implementation team operates as a cohesive knowledge management The set of processes developed in an
unit. organization to create, gather, store, maintain, and disseminate
the firm’s knowledge.
international information systems architecture The basic
information systems required by organizations to coordinate knowledge management systems Systems that support the creation,
worldwide trade and other activities. capture, storage, and dissemination of firm expertise and
knowledge.
Internet Global network of networks using universal standards to
connect millions of different networks. knowledge network system Online directory for locating corporate
experts in well-defined knowledge domains.
Internet Protocol (IP) address Four-part numeric address
indicating a unique computer location on the Internet. knowledge workers People such as engineers or architects who
design products or services and create knowledge for the
organization.
G 8 Glossary microprocessor Very large scale integrated circuit technology that
integrates the computer’s memory, logic, and control on a single
learning management system (LMS) Tools for the management, chip.
delivery, tracking, and assessment of various types of employee
learning. microwave A high-volume, long-distance, point-to-point transmission
in which high-frequency radio signals are transmitted through
legacy system A system that has been in existence for a long time the atmosphere from one terrestrial transmission station to
and that continues to be used to avoid the high cost of replacing another.
or redesigning it.
middle management People in the middle of the organizational
legitimacy The extent to which one’s authority is accepted on hierarchy who are responsible for carrying out the plans and
grounds of competence, vision, or other qualities. Making goals of senior management.
judgments and taking actions on the basis of narrow or personal
characteristics. midrange computer Middle-size computer that is capable of
supporting the computing needs of smaller organizations or of
liability The existence of laws that permit individuals to recover the managing networks of other computers.
damages done to them by other actors, systems, or organizations.
minicomputer Middle-range computer used in systems for
Linux Reliable and compactly designed operating system that is an universities, factories, or research laboratories.
offshoot of UNIX and that can run on many different hardware
platforms and is available free or at very low cost. Used as MIS audit Identifies all the controls that govern individual
alternative to UNIX and Windows NT. information systems and assesses their effectiveness.
local area network (LAN) A telecommunications network that mobile commerce (m-commerce) The use of wireless devices,
requires its own dedicated channels and that encompasses a such as cell phones or handheld digital information appliances, to
limited distance, usually one building or several buildings in conduct both business-to-consumer and business-to-business e-
close proximity. commerce transactions over the Internet.
long tail marketing Refers to the ability of firms to profitably market mobile wallets (m-wallets) Store m-commerce shoppers’ personal
goods to very small online audiences, largely because of the information and credit card numbers to expedite the purchase
lower costs of reaching very small market segements (people process.
who fall into the long tail ends of a Bell curve).
moblog Specialized blog featuring photos with captions posted from
mainframe Largest category of computer, used for major business mobile phones.
processing.
model An abstract representation that illustrates the components or
maintenance Changes in hardware, software, documentation, or relationships of a phenomenon.
procedures to a production system to correct errors, meet new
requirements, or improve processing efficiency. model-driven DSS Primarily stand-alone system that uses some type
of model to perform “what-if” and other kinds of analyses.
malware Malicious software programs such as computer viruses,
worms, and Trojan horses. modem A device for translating a computer’s digital signals into
analog form for transmission over ordinary telephone lines, or for
managed security service provider (MSSP) Company that provides translating analog signals back into digital form for reception by a
security management services for subscribing clients. computer.
management information systems (MIS) The study of information module A logical unit of a program that performs one or several
systems focusing on their use in business and management.. functions.
management-level systems Information systems that support the Moore’s Law Assertion that the number of components on a chip
monitoring, controlling, decision-making, and administrative doubles each year
activities of middle managers.
MP3 (MPEG3) Compression standard that can compress audio files
managerial roles Expectations of the activities that managers should for transfer over the Internet with virtually no loss in quality.
perform in an organization.
multicore processor Integrated circuit to which two or more
man-month The traditional unit of measurement used by systems processors have been attached for enhanced performance,
designers to estimate the length of time to complete a project. reduced power consumption and more efficient simultaneous
Refers to the amount of work a person can be expected to processing of multiple tasks.
complete in a month.
multimedia The integration of two or more types of media such as
market creator An e-commerce business model in which firms text, graphics, sound, voice, full-motion video, or animation into a
provide a digital online environment where buyers and sellers computer-based application.
can meet, search for products, and engage in transactions.
multinational Form of business organization that concentrates
marketspace A marketplace extended beyond traditional boundaries financial management and control out of a central home base
and removed from a temporal and geographic location. while decentralizing
mashups Composite software applications that depend on multiplexing Ability of a single communications channel to carry
high-speed networks, universal communication standards, and data transmissions from multiple sources simultaneously.
open-source code.
multitiered (N-tier) client/server architecture Client/server
mass customization The capacity to offer individually tailored network which the work of the entire network is balanced over
products or services using mass production resources.. several different levels of servers.
megahertz A measure of cycle speed, or the pacing of events in a nanotechnology Technology that builds structures and processes
computer; one megahertz equals one million cycles per second. based on the manipulation of individual atoms and molecules.
menu costs Merchants’ costs of changing prices. natural language Nonprocedural language that enables users to
metric A standard measurement of performance. communicate with the computer using conversational commands
metropolitan area network (MAN) Network that spans a resembling human speech.
metropolitan area, usually a city and its major suburbs. Its net marketplace A single digital marketplace based on Internet
geographic scope falls between a WAN and a LAN. technology linking many buyers to many sellers.
microbrowser Web browser software with a small file size that can
work with low-memory constraints, tiny screens of handheld netbook Small low-cost, lightweight subnotebook optimized for
wireless devices, and low bandwidth of wireless networks. wireless communication and Internet access.
micropayment Payment for a very small sum of money, often less
than $10. network The linking of two or more computers to share data or
resources, such as a printer.
network economics Model of strategic systems at the industry level Glossary G 9
based on the concept of a network where adding another
participant entails zero marginal costs but can create much larger operational-level systems Information systems that monitor the
marginal gains. elementary activities and transactions of the organization.
network interface card (NIC) Expansion card inserted into a opt-in Model of informed consent permitting prohibiting an
computer to enable it to connect to a network. organization from collecting any personal information unless the
individual specifically takes action to approve information
network operating system (NOS) Special software that routes and collection and use.
manages communications on the network and coordinates
network resources. opt-out Model of informed consent permitting the collection of
personal information until the consumer specifically requests
networking and telecommunications technology Physical devices that the data not be collected.
and software that link various computer hardware components
and transfer data from one physical location to another. organization (behavioral definition) A collection of rights,
privileges, obligations, and responsibilities that are delicately
neural network Hardware or software that attempts to emulate the balanced over a period of time through conflict and conflict
processing patterns of the biological brain. resolution.
nonobvious relationship awareness (NORA) Technology that can organization (technical definition) A stable, formal, social
find obscure hidden connections between people or other entities structure that takes resources from the environment and
by analyzing information from many different sources to processes them to produce outputs.
correlate relationships.
organizational and management capital Investments in
normalization The process of creating small stable data structures organization and management such as new business processes,
from complex groups of data when designing a relational management behavior, organizational culture, or training.
database.
organizational impact analysis Study of the way a proposed system
object Software building block that combines data and the procedures will affect organizational structure, attitudes, decision making,
acting on the data. and operations.
object-oriented DBMS An approach to data management that stores organizational learning Creation of new standard operating
both data and the procedures acting on the data as objects that procedures and business processes that reflect organizations’
can be automatically retrieved and shared; the objects can experience.
contain multimedia.
output The distribution of processed information to the people who
object-oriented development Approach to systems development will use it or to the activities for which it will be used.
that uses the object as the basic unit of systems analysis and
design. The system is modeled as a collection o objects and the outsourcing The practice of contracting computer center operations,
relationship between them. telecommunications networks, or applications development to
external vendors.
object-oriented programming An approach to software
development that combines data and procedures into a single P3P Industry standard designed to give users more control over
object. personal information gathered on Web sites they visit. Stands for
Platform for Privacy Preferences Project.
object-relational DBMS A database management system that
combines the capabilities of a relational DBMS for storing packet switching Technology that breaks messages into small, fixed
traditional information and the capabilities of an bundles of data and routes them in the most economical way
object-oriented DBMS for storing graphics and multimedia. through any available communications channel..
Office 2010 The latest version of Microsoft desktop software suite paradigm shift Radical reconceptualization of the nature of the
with capabilities for supporting collaborative work on the Web or business and the nature of the organization.
incorporating information from the Web into documents.
parallel strategy A safe and conservative conversion approach where
offshore outsourcing Outsourcing systems development work or both the old system and its potential replacement are run
maintenance of existing systems to external vendors in another together for a time until everyone is assured that the new one
country. functions correctly.
on-demand computing Firms off-loading peak demand for particularism Making judgments and taking action on the basis of
computing power to remote, large-scale data processing centers, narrow or personal characteristics, in all its forms (religious,
investing just enough to handle average processing loads and nationalistic, ethnic, regionalism, geopolitical position).
paying for only as much additional computing power as the
market demands. Also called utility computing. partner relationship management (PRM) Automation of the firm’s
relationships with its selling partners using customer data and
on-line analytical processing (OLAP) Capability for manipulating analytical tools to improve coordination and customer sales.
and analyzing large volumes of data from multiple perspectives.
patch Small pieces of software to repair the software flaws without
online processing A method of collecting and processing data in disturbing the proper operation of the software.
which transactions are entered directly into the computer system
and processed immediately. patent A legal document that grants the owner an exclusive
monopoly on the ideas behind an invention for 17 years;
online transaction processing Transaction processing mode in designed to ensure that inventors of new machines or methods
which transactions entered on-line are immediately processed by are rewarded for their labor while making widespread use of their
the computer. inventions.
open-source software Software that provides free access to its peer-to-peer Network architecture that gives equal power to all
program code, allowing users to modify the program code to computers on the network; used primarily in small networks.
make improvements or fix errors.
personal area network (PAN) Computer network used for
operating system Software that manages the resources and activities communication among digital devices (including telephones and
of the computer. PDAs) that are close to one person.
operational CRM Customer-facing applications, such as sales force personal digital assistant (PDA) Small, pen-based, handheld
automation, call center and customer service support, and computer with built-in wireless telecommunications capable of
marketing automation. entirely digital communications transmission.
operational management People who monitor the day-to-day personalization Ability of merchants to target marketing messages to
activities of the organization. specific individuals by adjusting the message for a person’s name,
interests, and past purchases.
PERT chart Network diagram depicting project tasks and their
interrelationships.