13 Using Technology to Manage Information

Introduction

Photo of keyboard keys.
Exhibit 13.1 (Credit: OIST / flickr / Attribution 2.0 Generic (CC BY 2.0))

Learning Objectives

After reading this chapter, you should be able to answer these questions:

  1. How has information technology transformed business and managerial decision-making?
  2. Why are computer networks an important part of today’s information technology systems?
  3. What types of systems make up a typical company’s management information system?
  4. How can technology management and planning help companies optimize their information technology systems?
  5. What are the best ways to protect computers and the information they contain?
  6. What are the leading trends in information technology?

Exploring Business Careers

John Daly, Daly Investment Management, LLC

When meeting with a Daly Investment (https://www.dalyinvestment.com) financial consultant, most likely you are thinking about money, your money. Whether you seek a short-term investment or a retirement nest egg, money will be your focus. You probably will not be thinking about the technological infrastructure required to transmit information throughout a multibillion dollar, nationwide institution such as TD Ameritrade—information that often is private and financial in nature. Luckily for you, however, the company is led by financial advisor John Daly, who works with TD Ameritrade to support his company’s technology needs.

After successful careers at Charles Schwab and Morgan Stanley, Daly knew when he started his own firm he would need IT support so that he could ensure the security of the funds he managed for his customers while focusing on the financial aspects of managing their finances. In addition to providing a financial trading platform for individual investors, TD Ameritrade has a robust set of software as a service cloud-based tools that allow Daly to focus on his core competencies rather than having to hire, train, and maintain a complex set of IT resources that his clients can trust.

Given the size of the assets it manages, TD Ameritrade’s management information system (MIS) is necessarily large. TD Ameritrade’s open architecture environment enables financial advisors like John Daly to select the technology they want to use. The lesson is that Daly could act as an entrepreneur and start his own firm while providing information technology with the scale that customers expect and providing the personal service that is often missing when dealing with larger organizations.

Sources: “Innovative Technologies,” TD Ameritrade Institutional, http://www.tdainstitutional.com, accessed February 21, 2018; Daly Investment Management website, https://www.dalyinvestment.com, accessed February 21, 2018; Daly Investment Management Facebook page, https://www.facebook.com/dalyinvestment, accessed February 21, 2018.

This chapter focuses on the role of information technology (IT) in business, examining the details of MIS organization, as well as the challenges companies encounter in an increasingly technological world. As John Daly learned, harnessing the power of information technology gives a company a significant competitive advantage.

13.1 Transforming Businesses through Information

Learning Objectives

How has information technology transformed business and managerial decision-making?

Information technology (IT) includes the equipment and techniques used to manage and process information. Information is at the heart of all organizations. Without information about the processes of and participants in an organization—including orders, products, inventory, scheduling, shipping, customers, suppliers, and employees—a business cannot operate.

In less than 70 years, we have shifted from an industrial society to a knowledge-based economy driven by information. Businesses depend on information technology for everything from running daily operations to making strategic decisions. Computers are the tools of this information age, performing extremely complex operations as well as everyday jobs such as word processing and creating spreadsheets. The pace of change has been rapid since the personal computer became a fixture on most office desks. Individual units became part of small networks, followed by more sophisticated enterprise-wide networks. Table 13.1 and Table 13.2 summarize the types of computer equipment and software, respectively, most commonly used in business management information systems today.

Business Computing Equipment
Computer Type Description Comments
Tablets Self-contained computers in which applications (apps) can reside. These devices can also be linked into a network over which other programs can be accessed. Increasing power, speed, and memory accessed via the cloud make these tablets the dominant computer for many business processes.
Desktop personal computers (PC) Self-contained computers on which software can reside. These PCs can also be linked into a network over which other programs can be accessed. Increasing power, speed, memory, and storage make these commonly used for many business processes. Can handle text, audio, video, and complex graphics.
Laptop computers Portable computers similar in power to desktop computers. Smaller size and weight make mobile computing easier for workers.
Minicomputers Medium-sized computers with multiple processors, able to support from four to about 200 users at once. The distinction between the larger minicomputers and smaller mainframes is blurring.
Mainframe computers Large machines about the size of a refrigerator; can simultaneously run many different programs and support hundreds or thousands of users. Extremely reliable and stable, these are used by companies and governments to process large amounts of data. They are more secure than PCs.
Servers Greatest storage capacity and processing speeds. These are not subject to crashes and can be upgraded and repaired while operating.
Supercomputers Most powerful computers, now capable of operating at speeds of 280 trillion calculations per second. Companies can rent time to run projects from special supercomputer centers.
Table 13.1
Application Type Description
Word processing software Used to write, edit, and format documents such as letters and reports. Spelling and grammar checkers, mail merge, tables, and other tools simplify document preparation.
Spreadsheet software Used for preparation and analysis of financial statements, sales forecasts, budgets, and similar numerical and statistical data. Once the mathematical formulas are keyed into the spreadsheet, the data can be changed and the solution will be recalculated instantaneously.
Database management programs Serve as electronic filing cabinets for records such as customer lists, employee data, and inventory information. Can sort data based on various criteria to create different reports.
Graphics and presentation programs Create tables, graphs, and slides for customer presentations and reports. Can add images, video, animation, and sound effects.
Desktop publishing software Combines word processing, graphics, and page layout software to create documents. Allows companies to design and produce sales brochures, catalogs, advertisements, and newsletters in-house.
Communications programs Translate data into a form for transmission and transfer it across a network to other computers. Used to send and retrieve data and files.
Integrated software suites Combine several popular types of programs, such as word processing, spreadsheet, database, graphics presentation, and communications programs. Component programs are designed to work together.
Groupware Facilitates collaborative efforts of workgroups so that several people in different locations can work on one project. Supports online meetings and project management (scheduling, resource allocation, document and e-mail distribution, etc.).
Financial software Used to compile accounting and financial data and create financial statements and reports.
Table 13.2

Although most workers spend their days at powerful desktop computers, other groups tackle massive computational problems at specialized supercomputer centers. Tasks that would take years on a PC can be completed in just hours on a supercomputer. With their ability to perform complex calculations quickly, supercomputers play a critical role in national security research, such as analysis of defense intelligence; scientific research, from biomedical experiments and drug development to simulations of earthquakes and star formations; demographic studies such as analyzing and predicting voting patterns; and weather and environmental studies. Businesses, too, put supercomputers to work by analyzing big data to gain insights into customer behavior, improving inventory and production management and for product design.1 The speed of these special machines has been rising steadily to meet increasing demands for greater computational capabilities, and the next goal is quadrillions of computations per second, or petaflops. Achieving these incredible speeds is critical to future scientific, medical, and business discoveries. Many countries, among them the United States, China, France, and Japan, have made petascale computing a priority.2

In addition to a business’s own computers and internal networks, the internet makes it effortless to connect quickly to almost any place in the world. As Thomas Friedman points out in his book The World Is Flat, “We are now connecting all of the knowledge centers on the planet together into a single global network, which . . . could usher in an amazing era of prosperity and innovation.”3 The opportunities for collaboration on a global scale increase daily. A manager can share information with hundreds of thousands of people worldwide as easily as with a colleague on another floor of the same office building. The internet and the web have become indispensable business tools that facilitate communication within companies as well as with customers.

The rise of electronic trading hubs is just one example of how technology is facilitating the global economy. Electronic trading hubs are not reserved for large companies of developed economies, however. Alibaba is piloting an e-hub called eWTP in Malaysia that will provide access to small businesses. As Jack Ma, Alibaba co-founder, said at eWTP’s launch, “There are a lot of free-trade zones for efficient trade facilitation, but only for big companies. There is no free-trade zone designed for small companies. I have been shouting everywhere, screaming, that every government should do it.”4

Many companies entrust an executive called the chief information officer (CIO) with the responsibility of managing all information resources. The importance of this responsibility is immense. In addition to the massive expansion of information gathered by today’s businesses, most of us are knowledge workers who develop or use knowledge. Knowledge workers contribute to and benefit from information they use to perform planning, acquiring, searching, analyzing, organizing, storing, programming, producing, distributing, marketing, or selling functions. We must know how to gather and use information from the many resources available to us.

 
A photograph shows Ben Fried on stage, with a banner behind him that reads, E 2, innovate.
Exhibit 13.2 In today’s high-tech world, CIOs must possess not only the technical smarts to implement global IT infrastructures, integrate communications systems with partners, and protect customer data from insidious hackers, but they must also have strong business acumen. Google’s acclaimed tech chief Ben Fried manages the technology necessary to deliver more than 9 billion searches daily, with an eye towards greater business efficiency, growth, and profits. Why is it important for CIOs to possess both technological and business expertise? (Credit: Enterprise 2.0 Conference/ flickr/ Attribution 2.0 Generic (CC BY 2.0))

Expanding Around the Globe

E-Hubs Integrate Global Commerce

Thanks to the wonders of technological advancement, global electronic trading now goes far beyond the internet retailing and trading that we are all familiar with. Special websites known as trading hubs, or eMarketplaces, facilitate electronic commerce between businesses in specific industries such as automotive manufacturing, retailing, telecom provisioning, aerospace, financial products and services, and more. Virtually all Forex (Foreign Exchange) is done via trading hubs that provide an open market for trading of a variety of currencies. Because there are a large number of trades involving currencies, the price is discoverable and there is transparency in the market. By contrast, Bitcoin is mainly traded in smaller quantities, and there are often large discrepancies between prices for the cryptocurrency in different exchanges.

The trading hub functions as a means of integrating the electronic collaboration of business services. Each hub provides standard formats for the electronic trading of documents used in a particular industry, as well as an array of services to sustain e-commerce between businesses in that industry. Services include demand forecasting, inventory management, partner directories, and transaction settlement services. And the payoff is significant—lowered costs, decreased inventory levels, and shorter time to market—resulting in bigger profits and enhanced competitiveness. For example, large-scale manufacturing procurement can amount to billions of dollars. Changing to “just-in-time purchasing” on the e-hub can save a considerable percentage of these costs.

Electronic trading across a hub can range from the collaborative integration of individual business processes to auctions and exchanges of goods (electronic barter). Global content management is an essential factor in promoting electronic trading agreements on the hub. A globally consistent view of the “content” of the hub must be available to all. Each participating company handles its own content, and applications such as content managers keep a continuously updated master catalog of the inventories of all members of the hub. The transaction manager application automates trading arrangements between companies, allowing the hub to provide aggregation and settlement services.

Ultimately, trading hubs for numerous industries could be linked together in a global e-commerce web—an inclusive “hub of all hubs.” One creative thinker puts it this way: “The traditional linear, one step at a time, supply chain is dead. It will be replaced by parallel, asynchronous, real-time marketplace decision-making. Take manufacturing capacity as an example. Enterprises can bid their excess production capacity on the world e-commerce hub. Offers to buy capacity trigger requests from the seller for parts bids to suppliers who in turn put out requests to other suppliers, and this whole process will all converge in a matter of minutes.”

Sources: “Asian Companies Count Losses—Hatch Ways to Cope with Weak Dollar,” Reuters, https://www.reuters.com, January 24, 2018; Rob Verger, “This Is What Determines the Price of Bitcoin,” Popular Science, https://www.popsci.com, January 22, 2018; Bhavan Jaipragas, “Alibaba’s Electronic Trading Hub to Help Small and Medium-sized Enterprises Goes Live in Malaysia,” This Week in Asia, http://www.scmp.com, November 3, 2017.

Critical Thinking Questions
  1. How do companies benefit from participating in an electronic trading hub?
  2. What impact does electronic trading have on the global economy?

Because most jobs today depend on information—obtaining, using, creating, managing, and sharing it—this chapter begins with the role of information in decision-making and goes on to discuss computer networks and management information systems. The management of information technology—planning and protection—follows. Finally, we’ll look at the latest trends in information technology. Throughout the chapter, examples show how managers and their companies are using computers to make better decisions in a highly competitive world.

Data and Information Systems

Information systems and the computers that support them are so much a part of our lives that we almost take them for granted. These management information systems methods and equipment that provide information about all aspects of a firm’s operations provide managers with the information they need to make decisions. They help managers properly categorize and identify ideas that result in substantial operational and cost benefits.

Businesses collect a great deal of data—raw, unorganized facts that can be moved and stored—in their daily operations. Only through well-designed IT systems and the power of computers can managers process these data into meaningful and useful information and use it for specific purposes, such as making business decisions. One such form of business information is the database, an electronic filing system that collects and organizes data and information. Using software called a database management system (DBMS), you can quickly and easily enter, store, organize, select, and retrieve data in a database. These data are then turned into information to run the business and to perform business analysis.

Databases are at the core of business information systems. For example, a customer database containing name, address, payment method, products ordered, price, order history, and similar data provides information to many departments. Marketing can track new orders and determine what products are selling best; sales can identify high-volume customers or contact customers about new or related products; operations managers use order information to obtain inventory and schedule production of the ordered products; and finance uses sales data to prepare financial statements. Later in the chapter, we will see how companies use very large databases called data warehouses and data marts.

Companies are discovering that they can’t operate well with a series of separate information systems geared to solving specific departmental problems. It takes a team effort to integrate the systems described and involves employees throughout the firm. Company-wide enterprise resource planning (ERP) systems that bring together human resources, operations, and technology are becoming an integral part of business strategy. So is managing the collective knowledge contained in an organization, using data warehouses and other technology tools. Technology experts are learning more about the way the business operates, and business managers are learning to use information systems technology effectively to create new opportunities and reach their goals.

Concept Check

  1. What are management information systems, and what challenges face the CIO in developing the company’s MIS?
  2. Distinguish between data and information. How are they related? Why are data considered a valuable asset for a firm?
  3. How does systems integration benefit a company?

13.2 Linking Up: Computer Networks

Learning Objectives

Why are computer networks an important part of today’s information technology systems?

Today most businesses use networks to deliver information to employees, suppliers, and customers. A computer network is a group of two or more computer systems linked together by communications channels to share data and information. Today’s networks often link thousands of users and can transmit audio and video as well as data.

Networks include clients and servers. The client is the application that runs on a personal computer or workstation. It relies on a server that manages network resources or performs special tasks such as storing files, managing one or more printers, or processing database queries. Any user on the network can access the server’s capabilities.

By making it easy and fast to share information, networks have created new ways to work and increase productivity. They provide more efficient use of resources, permitting communication and collaboration across distance and time. With file-sharing, all employees, regardless of location, have access to the same information. Shared databases also eliminate duplication of effort. Employees at different sites can “screen-share” computer files, working on data as if they were in the same room. Their computers are connected by phone or cable lines, they all see the same thing on their display, and anyone can make changes that are seen by the other participants. The employees can also use the networks for videoconferencing.

Networks make it possible for companies to run enterprise software, large programs with integrated modules that manage all of the corporation’s internal operations. Enterprise resource planning systems run on networks. Typical subsystems include finance, human resources, engineering, sales and order distribution, and order management and procurement. These modules work independently and then automatically exchange information, creating a company-wide system that includes current delivery dates, inventory status, quality control, and other critical information. Let’s now look at the basic types of networks companies use to transmit data—local area networks and wide area networks—and popular networking applications such as intranets and virtual private networks.

Connecting Near and Far with Networks

Two basic types of networks are distinguished by the area they cover. A local area network (LAN) lets people at one site exchange data and share the use of hardware and software from a variety of computer manufacturers. LANs offer companies a more cost-effective way to link computers than linking terminals to a mainframe computer. The most common uses of LANs at small businesses, for example, are office automation, accounting, and information management. LANs can help companies reduce staff, streamline operations, and cut processing costs. LANs can be set up with wired or wireless connections.

A wide area network (WAN) connects computers at different sites via telecommunications media such as phone lines, satellites, and microwaves. A modem connects the computer or a terminal to the telephone line and transmits data almost instantly, in less than a second. The internet is essentially a worldwide WAN. Communications companies, such as AT&T, Verizon, and Sprint, operate very large WANs. Companies also connect LANs at various locations into WANs. WANs make it possible for companies to work on critical projects around the clock by using teams in different time zones.

Several forms of WANs—intranets, virtual private networks (VPN), and extranets—use internet technology. Here we’ll look at intranets, internal corporate networks that are widely available in the corporate world, and VPNs. Although wireless networks have been around for more than a decade, they are increasing in use because of falling costs, faster and more reliable technology, and improved standards. They are similar to their wired LAN and WAN cousins, except they use radio frequency signals to transmit data. You use a wireless WAN (WWAN) regularly when you use your cellular phone. WANs’ coverage can span several countries. Telecommunications carriers operate using wireless WANs.

Wireless LANs (WLAN) that transmit data at one site offer an alternative to traditional wired systems. WLANs’ reach is a radius of 500 feet indoors and 1,000 feet outdoors and can be extended with antennas, transmitters, and other devices. The wireless devices communicate with a wired access point into the wired network. WLANs are convenient for specialized applications where wires are in the way or when employees are in different locations in a building. Hotels, airports, restaurants, hospitals, retail establishments, universities, and warehouses are among the largest users of WLANs, also known as Wi-Fi. For example, the Veterans Administration Hospital in West Haven, Connecticut, recently added Wi-Fi access in all patient rooms to upgrade its existing WLAN to improve patient access, quality, and reliability. The new WLAN supports many different functions, from better on-site communication among doctors and nurses through both data transmission and voice-over-internet phone systems to data-centric applications such as its Meditech clinical information system and pharmacy management.5

Catching the Entrepreneurial Spirit

Documenting the Future

Potential customers of Captiva Software didn’t share company cofounder and chief executive Reynolds Bish’s belief that paper wasn’t going away. They held to the idea that personal computers and the internet would make paper disappear, and they weren’t going to invest in software to organize their documents. That almost caused Captiva to go under. “We really were afraid we weren’t going to make it,” said Jim Berglund, an early investor in Captiva and a former board member.

But Bish asked investors for another $4 million commitment—on a bet that paper was here to stay. Bish recalls a board member telling him, “Five years from now people are going to either think you’re a genius or a complete idiot.”

That conversation took place 20 years ago. Captiva Software was named one of the fastest-growing technology companies in San Diego in the early 2000s for its 172 percent increase in revenues. The company was then acquired by EMC Corp.—the sixth-largest software company in the world and top maker of corporate data-storage equipment, with projected annual revenues of more than $9 billion—for $275 million in cash, rewarding embattled early Captiva investors with 10 times their money back. (In 2016, Dell acquired EMC for more than $67 billion.)

Captiva began its journey to the big time in 1989 in Park City, Utah, as TextWare Corp., a small data-entry company. Cofounder Steven Burton’s technical expertise, Bish’s business background, and a credit card helped them get the business going. “It was pure bootstrapping,” Bish said. “We did everything from going without a salary for a year or more to using up our credit cards.”

Bish and Burton quickly saw the need for employees to enter data more directly and accurately. The software they developed still required clerks to type information from a paper document, but it could check for inaccuracies, matching zip codes to cities, for instance. In 1996, TextWare produced software that could “read” typewritten words on a scanned piece of paper, which significantly reduced the number of data-entry clerks needed. It found popularity with credit-card processors, insurance companies, shipping companies, and other corporations that handled thousands of forms every day.

TextWare acquired or merged with five firms, went public, changed its name twice, and in 1998 set up its headquarters in San Diego, California, after buying Wheb Systems, which is based there. In 2002, the company merged with publicly held ActionPoint, a San Jose, California, document-processing company, and changed its name to Captiva.

An estimated 80 percent of all information is still paper-based, according to market research firm Forrester Research. Captiva’s flagship products, InputAccel and FormWare, process over 85 million pieces of paper worldwide every day, leaving no doubt that Bish’s vision was on target. Paper is indeed here to stay.

Sources: “Why Captiva?” https://www.emc.com, accessed February 21, 2018; EMC corporate website, “About Us,” https://dellemc.com, accessed February 21, 2018; “Lucera Uses Connectivity Routes of Chicago, New York, London and Tokyo as a Trading Hub in Trading Increases,” BSO, https://www.bsonetwork.com, October 19, 2017; Ron Miller, “$67 Billion Dell–EMC Deal Closes Today,” Tech Crunch, https://techcrunch.com, September 7, 2016; Brian Sherman, “Input Management and Opportunities for the Reseller Channel: An Interview with Wayne Ford, VP of Partner Alliances at Captiva,” ECM Connection, http://www.ecmconnection.com, December 27, 2005; Kathryn Balint, “Captiva’s Paper Chase Paying Off,” San Diego Union-Tribune, December 9, 2005, pp. C1, C5.

Critical Thinking Questions
  1. What role did co-founders Reynolds Bish and Steven Burton play in the evolution of tiny TextWare into hugely successful Captiva?
  2. What other unique factors were responsible for the company’s remarkable growth?

An Inside Job: Intranets

Like LANs, intranets are private corporate networks. Many companies use both types of internal networks. However, because they use internet technology to connect computers, intranets are WANs that link employees in many locations and with different types of computers. Essentially mini-internets that serve only the company’s employees, intranets operate behind a firewall that prevents unauthorized access. Employees navigate using a standard web browser, which makes the intranet easy to use. They are also considerably less expensive to install and maintain than other network types and take advantage of the internet’s interactive features such as chat rooms and team workspaces. Many software providers now offer off-the-shelf intranet packages so that companies of all sizes can benefit from the increased access to and distribution of information.

Companies now recognize the power of intranets to connect employers and employees in many ways, promoting teamwork and knowledge-sharing. Intranets have many applications, from human resource (HR) administration to logistics. For instance, a benefits administration intranet can become a favorite with employees. Instead of having to contact an HR representative to make any changes in personnel records or retirement plan contributions or to submit time sheets, staff members simply log on to the intranet and update the information themselves. Managers can also process staffing updates, performance reviews, and incentive payments without filing paperwork with human resources. Employees can regularly check an online job board for new positions. Shifting routine administrative tasks to the intranet can bring additional benefits such as reducing the size of the HR department by 30 percent and allowing HR staff members to turn their attention to more substantive projects.6

Enterprise Portals Open the Door to Productivity

Intranets that take a broader view serve as sophisticated knowledge management tools.

One such intranet is the enterprise portal, an internal website that provides proprietary corporate information to a defined user group. Portals can take one of three forms: business to employee (B2E), business to business (B2B), and business to consumer (B2C). Unlike a standard intranet, enterprise portals allow individuals or user groups to customize the portal home page to gather just the information they need for their particular job situations and deliver it through a single web page. Because of their complexity, enterprise portals are typically the result of a collaborative project that brings together designs developed and perfected through the effort of HR, corporate communications, and information technology departments.

More companies use portal technology to provide:

  • A consistent, simple user interface across the company
  • Integration of disparate systems and multiple sets of data and information
  • A single source for accurate and timely information that integrates internal and external information
  • A shorter time to perform tasks and processes
  • Cost savings through the elimination of information intermediaries
  • Improved communications within the company and with customers, suppliers, dealers, and distributors

No More Tangles: Wireless Technologies

Wireless technology has become commonplace today. We routinely use devices such as cellular phones, mobile devices, garage door openers, and television remote controls—without thinking of them as examples of wireless technology. Businesses use wireless technologies to improve communications with customers, suppliers, and employees.

Companies in the package delivery industry, such as UPS and FedEx, were among the first users of wireless technology. Delivery personnel use handheld computers to send immediate confirmation of package receipt. You may also have seen meter readers and repair personnel from utility and energy companies send data from remote locations back to central computers.

Bluetooth short-range wireless technology is a global standard that improves personal connectivity for users of mobile phones, portable computers, and stereo headsets, and Bluetooth wirelessly connects keyboards and mice to computers and headsets to phones and music players. A Bluetooth-enabled mobile phone, for example, provides safer hands-free phone use while driving. The technology is finding many applications in the auto industry as well. Bluetooth wireless technology is now standard in many vehicles today. Many car, technology, and cell phone companies—among them Amazon, Apple, Audi, BMW, DaimlerChrysler, Google, Honda, Saab, Toyota, and Volkswagen—already offer Bluetooth hands-free solutions. Other uses include simplifying the connection of portable digital music players to the car’s audio system and transferring downloaded music to the system.7

 
A photograph shows a person holding an iPad pro. There are colorful widgets and apps on the screen.
Exhibit 13.3 Although designing a true mobile replacement for the desktop PC has proved elusive for computer manufacturers, ultramobile PCs offer wireless functions many professionals want—web browsing, e-mail, Microsoft Office, and telephony. The Apple iPad Pro runs iOS 10, and with its 10.5-inch LCD touch screen and stylus, the mini-tablet provides the power of a desktop PC and freedom from pen and paper. What impact might ultramobile computing have on business? (Credit: Tinh t? Photo/ flickr/ Public Domain)

Private Lines: Virtual Private Networks

Many companies use virtual private networks to connect two or more private networks (such as LANs) over a public network, such as the internet. VPNs include strong security measures to allow only authorized users to access the network and its sensitive corporate information. Companies with widespread offices may find that a VPN is a more cost-effective option than creating a network using purchased networking equipment and leasing expensive private lines. This type of private network is more limited than a VPN, because it doesn’t allow authorized users to connect to the corporate network when they are at home or traveling.

As Exhibit 13.4 shows, the VPN uses existing internet infrastructure and equipment to connect remote users and offices almost anywhere in the world—without long-distance charges. In addition to saving on telecommunications costs, companies using VPNs don’t have to buy or maintain special networking equipment and can outsource management of remote access equipment. VPNs are useful for salespeople and telecommuters, who can access the company’s network as if they were on-site at the company’s office. On the downside, the VPN’s availability and performance, especially when it uses the internet, depends on factors largely outside of an organization’s control.

VPNs are popular with many different types of organizations. Why? Security is one of the main reasons to always use a VPN to access the internet. Because all your data is encrypted once tunneled, if a hacker were trying to intercept your browsing activity, say, while you were entering your credit card number to make an online purchase, the encryption would stymie their efforts. That’s why it’s a particularly good idea to use VPNs in public settings such as coffee shops and airports.8

Software on Demand: Application Service Providers

As software developers release new types of application programs and updated versions of existing ones every year or two, companies have to analyze whether they can justify buying or upgrading to the new software—in terms of both cost and implementation time. Application service providers (ASP) offer a different approach to this problem. Companies subscribe, usually on a monthly basis, to an ASP and use the applications much like you’d use telephone voice mail, the technology for which resides at the phone company. Other names for ASPs include on-demand software, hosted applications, and software-as-a-service. Exhibit 13.5 shows how the ASP interfaces with software and hardware vendors and developers, the IT department, and users.

 
A diagram shows a V P N. An arrow points from a computer, labeled as a V P N client, to a local I S P server. An arrow points from the local I S P to a public network, shown as a cloud. An arrow points from the cloud to a large V P N server, with an internal L A N.
Exhibit 13.4 Virtual Private Networks (VPNs) (Attribution: Copyright Rice University, OpenStax, under CC BY 4.0 license.)

The simplest ASP applications are automated—for example, a user might use one to build a simple e-commerce site. ASPs provide three major categories of applications to users:

  • Enterprise applications, including customer relationship management (CRM), enterprise resource planning, e-commerce, and data warehousing
  • Collaborative applications for internal communications, e-mail, groupware, document creation, and management messaging
  • Applications for personal use—for example, games, entertainment software, and home-office applications

According to recent surveys, more companies are currently using an ASP, and even moving their legacy systems to the cloud. Estimates suggest revenues from subscriptions to on-demand cloud services were about $180 billion in 2017. This sector is growing much more rapidly—three times faster—than traditional hardware and software.9 As this market grows, more companies are adding on-demand offerings to their traditional software packages. Amazon (Amazon Web Services), IBM, Microsoft, and Salesforce.com are among the leading cloud service providers.10

Until recently, many companies were reluctant to outsource critical enterprise applications to third-party providers. As ASPs improved their technologies and proved to be reliable and cost-effective, attitudes have changed. Companies, both large and small, seek cost advantages such as the convenience ASPs provide. The basic idea behind subscribing to an ASP is compelling. Users can access any of their applications and data from any computer, and IT can avoid purchasing, installing, supporting, and upgrading expensive software applications. ASPs buy and maintain the software on their servers and distribute it through high-speed networks. Subscribers rent the applications they want for a set period of time and price. The savings in licensing fees, infrastructure, time, and staff are significant.

 
A diagram shows that a software vendor, hardware vendor, and developers all flow into an A S P, which then flows into an audience of users. Between the A S P and the users is the I T department.
Exhibit 13.5 Structure of an ASP Relationship (Attribution: Copyright Rice University, OpenStax, under CC BY 4.0 license.)

Managed service providers (MSP) represent the next generation of ASPs, offering greater customization and expanded capabilities that include business processes and complete management of the network servers. The global market for managed IT services reached $149.1 billion in 2016. This market is estimated to reach $256.5 billion in 2021, from $166.7 billion in 2017, at a compound annual growth rate of 11.5 percent for the period 2018 through 2021.11

Concept Check

  1. What is a computer network? What benefits do companies gain by using networks?
  2. How do a LAN and a WAN differ? Why would a company use a wireless network?
  3. What advantages do VPNs offer a company? What about the cloud, ASPs, and MSPs?

13.3 Management Information Systems

Learning Objectives

What types of systems make up a typical company’s management information system?

Whereas individuals use business productivity software such as word processing, spreadsheet, and graphics programs to accomplish a variety of tasks, the job of managing a company’s information needs falls to management information systems: users, hardware, and software that support decision-making. Information systems collect and store the company’s key data and produce the information managers need for analysis, control, and decision-making.

Factories use computer-based information systems to automate production processes and order and monitor inventory. Most companies use them to process customer orders and handle billing and vendor payments. Banks use a variety of information systems to process transactions such as deposits, ATM withdrawals, and loan payments. Most consumer transactions also involve information systems. When you check out at the supermarket, book a hotel room online, or download music over the internet, information systems record and track the transaction and transmit the data to the necessary places.

Companies typically have several types of information systems, starting with systems to process transactions. Management support systems are dynamic systems that allow users to analyze data to make forecasts, identify business trends, and model business strategies. Office automation systems improve the flow of communication throughout the organization. Each type of information system serves a particular level of decision-making: operational, tactical, and strategic. Exhibit 13.6 shows the relationship between transaction processing and management support systems as well as the management levels they serve. Let’s take a more detailed look at how companies and managers use transaction processing and management support systems to manage information.

Transaction Processing Systems

A firm’s integrated information system starts with its transaction processing system (TPS). The TPS receives raw data from internal and external sources and prepares these data for storage in a database similar to a microcomputer database but vastly larger. In fact, all the company’s key data are stored in a single huge database that becomes the company’s central information resource. As noted earlier, the database management system tracks the data and allows users to query the database for the information they need.

 
The Operational manager’s domain is where internal and external data sources flow into a transaction processing system. This flows into an internal data base, and now is in the overlap domain of operational managers and middle managers. There are 4 branches from the internal database. First, information reporting system. The next 3 branches are overlapped by middle managers and top executives. Second branch goes to expert systems, and to suggested decisions. Third branch goes to decision support, then to possible solutions, under top executives only. The fourth branch goes to executive information systems, which are fed by external databases, and are top executive domain.
Exhibit 13.6 A Company’s Integrated Information System (Attribution: Copyright Rice University, OpenStax, under CC BY 4.0 license.)

The database can be updated in two ways: batch processing, where data are collected over some time period and processed together, and online, or real-time, processing, which processes data as they become available. Batch processing uses computer resources very efficiently and is well-suited to applications such as payroll processing that require periodic rather than continuous processing. Online processing keeps the company’s data current. When you make an airline reservation, the information is entered into the airline’s information system, and you quickly receive confirmation, typically through an e-mail. Online processing is more expensive than batch processing, so companies must weigh the cost versus the benefit. For example, a factory that operates around the clock may use real-time processing for inventory and other time-sensitive requirements but process accounting data in batches overnight.

Decisions, Decisions: Management Support Systems

Transaction processing systems automate routine and tedious back-office processes such as accounting, order processing, and financial reporting. They reduce clerical expenses and provide basic operational information quickly. Management support systems (MSS) use the internal master database to perform high-level analyses that help managers make better decisions.

Information technologies such as data warehousing are part of more advanced MSSs. A data warehouse combines many databases across the whole company into one central database that supports management decision-making. With a data warehouse, managers can easily access and share data across the enterprise to get a broad overview rather than just isolated segments of information. Data warehouses include software to extract data from operational databases, maintain the data in the warehouse, and provide data to users. They can analyze data much faster than transaction-processing systems. Data warehouses may contain many data marts, special subsets of a data warehouse that each deal with a single area of data. Data marts are organized for quick analysis.

Companies use data warehouses to gather, secure, and analyze data for many purposes, including customer relationship management systems, fraud detection, product-line analysis, and corporate asset management. Retailers might wish to identify customer demographic characteristics and shopping patterns to improve direct-mailing responses. Banks can more easily spot credit-card fraud, as well as analyze customer usage patterns.

According to Forrester Research, about 60 percent of companies with $1 billion or more in revenues use data warehouses as a management tool. Union Pacific (UP), a $19 billion railroad, turned to data warehouse technology to streamline its business operations. By consolidating multiple separate systems, UP achieved a unified supply-chain system that also enhanced its customer service. “Before our data warehouse came into being we had stovepipe systems,” says Roger Bresnahan, principal engineer. “None of them talked to each other. . . . We couldn’t get a whole picture of the railroad.”

UP’s data warehouse system took many years and the involvement of 26 departments to create. The results were well worth the effort: UP can now make more accurate forecasts, identify the best traffic routes, and determine the most profitable market segments. The ability to predict seasonal patterns and manage fuel costs more closely has saved UP millions of dollars by optimizing locomotive and other asset utilization and through more efficient crew management. In just three years, Bresnahan reports, the data warehouse system had paid for itself.12

At the first level of an MSS is an information-reporting system, which uses summary data collected by the TPS to produce both regularly scheduled and special reports. The level of detail would depend on the user. A company’s payroll personnel might get a weekly payroll report showing how each employee’s paycheck was determined. Higher-level managers might receive a payroll summary report that shows total labor cost and overtime by department and a comparison of current labor costs with those in the prior year. Exception reports show cases that fail to meet some standard. An accounts receivable exception report that lists all customers with overdue accounts would help collection personnel focus their work. Special reports are generated only when a manager requests them; for example, a report showing sales by region and type of customer can highlight reasons for a sales decline.

Decision Support Systems

A decision support system (DSS) helps managers make decisions using interactive computer models that describe real-world processes. The DSS also uses data from the internal database but looks for specific data that relate to the problems at hand. It is a tool for answering “what if” questions about what would happen if the manager made certain changes. In simple cases, a manager can create a spreadsheet and try changing some of the numbers. For instance, a manager could create a spreadsheet to show the amount of overtime required if the number of workers increases or decreases. With models, the manager enters into the computer the values that describe a particular situation, and the program computes the results. Marketing executives at a furniture company could run DSS models that use sales data and demographic assumptions to develop forecasts of the types of furniture that would appeal to the fastest-growing population groups.

Companies can use a predictive analytics program to improve their inventory management system and use big data to target customer segments for new products and line extensions.

 
A photograph shows a doctor in a recover room, standing beside a patient.
Exhibit 13.7 Decision support systems help businesses by providing quantitative data and predictive models that aid problem-solving and decision-making. Now the health-care industry wants this technology in hospitals to improve the practice of medicine. Spearheading the effort for a clinical decision-support system is the American Medical Informatics Association, which believes a national DSS could help physicians with diagnosing and treating illnesses. What are the pros and cons to having medical professionals rely on a DSS for help in treating patients? (Credit: Axelle Geelen/ flickr/ Attribution 2.0 Generic (CC BY 2.0))

Executive Information Systems

Although similar to a DSS, an executive information system (EIS) is customized for an individual executive. These systems provide specific information for strategic decisions. For example, a CEO’s EIS may include special spreadsheets that present financial data comparing the company to its principal competitors and graphs showing current economic and industry trends.

Expert Systems

An expert system gives managers advice similar to what they would get from a human consultant. Artificial intelligence enables computers to reason and learn to solve problems in much the same way humans do, using what-if reasoning. Although they are expensive and difficult to create, expert systems are finding their way into more companies as more applications are found. Lower-end expert systems can even run on mobile devices. Top-of-the-line systems help airlines appropriately deploy aircraft and crews, critical to the carriers’ efficient operations. The cost of hiring enough people to do these ongoing analytical tasks would be prohibitively expensive. Expert systems have also been used to help explore for oil, schedule employee work shifts, and diagnose illnesses. Some expert systems take the place of human experts, whereas others assist them.

Concept Check

  1. What are the main types of management information systems, and what does each do?
  2. Differentiate between the types of management support systems, and give examples of how companies use each.

13.4 Technology Management and Planning

Learning Objectives

How can technology management and planning help companies optimize their information technology systems?

With the help of computers, people have produced more data in the last 30 years than in the previous 5,000 years combined. Companies today make sizable investments in information technology to help them manage this overwhelming amount of data, convert the data into knowledge, and deliver it to the people who need it. In many cases, however, the companies do not reap the desired benefits from these expenditures. Among the typical complaints from senior executives are that the company is spending too much and not getting adequate performance and payoff from IT investments, these investments do not relate to business strategy, the firm seems to be buying the latest technology for technology’s sake, and communications between IT specialists and IT users are poor.

Optimize IT!

Managing a company’s enterprise-wide IT operations, especially when those often stretch across multiple locations, software applications, and systems, is no easy task. IT managers must deal not only with on-site systems; they must also oversee the networks and other technology, such as mobile devices that handle e-mail messaging, that connect staff working at locations ranging from the next town to another continent. At the same time, IT managers face time constraints and budget restrictions, making their jobs even more challenging.

Growing companies may find themselves with a decentralized IT structure that includes many separate systems and duplication of efforts. A company that wants to enter or expand into e-commerce needs systems flexible enough to adapt to this changing marketplace. Security for equipment and data is another critical area, which we will cover later in the chapter.

The goal is to develop an integrated, company-wide technology plan that balances business judgment, technology expertise, and technology investment. IT planning requires a coordinated effort among a firm’s top executives, IT managers, and business-unit managers to develop a comprehensive plan. Such plans must take into account the company’s strategic objectives and how the right technology will help managers reach those goals.

Technology management and planning go beyond buying new technology. Today companies are cutting IT budgets so that managers are being asked to do more with less. They are implementing projects that leverage their investment in the technology they already have, finding ways to maximize efficiency and optimize utilization.

Managing Knowledge Resources

As a result of the proliferation of information, we are also seeing a major shift from information management to a broader view that focuses on finding opportunities in and unlocking the value of intellectual rather than physical assets. Whereas information management involves collecting, processing, and condensing information, the more difficult task of knowledge management (KM) focuses on researching, gathering, organizing, and sharing an organization’s collective knowledge to improve productivity, foster innovation, and gain competitive advantage. Some companies are even creating a new position, chief knowledge officer, to head up this effort.13

Companies use their IT systems to facilitate the physical sharing of knowledge. But better hardware and software are not the answer to KM. KM is not technology-based, but rather a business practice that uses technology. Technology alone does not constitute KM, nor is it the solution to KM. Rather, it facilitates KM. Executives with successful KM initiatives understand that KM is not a matter of buying a major software application that serves as a data depository and coordinates all of a company’s intellectual capital. According to Melinda Bickerstaff, vice president of knowledge management at Bristol-Myers Squibb (BMS), any such “leading with technology” approach is a sure path to failure. “Knowledge management has to be perceived as a business problem solver, not as an abstract concept,” Bickerstaff explains.

Effective KM calls for an interdisciplinary approach that coordinates all aspects of an organization’s knowledge. It requires a major change in behavior as well as technology to leverage the power of information systems, especially the internet, and a company’s human capital resources. The first step is creating an information culture through organizational structure and rewards that promotes a more flexible, collaborative way of working and communicating. Moving an organization toward KM is no easy task, but it is well worth the effort in terms of creating a more collaborative environment, reducing duplication of effort, and increasing shared knowledge. The benefits can be significant in terms of growth, time, and money.

At Bristol-Meyers Squibb, a major pharmaceutical company, Bickerstaff began the KM implementation by looking for specific information-related problems to solve so that the company would save time and/or money. For example, she learned that company scientists were spending about 18 percent of their time searching multiple databases to find patents and other information. Simply integrating the relevant databases gave researchers the ability to perform faster searches. A more complex project involved compiling the best practices of drug-development teams with the best FDA approval rates so that other groups could benefit. Rather than send forms that could be easily set aside, Bickenstaff arranged to conduct interviews and lessons-learned sessions. The information was then developed into interesting articles rather than dry corporate reports.14

Technology Planning

A good technology plan provides employees with the tools they need to perform their jobs at the highest levels of efficiency. The first step is a general needs assessment, followed by a ranking of projects and the specific choices of hardware and software. Table 13.3 poses some basic questions departmental managers and IT specialists should ask when planning technology purchases.

Questions for IT Project Planning
  • What are the company’s overall objectives?
  • What problems does the company want to solve?
  • How can technology help meet those goals and solve the problems?
  • What are the company’s IT priorities, both short- and long-term?
  • What type of technology infrastructure (centralized or decentralized) best serves the company’s needs?
  • Which technologies meet the company’s requirements?
  • Are additional hardware and software required? If so, will they integrate with the company’s existing systems?
  • Does the system design and implementation include the people and process changes, in addition to the technological ones?
  • Do you have the in-house capabilities to develop and implement the proposed applications, or should you bring in an outside specialist?
Table 13.3

Once managers identify the projects that make business sense, they can choose the best products for the company’s needs. The final step is to evaluate the potential benefits of the technology in terms of efficiency and effectiveness. For a successful project, you must evaluate and restructure business processes, choose technology, develop and implement the system, and manage the change processes to best serve your organizational needs. Installing a new IT system on top of inefficient business processes is a waste of time and money!

Concept Check

  1. What are some ways a company can manage its technology assets to its advantage?
  2. Differentiate between information management and knowledge management. What steps can companies take to manage knowledge?
  3. List the key questions managers need to ask when planning technology purchases.

13.5 Protecting Computers and Information

Learning Objectives

What are the best ways to protect computers and the information they contain?

Have you ever lost a term paper you worked on for weeks because your hard drive crashed or you deleted the wrong file? You were upset, angry, and frustrated. Multiply that paper and your feelings hundreds of times over, and you can understand why companies must protect computers, networks, and the information they store and transmit from a variety of potential threats. For example, security breaches of corporate information systems—from human hackers or electronic versions such as viruses and worms—are increasing at an alarming rate. The ever-increasing dependence on computers requires plans that cover human error, power outages, equipment failure, hacking, and terrorist attacks. To withstand natural disasters such as major fires, earthquakes, and floods, many companies install specialized fault-tolerant computer systems.

Disasters are not the only threat to data. A great deal of data, much of it confidential, can easily be tapped or destroyed by anyone who knows about computers. Keeping your networks secure from unauthorized access—from internal as well as external sources—requires formal security policies and enforcement procedures. The increasing popularity of mobile devices—laptops, tablets, and cell phones—and wireless networks requires new types of security provisions.

In response to mounting security concerns, companies have increased spending on technology to protect their IT infrastructure and data. Along with specialized hardware and software, companies need to develop specific security strategies that take a proactive approach to prevent security and technical problems before they start. However, a recent CIO article lamented the lack of basic security policies that companies only implement after a hack or data crisis.15

Data Security Issues

Unauthorized access into a company’s computer systems can be expensive, and not just in monetary terms. Juniper Networks estimates that cybercrime will cost businesses more than $2 trillion in 2019, compared to just $450 million in 2001. The most costly categories of threats include worms, viruses, and Trojan horses (defined later in this section); computer theft; financial fraud; and unauthorized network access. The report also states that almost all U.S. businesses report at least one security issue, and almost 20 percent have experienced multiple security incidents.16

Computer crooks are becoming more sophisticated all the time, finding new ways to get into ultra-secure sites. “As companies and consumers continue to move towards a networked and information economy, more opportunity exists for cybercriminals to take advantage of vulnerabilities on networks and computers,” says Chris Christiansen, program vice president at technology research firm IDC.17 Whereas early cybercrooks were typically amateur hackers working alone, the new ones are more professional and often work in gangs to commit large-scale internet crimes for large financial rewards. The internet, where criminals can hide behind anonymous screen names, has increased the stakes and expanded the realm of opportunities to commit identity theft and similar crimes. Catching such cybercriminals is difficult, and fewer than 5 percent are caught.18

 
A photograph shows a laptop with streaming numbers on its screen, and a big red lock icon.
Exhibit 13.8 Data security is under constant attack. In 2017, cybercriminals penetrated Equifax, one of the largest credit bureaus in the nation, and stole the personal data of more than 145 million people. To date, it is considered one of the worst data breaches of all time because of the amount of sensitive data stolen, including consumers’ Social Security numbers. What impact do identity theft and other data-security issues have on global networking and e-commerce? (Credit: Blogtrepreneur/ flickr/ Attribution 2.0 Generic (CC BY 2.0))

Firms are taking steps to prevent these costly computer crimes and problems, which fall into several major categories:

  • Unauthorized access and security breaches. Whether from internal or external sources, unauthorized access and security breaches are a top concern of IT managers. These can create havoc with a company’s systems and damage customer relationships. Unauthorized access also includes employees, who can copy confidential new-product information and provide it to competitors or use company systems for personal business that may interfere with systems operation. Networking links also make it easier for someone outside the organization to gain access to a company’s computers.

    One of the latest forms of cybercrime involves secretly installing keylogging software via software downloads, e-mail attachments, or shared files. This software then copies and transmits a user’s keystrokes—passwords, PINs, and other personal information—from selected sites, such as banking and credit card sites, to thieves.

  • Computer viruses, worms, and Trojan horses. Computer viruses and related security problems such as worms and Trojan horses are among the top threats to business and personal computer security. A computer program that copies itself into other software and can spread to other computer systems, a computer virus can destroy the contents of a computer’s hard drive or damage files. Another form is called a worm because it spreads itself automatically from computer to computer. Unlike a virus, a worm doesn’t require e-mail to replicate and transmit itself into other systems. It can enter through valid access points.

    Trojan horses are programs that appear to be harmless and from legitimate sources but trick the user into installing them. When run, they damage the user’s computer. For example, a Trojan horse may claim to get rid of viruses but instead infects the computer. Other forms of Trojan horses provide a “trapdoor” that allows undocumented access to a computer, unbeknownst to the user. Trojan horses do not, however, infect other files or self-replicate.19

    Viruses can hide for weeks, months, or even years before starting to damage information. A virus that “infects” one computer or network can be spread to another computer by sharing disks or by downloading infected files over the internet. To protect data from virus damage, virus protection software automatically monitors computers to detect and remove viruses. Program developers make regular updates available to guard against newly created viruses. In addition, experts are becoming more proficient at tracking down virus authors, who are subject to criminal charges.

  • Deliberate damage to equipment or information. For example, an unhappy employee in the purchasing department could get into the company’s computer system and delete information on past orders and future inventory needs. The sabotage could severely disrupt production and the accounts payable system. Willful acts to destroy or change the data in computers are hard to prevent. To lessen the damage, companies should back up critical information.
  • Spam. Although you might think that spam, or unsolicited and unwanted e-mail, is just a nuisance, it also poses a security threat to companies. Viruses spread through e-mail attachments that can accompany spam e-mails. Spam is now clogging blogs, instant messages, and cell phone text messages as well as e-mail inboxes. Spam presents other threats to a corporation: lost productivity and expenses from dealing with spam, such as opening the messages and searching for legitimate messages that special spam filters keep out.
  • Software and media piracy. The copying of copyrighted software programs, games, and movies by people who haven’t paid for them is another form of unauthorized use. Piracy, defined as using software without a license, takes revenue away from the company that developed the program—usually at great cost. It includes making counterfeit CDs to sell as well as personal copying of software to share with friends.

Preventing Problems

Creating formal written information security policies to set standards and provide the basis for enforcement is the first step in a company’s security strategy. Unfortunately, a recent survey of IT executives worldwide revealed that over two-thirds expect a cyberattack in the near future. Stephanie Ewing, a data security expert, states, “Having a documented, tested process brings order to chaotic situations and keeps everyone focused on solving the most pressing issues.” Without information security strategies in place, companies spend too much time in a reactive mode—responding to crises—and don’t focus enough on prevention.20

Security plans should have the support of top management, and then follow with procedures to implement the security policies. Because IT is a dynamic field with ongoing changes to equipment and processes, it’s important to review security policies often. Some security policies can be handled automatically, by technical measures, whereas others involve administrative policies that rely on humans to perform them. Examples of administrative policies are “Users must change their passwords every 90 days” and “End users will update their virus signatures at least once a week.” Table 13.4 shows the types of security measures companies use to protect data.

Five Areas of Concern Regarding the Protection of Data
Percentage Concern for Protecting Data
52 Aren’t sure how to secure connected devices and apps
40 Don’t immediately change default passwords
33 Don’t think they can control how companies collect personal information
33 Parents admit they don’t know the risks well enough to explain to children
37 Use credit-monitoring services
Table 13.4 Source: Adapted from Tony Bradley, “Top 5 Concerns to Focus on for Privacy Day,” Forbes, https://forbes.com, January 27, 2017.

Preventing costly problems can be as simple as regularly backing up applications and data. Companies should have systems in place that automatically back up the company’s data every day and store copies of the backups off-site. In addition, employees should back up their own work regularly. Another good policy is to maintain a complete and current database of all IT hardware, software, and user details to make it easier to manage software licenses and updates and diagnose problems. In many cases, IT staff can use remote access technology to automatically monitor and fix problems, as well as update applications and services.

Companies should never overlook the human factor in the security equation. One of the most common ways that outsiders get into company systems is by posing as an employee, first getting the staffer’s full name and username from an e-mail message and then calling the help desk to ask for a forgotten password. Crooks can also get passwords by viewing them on notes attached to a desk or computer monitor, using machines that employees leave logged on when they leave their desks, and leaving laptop computers with sensitive information unsecured in public places.

Portable devices, from handheld computers to tiny plug-and-play flash drives and other storage devices (including mobile phones), pose security risks as well. They are often used to store sensitive data such as passwords, bank details, and calendars. Mobile devices can spread viruses when users download virus-infected documents to their company computers.

Imagine the problems that could arise if an employee saw a calendar entry on a mobile device like “meeting re: layoffs,” an outsider saw “meeting about merger with ABC Company,” or an employee lost a flash drive containing files about marketing plans for a new product. Manufacturers are responding to IT managers’ concerns about security by adding password protection and encryption to flash drives. Companies can also use flash drive monitoring software that prevents unauthorized access on PCs and laptops.

Companies have many ways to avoid an IT meltdown, as Table 13.5 describes.

Procedures to Protect IT Assets
  • Develop a comprehensive plan and policies that include portable as well as fixed equipment.
  • Protect the equipment itself with stringent physical security measures to the premises.
  • Protect data using special encryption technology to encode confidential information so only the recipient can decipher it.
  • Stop unwanted access from inside or outside with special authorization systems. These can be as simple as a password or as sophisticated as fingerprint or voice identification.
  • Install firewalls, hardware or software designed to prevent unauthorized access to or from a private network.
  • Monitor network activity with intrusion-detection systems that signal possible unauthorized access, and document suspicious events.
  • Conduct periodic IT audits to catalog all attached storage devices as well as computers.
  • Use technology that monitors ports for unauthorized attached devices and turn off those that are not approved for business use.
  • Train employees to troubleshoot problems in advance, rather than just react to them.
  • Hold frequent staff-training sessions to teach correct security procedures, such as logging out of networks when they go to lunch and changing passwords often.
  • Make sure employees choose sensible passwords, at least six and ideally eight characters long, containing numbers, letters, and punctuation marks. Avoid dictionary words and personal information.
  • Establish a database of useful information and FAQ (frequently asked questions) for employees so they can solve problems themselves.
  • Develop a healthy communications atmosphere.
Table 13.5

Keep IT Confidential: Privacy Concerns

The very existence of huge electronic file cabinets full of personal information presents a threat to our personal privacy. Until recently, our financial, medical, tax, and other records were stored in separate computer systems. Computer networks make it easy to pool these data into data warehouses. Companies also sell the information they collect about you from sources like warranty registration cards, credit-card records, registration at websites, personal data forms required to purchase online, and grocery store discount club cards. Telemarketers can combine data from different sources to create fairly detailed profiles of consumers.

The September 11, 2001, tragedy and other massive security breaches have raised additional privacy concerns. As a result, the government began looking for ways to improve domestic-intelligence collection and analyze terrorist threats within the United States. Sophisticated database applications that look for hidden patterns in a group of data, a process called data mining, increase the potential for tracking and predicting people’s daily activities. Legislators and privacy activists worry that such programs as this and ones that eavesdrop electronically could lead to excessive government surveillance that encroaches on personal privacy. The stakes are much higher as well: errors in data mining by companies in business may result in a consumer being targeted with inappropriate advertising, whereas a governmental mistake in tracking suspected terrorists could do untold damage to an unjustly targeted person.

Increasingly, consumers are fighting to regain control of personal data and how that information is used. Privacy advocates are working to block sales of information collected by governments and corporations. For example, they want to prevent state governments from selling driver’s license information and supermarkets from collecting and selling information gathered when shoppers use barcoded plastic discount cards. With information about their buying habits, advertisers can target consumers for specific marketing programs.

The challenge to companies is to find a balance between collecting the information they need while at the same time protecting individual consumer rights. Most registration and warranty forms that ask questions about income and interests have a box for consumers to check to prevent the company from selling their names. Many companies now state in their privacy policies that they will not abuse the information they collect. Regulators are taking action against companies that fail to respect consumer privacy.

Concept Check

  1. Describe the different threats to data security.
  2. How can companies protect information from destruction and unauthorized use?
  3. Why are privacy rights advocates alarmed over the use of techniques such as data warehouses and data mining?

13.6 Trends in Information Technology

Learning Objectives

What are the leading trends in information technology?

Information technology is a continually evolving field. The fast pace and amount of change, coupled with IT’s broad reach, make it especially challenging to isolate industry trends. From the time we write this chapter to the time you read it—as little as six months—new trends will appear, and those that seemed important may fade. However, some trends that are reshaping today’s IT landscape are digital forensics, the shift to a distributed workforce, and the increasing use of grid computing.

Cyber Sleuthing: A New Style of Crime Busting

What helped investigators bring suit against Enron, Merck’s Vioxx medication, and the BTK serial killer? Digital evidence taken from an individual’s computer or corporate network—web pages, pictures, documents, and e-mails are part of a relatively new science called digital forensics. Digital-forensics software safeguards electronic evidence used in investigations by creating a duplicate of a hard drive that an investigator can search by keyword, file type, or access date. Digital forensics is also evolving into areas such as cloud computing and blockchain technology. For instance, it is estimated that as much as 3.9 million of the original 21 million bitcoins are “lost” on hard drives confined to landfills and flash drives located in the back of old office desks.21

But nowadays, digital sleuthing is not limited to law enforcement. Companies such as Walmart, Target, and American Express have their own secret in-house digital forensics teams. And what if you’re in New York and need to seize a hard drive in Hong Kong? No problem. Over 75 members of the Fortune 500 now use technology that allows them to search hard drives remotely over their corporate networks. Digital forensics makes it possible to track down those who steal corporate data and intellectual property. Broadcom, a semiconductor chip designer, used computer forensics to investigate and apprehend former employees who were attempting to steal trade secrets. In the process, Broadcom gathered incriminating e-mails, including deleted documents, that gave it solid evidence to use the 2013 Federal Computer Fraud and Abuse Act to stop the former employees from starting up a rival firm.22

However, there is a downside to having these advanced capabilities. If this kind of software falls into the wrong hands, sophisticated hackers could access corporate networks and individual computers as easily as taking candy from a baby—and the victims would not even know it was happening. In an age of corporate wrongdoing, sexual predators, and computer porn, your hard drive will tell investigators everything they need to know about your behavior and interests, good and bad. Cybersleuthing means we are all potential targets of digital forensics. As evidenced by the huge increase in identity theft, personal privacy—once an unassailable right—is no longer as sacred as it once was.

Ethics in Practice

Unearthing Your Secrets

Cybercrimes in our technologically driven world are on the increase—identity theft, pornography, and sexual predator victim access, to name a few. The FBI’s computer analysis response team confirms their caseload includes 800 cases reported per day in 2017. To keep up with the changing world we live in, law enforcement, corporations, and government agencies have turned to new crime-fighting tools, one of the most effective being digital forensics.

The leader in this technology is Guidance Software, founded in 1997 to develop solutions that search, identify, recover, and deliver digital information in a forensically sound and cost-effective manner. Headquartered in Pasadena, California, the company employs 391 people at offices and training facilities in Chicago, Illinois; Washington, DC; San Francisco, California; Houston, Texas; New York City; and Brazil, England, and Singapore. The company’s more than 20,000 high-profile clients include leading police agencies, government investigation and law enforcement agencies, and Fortune 1000 corporations in the financial service, insurance, high-tech and consulting, health care, and utility industries.

Guidance Software’s suite of EnCase® solutions is the first computer forensics tool able to provide world-class electronic investigative capabilities for large-scale complex investigations. Law enforcement officers, government/corporate investigators, and consultants around the world can now benefit from computer forensics that exceed anything previously available. The software offers an investigative infrastructure that provides network-enabled investigations, enterprise-wide integration with other security technologies, and powerful search and collection tools. With EnCase, clients can conduct digital investigations, handle large-scale data collection needs, and respond to external attacks.

Notably, the company’s software was used by law enforcement in the Casey Anthony murder case and the Sony PlayStation security breach, and was used to examine data retrieved by the U.S. special forces in the Osama bin Laden raid.

Guidance Software also helps reduce corporate and personal liability when investigating computer-related fraud, intellectual property theft, and employee misconduct. It protects against network threats such as hackers, worms, and viruses and hidden threats such as malicious code.

In response to increases in the number and scope of discovery requests, Guidance Software developed its eDiscovery Suite. The software package dramatically improves the practice of large-scale discovery—the identification, collection, cataloging, and saving of evidence—required in almost every major legal case these days. eDiscovery integrates with other litigation-support software to significantly decrease the time for corporations to accomplish these tasks. At the same time, it improves regulatory compliance and reduces disruption. The result is many millions of dollars in cost savings. In late 2017, Guidance Software was acquired by OpenText, an enterprise information management company that employs more than 10,000 people worldwide.

Sources: FBI website, https://www.fbi.gov, accessed January 15, 2018; Guidance Software website, https://www.guidancesoftware.com, accessed January 15, 2018; OpenText website, https://www.opentext.com, accessed January 15, 2018; “Casey Anthony: The Computer Forensics,” The State v Casey Anthony website, https://statevcasey.wordpress.com, July 18, 2011; Declan McCullagh, “Finding Treasures in Bin Laden Computers,” CBS News, https://www.cbsnews.com, May 6, 2011; Evan Narcisse, “Who’s Cleaning Up the PSN Debacle for Sony?” Time, http://techland.time.com, May 4, 2011.

Critical Thinking Questions
  1. How is Guidance Software responding to and helping to manage changes in our technology-driven world?
  2. What other types of forensics software do you foresee a need for in the future? Do you think there are ethical issues in using forensics software, and why?
  3. What are the benefits and risks of Guidance Software being acquired by a larger company?

The Distributed Workforce

Insurance company Aetna shuttered 2.7 million square feet of office space, saving the company $78 million, while American Express estimates it saved between $10 to $15 million dollars per year by expanding its distributed workforce. Was this a sign that these companies were in trouble? Far from it. Instead of maintaining expensive offices in multiple locations, they sent employees home to work and adopted a new model for employees: the distributed workforce. Employees have no permanent office space and work from home or on the road. The shift to virtual workers has been a huge success, and not only do companies save on their personnel and related costs, but they also have happier, more productive employees.

Aetna and American Express are not alone in recognizing the benefits of distributed workers, especially in companies that depend on knowledge workers. Work Design Collaborative LLC in Prescott, Arizona, estimates that about 12 percent of all workers in the United States fall into this category, and in urban areas the number could be as high as 15 percent. There are estimates that this trend could eventually reach 40 percent over the next decade, as long commutes, high gas costs, and better connecting tools and technologies make this an attractive option for many workers who like the flexibility of not working in an office.23 Already, employees use the internet to conduct video-conferenced meetings and collaborate on teams that span the globe. On the downside, working from home can also mean being available 24/7—although most workers consider the trade-off well worth it.

According to recent statistics, close to four million U.S. workers work from home at least half of the time. Remote workers continue to be recruited by companies of all sizes, including Amazon, Dell, Salesforce, and others.24 Intel has a successful virtual-work program that has been popular with working parents. “Technology allows working remotely to be completely invisible,” says Laura Dionne, the company’s director of supply-chain transformation. At Boeing, thousands of employees participate in the virtual-work program, and it has been a critical factor in attracting and retaining younger workers. Almost half of Sun Microsystems’ employees are “location-independent,” reducing real estate costs by $300 million. Additional benefits for Sun are higher productivity from these workers and the ability to hire the best talent. “Our people working these remote schedules are the happiest employees we have, and they have the lowest attrition rates,” says Bill MacGowan, senior vice president for human resources at Sun. “Would I rather settle on someone mediocre in the Bay Area, or get the best person in the country who is willing to work remotely?”25

Grid and Cloud Computing Offer Powerful Solutions

How can smaller companies that occasionally need to perform difficult and large-scale computational tasks find a way to accomplish their projects? They can turn to grid or cloud computing, also called utility computing or peer-to-peer computing. Cloud and grid technology provides a way to divide the job into many smaller tasks and distribute them to a virtual supercomputer consisting of many small computers linked into a common network. Combining multiple desktop machines results in computing power that exceeds supercomputer speeds. A hardware and software infrastructure clusters and integrates computers and applications from multiple sources, harnessing unused power in existing PCs and networks. This structure distributes computational resources but maintains central control of the process. A central server acts as a team leader and traffic monitor. The controlling cluster server divides a task into subtasks, assigns the work to computers on the grid with surplus processing power, combines the results, and moves on to the next task until the job is finished. Exhibit 13.9 shows how typical grid and cloud setups work, and the differences between the two.

 
In grid computing, a task is sent to a control server, then bounced back and forth between servers around the globe. With cloud computing, multiple devices, such as laptops, cell phones, networks, all connect to a single cloud source.
Exhibit 13.9 How Grid and Cloud Computing Work (Attribution: Copyright Rice University, OpenStax, under CC BY 4.0 license.)

With utility computing, any company—large or small—can access the software and computer capacity on an as-needed basis. One of the big advantages of cloud computing is that companies can update their inventory in real time across their entire organization. For example, suppose you are an appliance retailer and have several outlets throughout the Midwest. If you have one model of a Whirlpool washing machine in your Des Moines, Iowa, store, and a salesperson in your Chicago location can sell that model in Chicago, the sale can be accomplished pretty easily. They can finalize the sale, create the shipping instructions, and update the inventory record automatically—and the Chicago consumer’s needs will be met.26

Amazon, Google, IBM, Salesforce.com, Oracle, and Hewlett-Packard Enterprise are among the companies providing as-needed cloud and grid services. Although cloud and grid computing appears similar to outsourcing or on-demand software from ASPs, it has two key differences:

  • Pricing is set per-use, whereas outsourcing involves fixed-price contracts.
  • Cloud and grid computing goes beyond hosted software and includes computer and networking equipment as well as services.

The cloud and grids provide a very cost-effective way to provide computing power for complex projects in areas such as weather research and financial and biomedical modeling. Because the computing infrastructure already exists—they tap into computer capacity that is otherwise unused—the cost is quite low. The increased interest in cloud and grid technology will continue to contribute to high growth.

Concept Check

  1. How are companies and other organizations using digital forensics to obtain critical information?
  2. Why do companies find that productivity rises when they offer employees the option of joining the virtual workforce?
  3. What advantages do grid and cloud computing offer a company? What are some of the downsides to using this method?

Key Terms

application service providers (ASP)
A service company that buys and maintains software on its servers and distributes it through high-speed networks to subscribers for a set period and price.
batch processing
A method of updating a database in which data are collected over some time period and processed together.
chief information officer (CIO)
An executive with responsibility for managing all information resources in an organization.
cloud computing
A general term for the delivery of hosted services over the internet.
computer network
A group of two or more computer systems linked together by communications channels to share data and information.
computer virus
A computer program that copies itself into other software and can spread to other computer systems.
data mart
Special subset of a data warehouse that deals with a single area of data and is organized for quick analysis.
data mining
Sophisticated database applications that look for hidden patterns in a group of data to help track and predict future behavior.
data warehouse
An information technology that combines many databases across a whole company into one central database that supports management decision-making.
database
An electronic filing system that collects and organizes data and information.
decision support system (DSS)
A management support system that helps managers make decisions using interactive computer models that describe real-world processes.
enterprise portal
A customizable internal website that provides proprietary corporate information to a defined user group, such as employees, supply-chain partners, or customers.
executive information system (EIS)
A management support system that is customized for an individual executive; provides specific information for strategic decisions.
expert system
A management support system that gives managers advice similar to what they would get from a human consultant; it uses artificial intelligence to enable computers to reason and learn to solve problems in much the same way humans do.
information technology (IT)
The equipment and techniques used to manage and process information.
intranet
An internal corporate-wide area network that uses internet technology to connect computers and link employees in many locations and with different types of computers.
knowledge management (KM)
The process of researching, gathering, organizing, and sharing an organization’s collective knowledge to improve productivity, foster innovation, and gain competitive advantage.
knowledge worker
A worker who develops or uses knowledge, contributing to and benefiting from information used to perform planning, acquiring, searching, analyzing, organizing, storing, programming, producing, distributing, marketing, or selling functions.
local area network (LAN)
A network that connects computers at one site, enabling the computer users to exchange data and share the use of hardware and software from a variety of computer manufacturers.
managed service providers (MSP)
Next generation of ASPs, offering customization and expanded capabilities such as business processes and complete management of the network servers.
management information system (MIS)
The methods and equipment that provide information about all aspects of a firm’s operations.
management support system (MSS)
An information system that uses the internal master database to perform high-level analyses that help managers make better decisions.
online (real-time) processing
A method of updating a database in which data are processed as they become available.
transaction processing system (TPS)
An information system that handles the daily business operations of a firm. The system receives and organizes raw data from internal and external sources for storage in a database using either batch or online processing.
virtual private networks (VPN)
Private corporate networks connected over a public network, such as the internet. VPNs include strong security measures to allow only authorized users to access the network.
wide area network (WAN)
A network that connects computers at different sites via telecommunications media such as phone lines, satellites, and microwaves.

Summary of Learning Outcomes

13.1 Transforming Businesses through Information

  1. How has information technology transformed business and managerial decision-making?

Businesses depend on information technology for everything from running daily operations to making strategic decisions. Companies must have management information systems that gather, analyze, and distribute information to the appropriate parties, including employees, suppliers, and customers. These systems are comprised of different types of computers that collect data and process it into usable information for decision-making. Managers tap into databases to access the information they need, whether for placing inventory orders, scheduling production, or preparing long-range forecasts. They can compare information about the company’s current status to its goals and standards. Company-wide enterprise resource planning systems that bring together human resources, operations, and technology are becoming an integral part of business strategy.

13.2 Linking Up: Computer Networks

  1. Why are computer networks an important part of today’s information technology systems?

Today companies use networks of linked computers that share data and expensive hardware to improve operating efficiency. Types of networks include local area networks, wide area networks, and wireless local area networks. Intranets are private WANs that allow a company’s employees to communicate quickly with one other and work on joint projects, regardless of their location. Companies are finding new uses for wireless technologies such as tablets, cell phones, and other mobile devices. Virtual private networks give companies a cost-effective secure connection between remote locations by using public networks such as the internet.

13.3 Management Information Systems

  1. What types of systems make up a typical company’s management information system?

A management information system consists of a transaction processing system, management support systems, and an office automation system. The transaction processing system collects and organizes operational data on the firm’s activities. Management support systems help managers make better decisions. They include an information-reporting system that provides information based on the data collected by the TPS to the managers who need it; decision support systems that use models to assist in answering “what if” types of questions; and expert systems that give managers advice similar to what they would get from a human consultant. Executive information systems are customized to the needs of top management.

13.4 Technology Management and Planning

  1. How can technology management and planning help companies optimize their information technology systems?

To get the most value from IT, companies must go beyond simply collecting and summarizing information. Technology planning involves evaluating the company’s goals and objectives and using the right technology to reach them. IT managers must also evaluate the existing infrastructure to get the best return on the company’s investment in IT assets. Knowledge management focuses on sharing an organization’s collective knowledge to improve productivity and foster innovation. Some companies establish the position of chief knowledge officer to head up KM activities.

13.5 Protecting Computers and Information

  1. What are the best ways to protect computers and the information they contain?

Because companies are more dependent on computers than ever before, they need to protect data and equipment from natural disasters and computer crime. Types of computer crime include unauthorized use and access, software piracy, malicious damage, and computer viruses. To protect IT assets, companies should prepare written security policies. They can use technology such as virus protection, firewalls, and employee training in proper security procedures. They must also take steps to protect customers’ personal privacy rights.

13.6 Trends in Information Technology

  1. What are the leading trends in information technology?

IT is a dynamic industry, and companies must stay current on the latest trends to identify ones that help them maintain their competitive edge, such as digital forensics, the distributed workforce, and grid computing. With digital forensics techniques, corporations, government agencies, attorneys, and lawmakers can obtain evidence from computers and corporate networks—web pages, pictures, documents, and e-mails. Many knowledge workers now work remotely rather than from an office. Companies adopting the distributed workforce model gain many benefits, such as cost savings, more satisfied and productive employees, and increased employee retention. Cloud computing harnesses the power of computers, online software, and data storage to create a virtual computing environment that is invisible to the user. A company can access the cloud on an as-needed basis instead of investing in its own supercomputer equipment. Outsourcing a portion of the company’s computing needs provides additional flexibility and cost advantages. Companies can also set up internal grids.

Preparing for Tomorrow’s Workplace Skills

  1. How has information technology changed your life? Describe at least three areas (both personal and school- or work-related) where having access to better information has improved your decisions. Are there any negative effects? What steps can you take to manage information better? (Information, Technology)
  2. Visit or conduct a phone interview with a local small-business owner about the different ways her or his firm uses information technology. Prepare a brief report on your findings that includes the hardware and software used, how it was selected, benefits of technology for the company, and any problems in implementing or using it. (Interpersonal, Information)
  3. Your school wants to automate the class-registration process. Prepare a memo to the dean of information systems describing an integrated information system that would help a student choose and register for courses. Make a list of the different groups that should be involved and questions to ask during the planning process. Include a graphic representation of the system that shows how the data become useful information. Indicate the information a student needs to choose courses and its sources. Explain how several types of management support systems could help students make better course decisions. Include ways the school could use the information it collects from this system. Have several students present their plans to the class, which will take the role of university management in evaluating them. (Resources, Systems, Technology)
  4. You recently joined the IT staff of a midsized consumer products firm. After a malicious virus destroys some critical files, you realize that the company lacks a security strategy and policies. Outline the steps you’d take to develop a program to protect data and the types of policies you’d recommend. How would you present the plan to management and employees to encourage acceptance? (Resources, Technology)
  5. Team Activity: Should companies outsource IT? Some executives believe that IT is too important to outsource and that application service providers don’t have a future. Yet spending for ASP subscriptions, MSPs, and other forms of IT outsourcing such as cloud computing continue to grow. What’s your position? Divide the class into groups designated “for” or “against” outsourcing and/or ASPs. Have them research the current status of ASPs using publications such as CIO and Computerworld and websites such as Enterprise Apps Today, http://www.enterpriseappstoday.com. (Interpersonal, Information)

Ethics Activity

As the owner of a small but growing business, you are concerned about employees misusing company computers for personal matters. Not only does this cost the company in terms of employee productivity, but it also ties up bandwidth that may be required for company operations and exposes the firm’s networks to increased risks of attacks from viruses, spyware, and other malicious programs. Installing e-mail monitoring and web security and filtering software programs would allow you to track e-mail and internet use, develop use policies, block access to inappropriate sites, and limit the time employees can conduct personal online business. At the same time, the software will protect your IT networks from many types of security concerns, from viruses to internet fraud. You are concerned, however, that employees will take offense and consider such software an invasion of privacy.

Using a web search tool, locate articles about this topic and then write responses to the following questions. Be sure to support your arguments and cite your sources.

Ethical Dilemma: Should you purchase employee-monitoring software for your company, and on what do you base your decision? If you install the software, do you have an obligation to tell employees about it? Explain your answers and suggest ways to help employees understand your rationale.

Sources: KC Agu, “6 Software Tools for Monitoring Employee Productivity,” Huffington Post, https://www.huffingtonpost.com, December 6, 2017; Marissa Lang, “Electronic Tracking Spurs Workplace Privacy Debate,” Government Technology, http://www.govtech.com, October 18, 2017; Mike Rogoway, “Jive’s Buyer Responds to Employee Anxiety over Workplace Monitoring Tool,” The Oregonian, http://www.oregonlive.com.

Working the Net

  1. Enterprise resource planning is a major category of business software. Visit the site of one of the following companies: SAP (http://www.sap.com), or Oracle (http://www.oracle.com). Prepare a short presentation for the class about the company’s ERP product offerings and capabilities. Include examples of how companies use the ERP software. What are the latest trends in ERP?
  2. What can intranets and enterprise portals accomplish for a company? Find out by using such resources as Brint.com’s Intranet Portal, http://www.brint.com/Intranets.htm. Look for case studies that show how companies apply this technology. Summarize the different features an intranet or enterprise portal provides.
  3. Learn more about the CERT Coordination Center (CERT/CC), which serves as a center of internet security expertise. Explore its website, https://www.cert.org/index.cfm. What are the latest statistics on incidents reported, vulnerabilities, security alerts, security notes, mail messages, and hotline calls? What other useful information does the site provide to help a company protect IT assets?
  4. Research the latest developments in computer security at Computerworld’s site, http://computerworld.com/. What types of information can you find here? Pick one of the categories in this area (Cybercrime, Encryption, Disaster Recovery, Firewalls, Hacking, Privacy, Security Holes, Viruses and Worms, and VPN), and summarize your findings.
  5. How can someone steal your identity? Using information at the Federal Trade Commission’s central website for information about identity theft, https://www.consumer.ftc.gov/features/feature-0014-identity-theft, compile a list of the ways thieves can access key information to use your identity. What steps should you take if you’ve been a victim of identity theft? Summarize key provisions of federal laws dealing with this crime and the laws in your state.

Critical Thinking Case

Novartis’s Prescription for Invoice Processing

What do you do when you have more than 600 business units operating through 360 independent affiliates in 140 countries around the world—processing complex invoices in various languages and currencies? You seek out the best technology solution to make the job easier.

At global pharmaceutical giant Novartis, the IT department is a strategic resource, a community of 2,000 people serving 63,000 customers in 200 locations and 25 data centers. Because most of the company’s invoices come from international suppliers, they have differences in design, language, taxes, and currency. Consequently, many ended up as “query items” requiring manual resolution by Novartis accounting staff—which delayed payments and made those invoices extremely costly to process. In fact, finance personnel spent so much of their time resolving queried invoices that other work suffered. A solution was badly needed.

To maximize its investment, Novartis needed a flexible solution that would meet its current and future needs and function in other business departments in a variety of geographic locations. It should provide fast, accurate document capture and multi-language support, and should extend to other types of information—such as faxes and electronic data—in addition to paper documents. Finally, in order to obtain financing for the project, return on investment (ROI) was required within nine months of project implementation.

InputAccel for Invoices from EMC/Captiva was the answer. The software extracts data from paper documents, applies intelligent document recognition (IDR) technology to convert them to digital images, and sends relevant data to enterprise resource planning, accounts payable (A/P), and other back-end management systems. The specialized InputAccel server manages output by recognizing and avoiding holdups in the workflow process. It also ensures if a server goes offline, others will carry on functioning, thus avoiding downtime.

Now Novartis scans incoming invoices at a centrally located site, and the images are transmitted to the InputAccel for Invoices server for image improvement. Invoice data is then extracted and validated against supplier information. Most invoices are transferred directly for payment, with relatively few invoices requiring transfer to one of three accounts payable clerks who deal with queries manually. Novartis is a global leader in research and development of products that improve health issues. InputAccel was selected by Novartis to be part of its accounting system.

Thanks to IT, overall efficiency has increased, processing errors are reduced, and accounting personnel can use their time and expert knowledge for more meaningful tasks than resolving invoice errors. For Novartis, it is “mission accomplished.”

Critical Thinking Questions
  1. What factors contributed to Novartis’s invoice processing being so complex?
  2. How did IT help the company solve that problem?
  3. What other uses and functions does InputAccel serve, and how will this be useful to Novartis over the long term? (You may want to visit the EMC/Captiva website, https://www.emc.com, for more information on InputAccel’s capabilities.)

Sources: “OpenText Acquires EMC Enterprise Division,” MetaSource, http://www.metasource.com, September 20, 2016; Novartis corporate website, http://www.novartis.com, March 20, 2006; “Processing Invoices From Around the World,” ECM Connection, https://www.ecmconnection, February 2, 2006; Kathryn Balint, “Captiva’s Paper Chase Paying Off,” San Diego Union-Tribune, December 9, 2005, pp. C1, C5.

Hot Links Address Book

Let’s Test Your Knowledge!

License

Icon for the Creative Commons Attribution 4.0 International License

Introduction to Business Administration Copyright © 2022 by LOUIS: The Louisiana Library Network is licensed under a Creative Commons Attribution 4.0 International License, except where otherwise noted.

Share This Book