Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
IT Management 2B BACHELOR OF COMMERCE IN INFORMATION AND TECHNOLOGY MANAGEMENT (YEAR 2) MODULE 2 IT MANAGEMENT 2B Study Guide Yasean Khan Copyright© 2012 MANAGEMENT COLLEGE OF SOUTHERN AFRICA All rights reserved, no part of this book may be reproduced in any form or by any means, including photocopying machines, without the written permission of the publisher REF: BCOM-ITM-2B Page | 1 IT Management 2B CONTENTS: CONTENTS: ...................................................................................................................................................... 2 INTRODUCTION TO THIS MODULE ................................................................................................................... 6 INTRODUCTION ....................................................................................................................................................... 6 CONTENTS AND STRUCTURE ...................................................................................................................................... 7 SECTION 1: INFORMATION TECHNOLOGY FUNDAMENTALS ........................................................................................ 7 SECTION 2: IMPACT OF INFORMATION TECHNOLOGY ................................................................................................ 7 SECTION 3: INFORMATION TECHNOLOGY INVESTMENTS ........................................................................................... 7 SECTION 4: BUSINESS INTELLIGENCE...................................................................................................................... 7 SECTION 5: DATA WAREHOUSING AND DATA MINING.............................................................................................. 8 SECTION 6: PRINCIPLES OF INFORMATION SECURITY ................................................................................................. 8 SECTION 7: CONCLUSION ...................................................................................... ERROR! BOOKMARK NOT DEFINED. SECTION ONE: INTRODUCTION TO INFORMATION TECHNOLOGY .................................................................. 15 1.1 LEARNING OUTCOMES ............................................................................................................................... 17 1.2 READING ..................................................................................................................................................... 18 1.3 INFORMATION TECHNOLOGY DEFINITION ............................................................................................................. 19 1.4 TIMELINE OF INFORMATION TECHNOLOGY THROUGH THE AGES: ............................................................................... 20 1.5 THE FOUR GENERATIONS OF DIGITAL COMPUTING................................................................................................. 27 1.6 INFORMATION AND COMMUNICATION TECHNOLOGY AND THE FUTURE ...................................................................... 29 1.7 CONCLUSION .................................................................................................................................................. 39 SECTION TWO: IMPACT OF INFORMATION TECHNOLOGY ............................................................................. 40 2.1 LEARNING OUTCOMES ............................................................................................................................... 42 2.2 READING ..................................................................................................................................................... 43 2.3 INTRODUCTION .......................................................................................................................................... 44 2.4 NEGATIVE IMPACT OF TECHNOLOGY ON THE ORGANISATION, INDIVIDUAL AND SOCIETY........................ 44 2. 5 POSITIVE IMPACT OF TECHNOLOGY ON THE ORGANISATION, INDIVIDUAL AND SOCIETY ......................... 46 2.6 CONCLUSION .............................................................................................................................................. 50 SECTION THREE: INFORMATION TECHNOLOGY INVESTMENTS ...................................................................... 56 3.1 LEARNING OUTCOMES ............................................................................................................................... 58 3.2 READING ..................................................................................................................................................... 59 3.3 INTRODUCTION .......................................................................................................................................... 60 3.4 TYPES OF INFORMATION TECHNOLOGY INVESTMENT DECISION MAKING PROBLEMS ...................................................... 61 3.5 INVESTIGATE THE FOLLOWING METHODOLOGIES. .................................................................................... 83 3.6 STRATEGIES FOR MAKING THE RIGHT IT INVESTMENT DECISIONS AND AVOIDING IT COSTS ............................................ 90 3.7 CONCLUSION .................................................................................................................................................. 91 SECTION FOUR: BUSINESS INTELLIGENCE ....................................................................................................... 92 4.1 LEARNING OUTCOMES ............................................................................................................................... 94 4.2 READING ..................................................................................................................................................... 95 4.3 INTRODUCTION ............................................................................................................................................... 96 4.4 WHAT IS BI? ................................................................................................................................................ 97 4. 5 REASONS FOR BUSINESS INTELLIGENCE................................................................................................................ 98 4.6 BENEFITS OF BUSINESS INTELLIGENCE .................................................................................................................. 99 4.7 FACTORS INFLUENCING BUSINESS INTELLIGENCE .................................................................................................... 99 Page | 2 IT Management 2B 4.8 FUTURE OF BUSINESS INTELLIGENCE .................................................................................................................. 103 4.9 CONCLUSION ................................................................................................................................................ 109 GROUP WORK .................................................................................................................................................... 110 SECTION FIVE: DATA WAREHOUSING AND DATA MINING ........................................................................... 112 5.1 LEARNING OUTCOMES ............................................................................................................................. 114 5.2 READING ................................................................................................................................................... 115 5.3 YOU NEED A DATA WAREHOUSE TO DO ANY DATA MINING ................................................................................... 116 5.4 DEFINITION OF DATA MINING (DM) ................................................................................................................. 118 5.5 PURPOSE OF DATA MINING(DM)..................................................................................................................... 118 5.6 PROCESS OF DATA MINING ............................................................................................................................. 118 5.7 WHAT IS DATA MINING AND PREDICTIVE ANALYTICS USED FOR? .............................................................................. 119 5.8 CONCLUSION AND SUMMARY .......................................................................................................................... 120 SECTION SIX: PRINCIPLES OF INFORMATION SECURITY ................................................................................ 125 6.1 LEARNING OUTCOMES ............................................................................................................................. 127 6.2 READING ................................................................................................................................................... 128 6.3 WHAT IS INFORMATION SECURITY ........................................................................................................... 129 6.4 IS IT JUST THE INFORMATION TECHNOLOGY DEPARTMENT WHO SHOULD BE INVOLVED IN SECURITY? . 129 6.5 KEY INFORMATION SECURITY TERMS AND CONCEPTS ............................................................................. 131 6.6 DATA .......................................................................................................................................................... 134 6.7 PEOPLE........................................................................................................................................................ 134 6.8 PROCEDURES ................................................................................................................................................ 134 6.9 NETWORKS .................................................................................................................................................. 135 6.10 BALANCING INFORMATION SECURITY AND ACCESS ............................................................................................. 135 6.11 INFORMATION SECURITY PROJECT TEAM............................................................................................... 137 6.12 DATA RESPONSIBILITIES .......................................................................................................................... 137 6.13 CONCLUSION .......................................................................................................................................... 138 SECTION SEVEN: CONCLUSION ..................................................................................................................... 152 WORKS CITED ............................................................................................. ERROR! BOOKMARK NOT DEFINED. Page | 3 IT Management 2B Page | 4 IT Management 2B Figure 1 - IT covered in Module 2A ......................................................................................................... 9 Figure 2 - IT Covered in this Module 2B ..................................................................................................... 10 Figure 3 - The Abacus : One of the very first information processors. ............................................................ 20 Figure 4 - The Slide Rule : Early 1600s, William Oughtred, an English clergyman, invented the slide rule......... 21 Figure 5 - The Pascaline : The Pascaline. Invented by Blaise Pascal (1623-62). ............................................ 21 Figure 6 - The Pascaline Interior : One of the first mechanical computing machines, around 1642. .................. 22 Figure 7 - Charles Babbage (1792-1871), eccentric English mathematician - The Difference Engine................ 22 Figure 8 - The Analytical Engine. ............................................................................................................... 23 Figure 9 - Joseph Marie Jacquard's loom. Parts are remarkably similar to modern-day computers, designed in the 1830's, inspired binary logic. ................................................................................................................ 23 Figure 10- Census Machine, used punch cards. .......................................................................................... 24 Figure 11- 1890 : International Business Machines Corporation (IBM). The first logo, still a very big player in modern day computing. ............................................................................................................................ 25 Figure 12- Howard Aiken, a Ph.D. student at Harvard University Built the Mark I, which was completed January 1942 8 feet tall, 51 feet long, 2 feet thick, weighed 5 tons, used about 750,000 parts ...................................... 25 Figure 13 - Electronic Numerical Integrator and Computer (ENIAC) - 1946 .................................................... 25 Figure 14 - Electronic Numerical Integrator and Computer (ENIAC) - 1946 : Rear View - Note vaccum tubes. .. 26 Figure 15- The Manchester University Mark I (prototype). First stored program computer ............................... 26 Figure 16- The First Generation (1951-1958). ............................................................................................. 27 Figure 17 - The Second Generation (1959-1963). ....................................................................................... 27 Figure 18- The Third Generation................................................................................................................ 28 Figure 19- MIS Hierarchical planning stages (Schniederjans, 2004, p.16) ..................................................... 64 Figure 20- Complicated dimensions of sub choices ..................................................................................... 67 Figure 21- A Management Information System - Allocating all resources to this can be considered to be an IT investment (Schniederjans, 2004) .............................................................................................................. 67 Figure 22- Basic Understanding of Business Intelligence (BI) ............................................................ 105 Figure 23- BI Strategic, Tactical and Operational....................................................................................... 107 Figure 24 - Operational Tactical and Strategic BI ...................................................................................... 108 Figure 25- The three forms of BI must work according towards a common goal............................................ 108 Figure 26 - The Latency between a business event and an action Taken from Richard Hackathorn, Bolder Technologies. ........................................................................................................................................ 109 Figure 27- Data Warehouse (Wikimedia Commons) .................................................................................. 117 Figure 28 - Components of Information Security (Whitman & Mattford, 2012)................................ 130 Figure 29- Components of an Information System (Whitman & Mattford, 2012) ............................................ 133 Figure 30- Balancing Security and Access to information (Whitman & Mattford, 2012, p.19) .......................... 136 Figure 31- SLS Organisation ................................................................................................................ 142 Page | 5 IT Management 2B INTRODUCTION TO THIS MODULE The broad aims of this module are to: Expose learners to information technology and processes that will facilitate management and decision making in organisations. Understand the impact of information technology on the organisation, individual and society. Evaluate the benefits and drawbacks of information technology investments. Understand and apply the principles of data warehousing and data mining. Understand and apply the basic principles of information security. Introduction This module, IT Management, forms an integral part of the MANCOSA qualification and serves to introduce the student to the fundamentals of Information Technology (IT) Management together with the methods and theories that support the integration of these technologies within business objectives. In doing so, the module expands on the building blocks of Information Technology and their integration and application in the world and how it impacts on the individual, the organisation and on society. After exploring Information Technology in terms of those impact areas, we consider how strategy is key to investing in IT. Part of any organisation strategy should be to gather business intelligence from the information it holds. This will lead to an in-depth discussion on Data Warehousing and Data Mining. We will conclude this module with look at the principles of Information Security. Thus this module will provide you with a holistic understanding of the impacts of Technology and contextualizing this information. It will firm up your understanding of Business Intelligence and will finally look at the process and principles of protecting your data and using your data with business intelligence. Page | 6 IT Management 2B Contents and Structure Section 1: Information Technology Fundamentals This first section revisits the concepts of Information Technology (ICT). In this section the nature and definition of Information Technology are reviewed bearing in mind the information we have covered in the previous module. The idea in this section is to provide the framework and context for the rest of the module within which we will operate. Section 2: Impact of Information Technology In this section we will review some of the ways in which Information Technology has impacted the organisation, individual and society. Section 3: Information Technology Investments Bearing the previous section in mind, section three puts the student in touch with understanding how the strategies that one adopts in respect to Information Technologies affect the investments in Information Technology. We consider the trends in Technology and the strategies and then the investments one should make. Section 4: Business Intelligence We will realize that it is imperative to understand and prepare for ICT so that your organisation is ready to embrace these changes and then to capitalize on these Investments. However we will also see that one needs to evaluate current trends and patterns within an organisation by making use of Business Intelligence methods to help the decision making process. The use or lack of use of Business Intelligence can often spell the difference between, organisations becoming insolvent and just surviving to the ones that are thriving through innovation that their customers are craving, ultimately this is where the larger profit margins are! Page | 7 IT Management 2B We challenge you to identify opportunities and risks within your organisation together with some case studies for review and will lay the basis for section 5 which deals with Data Warehousing and Data Mining Section 5: Data Warehousing and Data Mining Data warehousing often happens without any conscious intention, however when that happens the organisation is usually not prepared to harvest and analyze the information they are collecting so that they can make business decisions based on factual data which they would get through analyzing the data (data mining) they own. The key is to identify how we mine the data we have obtained in order to take the organisation forward by using the information we have to draw conclusions based on trends so we can innovate and meet customers' needs or be disruptive in our innovation so that we can be leaders in that new area. Section 6: Principles of Information Security Data of individuals and the company have value and needs to be protected from abuse or from being compromised. In a very real sense we will discover that data and business intelligence data is almost a currency of its own and commands the need for security. Page | 8 IT Management 2B What have we learnt about Information Technology in the previous module? Figure 1 - IT covered in Module 2A Remembering the information in the previous module regarding Information Technology, we will look at Information Technology in the light of how this knowledge will facilitate management and decision making in an organisation. The organisation can only benefit from understanding intelligently the facts and trends that are presented by the data the organisation has gleaned from its customers. This business intelligence can tip the scale for the future of the organisation. Let us look closer at the way this module is set out? Page | 9 IT Management 2B What we will learn about Information Technology in this module? Figure 2 - IT Covered in this Module 2B In a nutshell this module will recap the Information Technology fundamentals that we have learnt and will then tackle the impact of Information Technology. Knowing the impact of Information Technology in the various areas will assist us in understanding the benefits and drawbacks of Information Technology investments and ways in which managers can tackle this contentious area. We take an in-depth look at Business Intelligence as a tool to be leveraged in making the organisations future more than just survival but also of profitability. We cover the cornerstone of Business Intelligence being Data Warehousing and Data Mining Page | 10 IT Management 2B How to use the Manual Don’t try to complete the manual in a few long sessions. You will study more effectively if you divide your study into two-hour sessions. If you want to take a break it would be a good idea to stop at the end of a section. As you work through the manual you will come across questions that will test your knowledge, or require you to do more reading and research or work in groups. These are designed to help you study and prepare for the assignments and examinations. Good Luck! Page | 11 IT Management 2B The following are important Course Book Notations. Refer to the prescribed text book Attempt the following questions and chapters and pages specified. research further if you could not answer the questions. Learning Outcomes Read/Research and write additional notes. Make sure you use the prescribed textbook and useful Internet websites to write additional notes. Important Concepts Solution to Test Your Knowledge Questions Case Study Test Your Knowledge Think point Group Work Page | 12 IT Management 2B READING This manual has been designed to be read in conjunction with the following textbooks: Prescribed Reading: Reynolds, George W. (2010) Information Technology for Managers, International Edition. United States of America: Cengage Learning Schniederjans, M.J., 2004. Information Technology Investment: Decision-Making Methodology. World Scientific Pub Co Inc. Williams, B and Sawyer,S. (2010) Using Information Technology, 8th Edition. USA, New York: Mcgraw-Hill Recommended Reading: Bidgoli, H. (2012) MIS2. Boston: Cengage Learning Whitman, Michael E. (2011) Principles of Information Security. 4 Edition. Course Technology. Paige Baltzan, A.P., 2009. Business Driven Information Systems. New York: McGraw-Hill. Web Resources: See (Case Sensitive) https://docs.google.com/open?id=0B1ZF9spPlWD-Z2VjbVM4UExtYWs Page | 13 IT Management 2B Page | 14 IT Management 2B Section One: Introduction to Information Technology Contents SECTION ONE: INTRODUCTION TO INFORMATION TECHNOLOGY ............... ERROR! BOOKMARK NOT DEFINED. 1.1 LEARNING OUTCOMES ................................................................................... ERROR! BOOKMARK NOT DEFINED. 1.2 READING ......................................................................................................... ERROR! BOOKMARK NOT DEFINED. 1.3 INFORMATION TECHNOLOGY DEFINITION ................................................................. ERROR! BOOKMARK NOT DEFINED. 1.4 TIMELINE OF INFORMATION TECHNOLOGY THROUGH THE AGES: ................................... ERROR! BOOKMARK NOT DEFINED. 1.5 THE FOUR GENERATIONS OF DIGITAL COMPUTING..................................................... ERROR! BOOKMARK NOT DEFINED. 1.6 INFORMATION AND COMMUNICATION TECHNOLOGY AND THE FUTURE .......................... ERROR! BOOKMARK NOT DEFINED. 1.7 CONCLUSION ...................................................................................................... ERROR! BOOKMARK NOT DEFINED. Page | 15 IT Management 2B Think point What is Information Technology ? Do we embrace or resist Information Technology ? Has Information Technology already infiltrated our lives? How has information technology developed over time and where is it heading to? Page | 16 IT Management 2B 1.1 LEARNING OUTCOMES In this chapter we will be reviewing what we have learnt about Information Technology in the previous module and use this as the basis for the next chapter on the Impact of Information Technology on ourselves, the organisation and society. 1. A student will be able to define Information Technology 2. A student will be able to understand the history of computers and how it changed the world and grasp that these changes need to be spotted so that a company can adopt disruptive technologies in time to ensure their sustainability for the future and perhaps become market leaders themselves. Page | 17 IT Management 2B 1.2 READING Prescribed Reading: Reynolds, George W. (2010) Information Technology for Managers, International Edition. United States of America: Cengage Learning DETAILS: Chapter of Book that should be read. Chapter 1: Managers: Key to Information Technology Results. Chapter 2: Strategic Planning. Williams, B and Sawyer,S. (2010) Using Information Technology, 8th Edition. USA, New York: Mcgraw-Hill DETAILS: Chapter of Book that should be read. Chapter 1 INTRODUCTION TO INFORMATION TECHNOLOGY: Your Digital World (should have been read from previous module) Chapter 9 THE CHALLENGES OF THE DIGITAL AGE: Society & Information Technology Today SUGGESTED READING: Chapter 3 SOFTWARE: Tools for Productivity & Creativity Chapter 4 HARDWARE: THE CPU & STORAGE: How to Choose a Multimedia Computer System Chapter 5 HARDWARE: INPUT & OUTPUT: Taking Charge of Computing & Communications Chapter 6 COMMUNICATIONS, NETWORKS, & SAFEGUARDS: The Wired & Wireless World Chapter 7 PERSONAL TECHNOLOGY: The Future Is You Chapter 8 DATABASES & INFORMATION SYSTEMS: Digital Engines for Today’s Economy Chapter 10 SYSTEMS ANALYSIS & PROGRAMMING: Software Development, Programming, & Languages Page | 18 IT Management 2B 1.3 Information Technology Definition Information and communication technology (ICT) can be defined as - "ways of finding, gathering, and manipulating information and then presenting or communicating it. ICT includes making computers and providing software, programming and communication services such as email and the Internet"1. "ICT (information and communications technology - or technologies) is an umbrella term that includes any communication device or application, encompassing: radio, television, cellular phones, computer and network hardware and software, satellite systems and so on, as well as the various services and applications associated with them, such as videoconferencing and distance learning."2 "ICT consists of all technical means used to handle information and aid communication, including computer and network hardware, communication middleware as well as necessary software. In other words, ICT consists of IT as well as telephony, broadcast media, all types of audio and video processing and transmission and network based control and monitoring functions."3 Using these definitions we can see that we have quite a wide and diverse area that is classified as Information Technology. REMEMBER: Information Technology: Ways of finding, gathering, manipulating information and then presenting or communicating it 1 Poverty Reduction Dictionary. 2011. Poverty Reduction Dictionary. [ONLINE] Available at: http://www.srds.co.uk/mdg/dictionary.htm. [Accessed 15 October 2011]. 2 What is ICT (information and communications technology - or technologies)? - Definition from Whatis.com. 2011. What is ICT (information and communications technology - or technologies)? Definition from Whatis.com. [ONLINE] Available at: http://searchciomidmarket.techtarget.com/definition/ICT. [Accessed 15 October 2011]. 3 http://foldoc.org/Information+and+Communication+Technology Page | 19 IT Management 2B 1.4 Timeline of Information Technology through the ages: Four basic periods "Each of these periods are characterized by a principal technology used to solve the input, processing, output and communication problems of the time: A. B. C. D. Premechanical, Mechanical, Electromechanical, and Electronic A. The Pre-mechanical Age: 3000 B.C. - 1450 A.D. We can attribute the following in the pre-mechanical age, towards being among the key technological steps towards our current technologies, 1. Books and Libraries--output technologies (permanent storage devices). 1. Religious leaders in Mesopotamia kept the earliest "books" 2. The Egyptians kept scrolls. 3. Around 600 B.C., the Greeks began to fold sheets of papyrus vertically into leaves and bind them together. 2. The First Numbering Systems. 1. Egyptian system: The numbers 1-9 as vertical lines, the number 10 as a U or circle, the number 100 as a coiled rope, and the number 1,000 as a lotus blossom. 2. The first numbering systems similar to those in use today were invented between 100 and 200 A.D. by Hindus in India who created a nine-digit numbering system. 3. Around 875 A.D., the concept of zero was developed. 3. The First Calculators: The Abacus. 4. Figure 3 - The Abacus : One of the very first information processors. Page | 20 IT Management 2B B. The Mechanical Age: 1450 - 1840 1. The First Information Explosion. o Johann Gutenberg (Mainz, Germany; c. 1387-1468) Invented the movable metal-type printing process in 1450. o The development of book indexes and the widespread use of page numbers. 2. The first general purpose "computers" o Actually people who held the job title "computer: one who works with numbers." 3. Slide Rules, the Pascaline and Leibniz's Machine. Figure 4 - The Slide Rule : Early 1600s, William Oughtred, an English clergyman, invented the slide rule 4. Early example of an analog computer. Figure 5 - The Pascaline : The Pascaline. Invented by Blaise Pascal (1623-62). Page | 21 IT Management 2B Figure 6 - The Pascaline Interior : One of the first mechanical computing machines, around 1642. 5. Babbage's Engines Figure 7 - Charles Babbage (1792-1871), eccentric English mathematician - The Difference Engine. Page | 22 IT Management 2B Figure 8 - The Analytical Engine. Figure 9 - Joseph Marie Jacquard's loom. Parts are remarkably similar to modern-day computers, designed in the 1830's, inspired binary logic. Page | 23 IT Management 2B C. The Electromechanical Age: 1840 - 1940. The discovery of ways to harness electricity was the key advance made during this period. Knowledge and information could now be converted into electrical impulses. 1. The Beginnings of Telecommunication. 1. Voltaic Battery. Late 18th century. 2. Telegraph. Early 1800s. 3. Morse Code. Developed in1835 by Samuel Morse Dots and dashes. 4. Telephone and Radio. Alexander Graham Bell. 1876 5. Followed by the discovery that electrical waves travel through space and can produce an effect far from the point at which they originated. 6. The invention of the radio Guglielmo Marconi 1894 2. Electromechanical Computing 1. Herman Hollerith and IBM. Herman Hollerith (1860-1929) in 1880. Figure 10- Census Machine, used punch cards. Page | 24 IT Management 2B Figure 11- 1890 : International Business Machines Corporation (IBM). The first logo, still a very big player in modern day computing. Figure 12- Howard Aiken, a Ph.D. student at Harvard University Built the Mark I, which was completed January 1942 8 feet tall, 51 feet long, 2 feet thick, weighed 5 tons, used about 750,000 parts D. The Electronic Age: 1940 - Present. 1. First Tries. o Early 1940s o Electronic vacuum tubes. o Eckert and Mauchly. The First High-Speed, General-Purpose Computer Using Vacuum Tubes: Electronic Numerical Integrator and Computer (ENIAC) Figure 13 - Electronic Numerical Integrator and Computer (ENIAC) - 1946 Page | 25 IT Management 2B Figure 14 - Electronic Numerical Integrator and Computer (ENIAC) - 1946 : Rear View - Note vaccum tubes. Used vacuum tubes (not mechanical devices) to do its calculations. Hence, first electronic computer. Figure 15- The Manchester University Mark I (prototype). First stored program computer The First General-Purpose Computer for Commercial Use: Universal Automatic Computer (UNIVAC). First UNIVAC delivered to Census Bureau in 1951. A machine called LEO (Lyons Electronic Office) went into action a few months before UNIVAC and became the world's first commercial computer. Page | 26 IT Management 2B 1.5 The Four Generations of Digital Computing. The First Generation (1951-1958) Figure 16- The First Generation (1951-1958). 1. 2. 3. 4. 5. Vacuum tubes as their main logic elements. Punch cards to input and externally store data. Rotating magnetic drums for internal storage of data and programs Programs written in Machine language Assembly language requires a compiler. The Second Generation (1959-1963). Figure 17 - The Second Generation (1959-1963). Page | 27 IT Management 2B 1. Vacuum tubes replaced by transistors as main logic element. 2. Crystalline mineral materials called semiconductors could be used in the design of a device called a transistor 3. Magnetic tape and disks began to replace punched cards as external storage devices. 4. Magnetic cores (very small donut-shaped magnets that could be polarized in one of two directions to represent data) strung on wire within the computer became the primary internal storage technology. 5. High-level programming languages 6. E.g., FORTRAN and COBOL 1. The Third Generation (1964-1979). REMEMBER: 4 BASIC PERIODS Pre-Mechanical, Mechanical, Electromechanical, A. Electronic Figure 18- The Third Generation 1. Individual transistors were replaced by integrated circuits. 2. Magnetic tape and disks completely replace punch cards as external storage devices. 3. Magnetic core internal memories began to give way to a new form, metal oxide semiconductor (MOS) memory, which, like integrated circuits, used silicon-backed chips. Operating systems Advanced programming languages like BASIC developed. This is where Bill Gates and Microsoft got their start in 1975. Page | 28 IT Management 2B 2. The Fourth Generation (1979- Present). 1. Large-scale and very large-scale integrated circuits (LSIs and VLSICs) 2. Microprocessors that contained memory, logic, and control circuits (an entire CPU = Central Processing Unit) on a single chip. Which allowed for home-use personal computers or PCs, like the Apple (II and Mac) and IBM PC. Apple II released to public in 1977, by Stephen Wozniak and Steven Jobs. Initially sold for $1,195 (R9 560) (without a monitor); had 16k RAM. First Apple Mac released in 1984. IBM PC introduced in 1981. Debuts with MS-DOS (Microsoft Disk Operating System) Fourth generation language software products E.g., Visicalc, Lotus 1-2-3, dBase, Microsoft Word, and many others. Graphical User Interfaces (GUI) for PCs arrive in early 1980s 1. MS Windows debuts in 1983, but is quite a clunker. Windows wouldn't take off until version 3 was released in 1990 Source : Information Technology History - Outline. 4 1.6 Information and Communication Technology and the Future Computer Development When we look back at the rapid pace of technology and the change we make in our own lives to embrace technology, we realize that more change is a certainty. According to Invalid source specified. Page 34, the exciting changes that lie ahead in computer development are speed, miniaturization and affordability. History is showing us that this is exactly the direction we have always being heading. Information Technology History - Outline. 2012. Information Technology History - Outline. [ONLINE] Available at: http://www.tcf.ua.edu/Classes/Jbutler/T389/ITHistoryOutline.htm. [Accessed 27 April 2012]. 4 Page | 29 IT Management 2B Miniaturization Radio-style vacuum tubes have given away to transistors, which enabled the development of integrated circuits, which are now smaller than your thumbnail. In the past the processing power of the processer (CPU) found on a desktop PC was equivalent to the size of one that filled a room. Speed Due to the advancements made in miniaturization and the research into new materials to make computer components, we have seen that both speed and data storage rise significantly. Affordability Imagine that a processor that costs around R7000 today in terms of its processing power cost around 7 Million Rand back then. Connectivity Because of the expansion in computer networks, e-mail and online shopping became more viable. This interconnected network created the infrastructure for growth. Interactivity Without interaction a computer program such as backing up the system will perform its task until completion or error. In our normal computer use, we interact with ICT, and it is very much like a dialogue between people, except that you can simply continue a dialogue with a computer at exactly the same point you left off. This interaction when the computer responds to our requests makes them useful. We are seeing changes in interactivity, for instance it is now possible to give a vehicle verbal instructions or voice commands, or you can go online after a news broadcast and respond to what you saw. Quite often you will hear on the radio, what people have sms'ed or e-mailed about a topic being discussed. Multimedia The World Wide Web transformed how multimedia was presented and accessed, and thus resulted in such a widespread adoption. Even modern vehicles now, have visual and audiovisual devices that enable navigation, movies and music. Page | 30 IT Management 2B The future where computers and communications combine will create even more exciting possibilities. Possibilities in Convergence, Portability and Personalization are in the future and already rearing its head into the consumer markets at the time of writing this module. Convergence People smirked when the concepts of phones combined with camera's were introduced, today that has become the standard for a cellphone. Convergence is when you combine various industry needs into one device or product, such as the TV watch, or lately the IPAD 2/3 or the other android devices that have more processing power than the space shuttle in 1981 which was "The IBM AP-101 which had about 424 kilobytes of magnetic core memory each. The CPU could process about 400,000 instructions per second. They had no hard disk drive, and load software from magnetic tape cartridges." 5 Portability The beauty and convenience of Andriod, Blackberry, and Iphones have left no doubt to the power of handheld power and portability. There is however the downside that, we now have our personal time often invaded with business. 1. Personalization The key to contentment is personalization. This is from covers to themes- to gadgets. The more you can tailor it to your own needs, the more you love the item you can personalize. 2. Collaboration Action towards common goals, is what collaboration is all about. Collaboration has become a very powerful force, especially with the power of communication mediums that are becoming easier to access and cheaper to use. Collaboration via these mediums, bypass many human conceived barriers of race, religion, physical appearance. Collaboration software together with these communication mediums have created giants like skype and facebook and will continue to grow. We will learn more about collaboration in Section 4. 3. Cloud Computing: The Global Computer Previously called grid computing, cloud computing is simply using computer resources from a network of computers that are physically separate from your business and are usually stored in a secure data warehouse. Cloud computing displaces the usual concerns that come with disaster recovery and management. Cloud computing has really started taking off as a service and is becoming more the norm, rather than the exception. Please read the table on the next few pages to understand more about the History of Computers adapted from: Computer Timeline. 5 Space Shuttle - Wikipedia, the free encyclopedia. 2011. Space Shuttle - Wikipedia, the free encyclopedia. [ONLINE] Available at: http://en.wikipedia.org/wiki/Space_Shuttle. [Accessed 04 October 2011]. Page | 31 IT Management 2B TIME LINE OF COMPUTER EVENTS YEAR EVENT 2400 BC Abacus: The abacus, the first known calculator, was invented in Babylonia 500 BC Panini: Introduced the forerunner to modern formal language theory 300 BC Pingala: Pingala invented the binary number system 87 BC Antikythera Mechanism: Built in Rhodes to track movement of the stars 60 AD Heron of Alexandria: Heron of Alexandria invents machines which follow a series of instructions Liang Ling-Can: Liang Ling-Can invents the first fully mechanical clock 724 1492 Leonardo da Vinci: Drawings by Leonardo da Vinci depict inventions such as flying machines, including a helicopter, the first mechanical calculator and one of the first programmable robots 1614 John Napier: John Napier invents a system of moveable rods (Napier's Rods) based on logarithms which was able to multiply, divide and calculate square and cube roots 1622 William Oughtred: William Oughtred develops slide rules 1623 Calculating Clock: Invented by Wilhelm Schickard 1642 Blaise Pascal: Blaise Pascal invents the the "Pascaline", a mechanical adding machine Gottfried Leibniz: Gottfried Leibniz is known as one of the founding fathers of calculus Joseph-Marie Jacquard: Joseph-Marie Jacquard invents an automatic loom controlled by punched cards 1671 1801 1820 Arithmometer: The Arithmometer was the first mass-produced calculator invented by Charles Xavier Thomas de Colmar 1822 Charles Babbage: Charles Babbage designs his first mechanical computer 1834 Analytical Engine: The Analytical Engine was invented by Charles Babbage 1835 Morse code: Samuel Morse invents Morse code 1848 Boolean algebra: Boolean algebra is invented by George Boole 1853 Tabulating Machine: Per Georg Scheutz and his son Edvard invent the Tabulating Machine Page | 32 IT Management 2B 1869 William Stanley Jevons: William Stanley Jevons designs a practical logic machine 1878 Ramon Verea: Ramon Verea invents a fast calculator with an internal multiplication table Alexander Graham Bell: Alexander Graham Bell invents the telephone called the Photophone Comptometer: The Comptometer is an invention of Dorr E. Felt which is operated by pressing keys 1880 1884 1890 Herman Hollerith: Herman Hollerith invents a counting machine which increment mechanical counters 1895 Guglielmo Marconi: Radio signals were invented by Guglielmo Marconi 1896 Tabulating Machine Company: Herman Hollerith forms the Tabulating Machine Company which later becomes IBM 1898 Nikola Tesla: Remote control was invented by Nikola Tesla 1906 Lee De Forest: Lee De Forest invents the electronic tube 1911 IBM: IBM is formed on June 15, 1911 1923 Philo Farnsworth: Television Electronic was invented by Philo Farnsworth 1924 John Logie Baird: Electro Mechanical television system was invented by John Logie Baird Walther Bothe: Walther Bothe develops the logic gate 1930 Vannevar Bush: Vannevar Bush develops a partly electronic Difference Engine 1931 Kurt Godel: Kurt Godel publishes a paper on the use of a universal formal language 1937 Alan Turing: Alan Turing develops the concept of a theoretical computing machine 1938 Konrad Zuse: Konrad Zuse creates the Z1 Computer a binary digital computer using punch tape 1939 George Stibitz: George Stibitz develops the Complex Number Calculator - a foundation for digital computers Hewlett Packard: William Hewlett and David Packard start Hewlett Packard John Vincent Atanasoff and Clifford Berry: John Vincent Atanasoff and Clifford Berry develop the ABC (Atanasoft-Berry Computer) prototype 1943 Enigma: Adolf Hitler uses the Enigma encryption machine Colossus: Alan Turing develops the the code-breaking machine Colossus 1944 Howard Aiken & Grace Hopper: Howard Aiken and Grace Hopper designed the MARK series of computers at Harvard University Page | 33 IT Management 2B 1945 ENIAC: John Presper Eckert & John W. Mauchly: John Presper Eckert & John W. Mauchly develop the ENIAC ( Electronic Numerical Integrator and Computer) Computer Bug: The term computer ‘bug’ as computer bug was first used by Grace Hopper 1946 F.C. Williams: F.C. Williams develops his cathode-ray tube (CRT) storing device the forerunner to random-access memory (RAM) 1947 Pilot ACE: Donald Watts Davies joins Alan Turing to build the fastest digital computer in England at the time, the Pilot ACE William Shockley: William Shockley invents the transistor at Bell Labs Douglas Engelbart: Douglas Engelbart theorises on interactive computing with keyboard and screen display instead of on punchcards 1948 Andrew Donald Booth: Andrew Donald Booth invents magnetic drum memory Frederic Calland Williams & Tom Kilburn: Frederic Calland Williams & Tom Kilburn develop the SSEM "Small Scale Experimental Machine" digital CRT storage which was soon nicknamed the "Baby" 1949 Claude Shannon: Claude Shannon builds the first machine that plays chess Howard Aiken: Howard Aiken develops the Harvard-MARK III 1950 Hideo Yamachito: The first electronic computer is created in Japan by Hideo Yamachito. Alan Turing: Alan Turing publishes his paper Computing Machinery and Intelligence which helps create the Turing Test. 1951 LEO: T. Raymond Thompson and John Simmons develop the first business computer, the Lyons Electronic Office (LEO) at Lyons Co. UNIVAC: UNIVAC I (UNIVersal Automatic Computer I) was introduced - the first commercial computer made in the United States and designed principally by John Presper Eckert & John W. Mauchly EDVAC: The EDVAC (Electronic Discrete Variable Automatic Computer) begins performing basic tasks. Unlike the ENIAC, it was binary rather than decimal 1953 The IBM 701 becomes available and a total of 19 are sold to the scientific community. 1954 John Backus & IBM: John Backus & IBM develop the FORTRAN Computer Programming Language 1955 Bell Labs introduces its first transistor computer. 1956 Optical fiber was invented by Basil Hirschowitz, C. Wilbur Peters, and Lawrence E. Curtiss Page | 34 IT Management 2B 1957 Sputnik I and Sputnik II: Sputnik I and Sputnik II are launched by the Russians 1958 ARPA (Advanced Research Projects Agency) and NASA is formed Silicon chip: The first integrated circuit, or silicon chip, is produced by the US Jack Kilby & Robert Noyce 1959 Paul Baran: Paul Baran theorises on the "survivability of communication systems under nuclear attack", digital technology and symbiosis between humans and machines 1960 COBOL: The Common Business-Oriented Language (COBOL) programming language is invented. 1961 Unimate: General Motors puts the first industrial robot, Unimate, to work in a New Jersey factory. 1962 The first computer game: The first computer game Spacewar Computer Game invented BY Steve Russell & MIT 1963 The Computer Mouse: Douglas Engelbart invents and patents the first computer mouse (nicknamed the mouse because the tail came out the end) The American Standard Code for Information Interchange (ASCII) is developed to standardize data exchange among computers. 1964 Word processor: IBM introduces the first word processor BASIC: John Kemeny and Thomas Kurtz develop Beginner’s All-purpose Symbolic Instruction Language (BASIC) 1965 Hypertext: Andries van Dam and Ted Nelson coin the term "hypertext" 1967 Floppy Disk: IBM creates the first floppy disk 1969 Seymour Cray: Seymour Cray develops the CDC 7600, the first supercomputer Gary Starkweather: Gary Starkweather invents the laser printer whilst working with Xerox ARPANET: The U.S. Department of Defense sets up the Advanced Research Projects Agency Network (ARPANET ) this network was the first building blocks to what the internet is today but originally with the intention of creating a computer network that could withstand any type of disaster. 1970 RAM: Intel introduces the world's first available dynamic RAM ( random-access memory) chip and the first microprocessor, the Intel 4004. 1971 E-mail: E-mail was invented by Ray Tomlinson Liquid Crystal Display ( LCD ): Liquid Crystal Display ( LCD ) was invented by James Fergason Pocket calculator: Pocket calculator was invented by Sharp Corporation Floppy Disk: Floppy Disk was invented by David Noble with IBM - Nicknamed the "Floppy" for its flexibility. Page | 35 IT Management 2B 1972 First Video Game: Atari releases Pong, the first commercial video game The CD: The compact disc is invented in the United States. 1973 Robert Metcalfe and David Boggs: Robert Metcalfe creates the Ethernet, a local-area network (LAN) protocol Personal computer: The minicomputer Xerox Alto (1973) was a landmark step in the development of personal computers Gateways: Vint Cerf and Bob Kahn develop gateway routing computers to negotiate between the various national networks 1974 SQL: IBM develops SEQUEL (Structured English Query Language ) now known as SQL WYSIWYG: Charles Simonyi coins the term WYSIWYG (What You See Is What You Get) to describe the ability of being able to display a file or document exactly how it is going to be printed or viewed 1975 Portable computers: Altair produces the first portable computer Microsoft Corporation: The Microsoft Corporation was founded April 4, 1975 by Bill Gates and Paul Allen to develop and sell BASIC interpreters for the Altair 8800 1976 Apple: Apple Computers was founded Steve Wozniak and Steve Jobs 1977 Apple Computer’s Apple II, the first personal computer with color graphics, is demonstrated MODEM: Ward Christensen writes the programme "MODEM" allowing two microcomputers to exchange files with each other over a phone line 1978 Magnetic tape: The first magnetic tape is developed in the US 1979 Over half a million computers are in use in the United States. 1980 Paul Allen and Bill Gates: IBM hires Paul Allen and Bill Gates to create an operating system for a new PC. They buy the rights to a simple operating system manufactured by Seattle Computer Products and use it as a template to develop DOS. 1981 Microsoft: MS-DOS Computer Operating System increases its success 1982 WordPerfect: WordPerfect Corporation introduces WordPerfect 1.0 a word processing program Commodore 64: The Commodore 64 becomes the best-selling computer of all time. SMTP: SMTP (Simple Mail Transfer Protocol) is introduced 1983 More than 10 million computers are in use in the United States Domain Name System (DNS): Domain Name System (DNS) pioneered by Jon Postel, Paul Mockapetris and Craig Partridge. Seven 'top-level' domain names are initially introduced: edu, com, gov, mil, net, org and int. Page | 36 IT Management 2B Windows: Microsoft Windows introduced eliminating the need for a user to have to type each command, like MS-DOS, by using a mouse to navigate through drop-down menus, tabs and icons 1984 Apple Macintosh: Apple introduces the Macintosh with mouse and window interface Cyberspace: William Gibson coins the word cyberspace when he publishes Neuromancer 1985 Paul Brainard: Paul Brainard introduces Pagemaker for the Macintosh creating the desktop publishing field. Nintendo: The Nintendo Entertainment System makes its debut. 1986 More than 30 million computers are in use in the United States. 1987 Microsoft introduces Microsoft Works Perl: Larry Wall introduces Perl 1.0 1988 Over 45 million PCs are in use in the United States. 1990 The Internet, World Wide Web & Tim Berners-Lee: Tim Berners-Lee and Robert Cailliau propose a 'hypertext' system starting the modern Internet Microsoft and IBM stop working together to develop operating systems 1991 The World Wide Web: The World Wide Web is launched to the public on August 6, 1991 1993 At the beginning of the year only 50 World Wide Web servers are known to exist 1994 The World Wide Web Consortium is founded by Tim Berners-Lee to help with the development of common protocols for the evolution of the World Wide Web YAHOO: YAHOO is created in April, 1994. 1995 Java: Java is introduced Amazon: Amazon.com is founded by Jeff Bezos EBay: EBay is founded by Pierre Omidyar Hotmail: Hotmail is started by Jack Smith and Sabeer Bhatia. 1996 WebTV: WebTV is introduced 1997 Altavista introduces its free online translator Babel Fish Microsoft acquires Hotmail 1998 Google: Google is founded by Sergey Brin and Larry Page on September 7, 1998 PayPal is founded by Peter Thiel and Max Levchin 2001 Xbox: Bill Gates introduces the Xbox on January 7th 2001. Page | 37 IT Management 2B 2002 Approximately 1 billion PCs been sold PayPal is acquired by eBay 2005 September 12: eBay acquires Skype 2006 Skype announces that it has over 100 million registered users. 2008 At Macworld Expo, Apple introduces the MacBook Air laptop computer. It features Core2 Duo processor, 2 GB RAM, fixed battery, no optical drive, USB and micro-DVI ports, iSight camera, 80 GB hard drive, 64 GB solid-state drive, 13.3-inch diagonal widescreen LED 1280x800 color screen, AirPort Extreme WiFi, Bluetooth 2.1+EDR, full-size keyboard and trackpad. Battery life is 5 hours. Weight is 3 pounds; size 12.8 World of Warcraft Released 2008 2008 The European Commission fines Microsoft 899 million euros (US$1.35 billion) for using high prices to discourage software competition, in defiance of a 2004 order from Brussels to provide the information on reasonable terms 2008 At the Intel Developer Forum in Shanghai, China, Intel introduces the low-power Atom microprocessor, in speeds up to 1.86 GHz South Africa issues a 2.05r postage stamp for "Ergonomics in the office" depicting a personal computer Electronic Arts releases The Sims 3 game for personal computers in the USA. 2009 2009 2009 Microsoft launches Windows 7 operating system. Price is US$199.99 for the Home Premium version, or US$119.99 for an upgrade from older versions. 2009 United States Court of Appeals for the Federal Circuit upholds a US$290 million jury verdict for i4i against Microsoft for patent infringement by the Microsoft Word program. Microsoft is barred from selling the current Microsoft Word and Microsoft Office as of January 11. The company will modify the programs to remove the disputed feature, which relates to the use of XML. [2322] 2010 2010 2011 2011 2012 2012 xxxx At Macworld conference in San Francisco, California, Apple CEO Steve Jobs unveils the iPad tablet computer. It features 9.7-inch touchscreen, 0.5 thick unit. Price starts at US$499 with 16 GB RAM. [2322] Market capitalization of Apple (US$222 billion) passes Microsoft (US$219 billion) for the first time since December 19,1989. Apple stock is worth more than 10 times what they were 10 years ago, whereas Microsoft stock is down 20 percent over the same time period At Microsoft's annual developer conference, Microsoft distributes 5000 Samsung tablet computers running a test version of Windows 8 operating system. Yasean Khan joined Mancosa as the Information Technology Manager and makes major Information Technology transformations in the 6 months he is there. Virtualization is being adopted as the platform of choice. Electronic Submission is on the cards. Ipad 3 released, Steve Job Dies, Samsung sells more units than apple, however apples profits are much higher. You fill in the rest… Page | 38 IT Management 2B Group Work 1. Review the table above and discuss how the past has affected the present technological advances. 2. In a group, discuss a particular technology such as the IPAD and trace its roots through the ages. 3. Discuss some organisations that have been major role-players in shaping the current technologies in Information Technology. 4. By use of some examples, research how companies have adapted to the times to remain relevant in the world, to the world. 1.7 Conclusion Now we have a holistic view of information technology including how history contributed to the birth of our current state of Information Technology. It is time to look at the impact that technology has had and is having on humans. It is important to put into perspective the history of Information Technology and one should make not at what speed Information Technology is transforming organisations. Prices have changed, computing power has changed and we will see that the way we do business and the way we make decisions is also changing. We will discover that organisations are seeking to make decisions based on fact, and modern trends are highlighting the need and desire of these organisations to do this in real time and not just based on historical data. REMEMBER: Information Technology has grown at an incredible rate. History shows patterns. Business Intelligence exposes those patterns so they can be manipulated by an organisation. Page | 39 IT Management 2B SECTION TWO: IMPACT OF INFORMATION TECHNOLOGY CONTENTS SECTION TWO: IMPACT OF INFORMATION TECHNOLOGY ............................................................................. 40 2.1 LEARNING OUTCOMES ............................................................................................................................... 42 2.2 READING ..................................................................................................................................................... 43 2.3 INTRODUCTION .......................................................................................................................................... 44 2.4 NEGATIVE IMPACT OF TECHNOLOGY ON THE ORGANISATION, INDIVIDUAL AND SOCIETY........................ 44 2. 5 POSITIVE IMPACT OF TECHNOLOGY ON THE ORGANISATION, INDIVIDUAL AND SOCIETY ......................... 46 2.6 CONCLUSION .............................................................................................................................................. 50 Page | 40 IT Management 2B Think point What makes technology so effective in making an impact on our lives? Do we interact with Information Technology in the world today without even realising it? How and where do we interact with Information Technology? Has Information Technology transformed your life in anyway? What is Information Technology in the context of where we work? Does Information Technology affect society? Page | 41 IT Management 2B 2.1 LEARNING OUTCOMES 1. Understand the negative impact of technology on the organisation, individual and society 2. Understand the positive impact of technology on the organisation, individual and society Page | 42 IT Management 2B 2.2 READING Prescribed Reading: Reynolds, George W. (2010) Information Technology for Managers, International Edition. United States of America: Cengage Learning DETAILS: Chapter of Book that should be read. Chapter 4: Business Process and IT Outsourcing. Chapter 5: Corporate Governance and IT. Williams, B and Sawyer,S. (2010) Using Information Technology, 8th Edition. USA, New York: Mcgraw-Hill DETAILS: Chapter of Book that should be read. Chapter 7 PERSONAL TECHNOLOGY: The Future Is You Chapter 9 THE CHALLENGES OF THE DIGITAL AGE: Society & Information Technology Today Page | 43 IT Management 2B 2.3 INTRODUCTION Technology runs in the veins of society. It is the fuel that drives our lives. It is an integral part of daily life. It has definitely benefited society. It has brought luxury in the life of every common man. Automation brought about by technology has saved human effort and time to a large extent. It has brought distant places closer and simplified information access. It has made the world a smaller place to live in. Let us look at some of the important areas, where technology has brought a positive change. Read/Research and write additional notes. Make sure you use the prescribed textbook and useful Internet websites to write additional notes. 2.4 NEGATIVE IMPACT OF TECHNOLOGY ON THE ORGANISATION, INDIVIDUAL AND SOCIETY "When we speak of the impact of technology on society, we always talk about the positive effects of technology and about how technology has made life easy. We talk about the Internet as an information resource and a communication platform and conveniently ignore the fact that an overexposure to it leads to Internet addiction. We often discuss how technology has made life easy but easily forget that it has made us overly dependent on it. Have you thought of the impact of technology from this point of view? I am sure, most of you haven't. Let us look at this aspect of technology here. Impact of Technology on Our Society Think of the days when there were no computers and no modern means of transport. Human life was highly restricted due to the unavailability of technological applications. Daily life involved a lot of physical activity. Life of the common man was not as luxurious as that of modern times, but he was more active. Exercise was integrated into routine physical activities. It was contrary to the sedentary lifestyle of today, which leaves no time for exercise and fills days with inactivity and laze. Today we don't want to, and thanks to technology, don't even need to, walk, move around or exert physically to get things done. We have the world at our fingertips. We think of technology as a boon to society, but is it really? The Internet has bred many unethical practices like hacking, spamming and phishing. Internet crime is on the rise. The Internet, being an open platform lacks regulation. There is no regulation on the content displayed on websites. Internet gambling has become an addiction for many. Overexposure to the Internet has taken its toll. In this virtual world, you can be who you are not, you can be virtually living even after you die. Isn't this weird? Children are spending all their time playing online and less or almost no REMEMBER: Information Technology has also created as many problems as it has solved Page | 44 IT Management 2B time playing on the ground. Youngsters are spending most of their time on social networking, and possibly missing out on the joys of real social life. Think of the days when there were no online messengers, no emails and no cell phones. Indeed cellular technology made it possible for us to communicate over wireless media. Web communication facilities have worked wonders in speeding long-distance communication. On the other hand, they have deprived mankind of the warmth of personal contact. Emails replaced handwritten letters and communication lost its personal touch. With the means of communication so easily accessible, that magic in waiting to reach someone and the excitement that followed have vanished. Moreover, we have become excessively dependent on technology. Is so much of dependency good? Is it right to rely on machines to such an extent? Is it right to depend on computers rather than relying on human intellect? Computer technology and robotics are trying to substitute for human intellect. With the fast advancing technology, we have started harnessing artificial intelligence in many fields. Where is the digital divide going to take us? How is our 'tomorrow' going to be? 'Machines replacing human beings' does not portray a rosy picture, does it? It can lead to serious issues like unemployment and crime. An excessive use of machines in every field can result in an under-utilization of human brains. Over time, we may even lose our intellectual abilities. You know of the declining mathematical abilities in children due to use of calculators in school? The impact of technology on society is deep. It is both positive and negative. Technology has largely influenced every aspect of living. It has made life easy, but so easy that it may lose its charm one day. One can cherish an accomplishment only if it comes after effort. But everything has become so easily available due to technology that it has lost its value. There is a certain kind of enjoyment in achieving things after striving for them. But with everything a few clicks away, there is no striving, there's only striking."6 REMEMBER: Ask yourself: Is Information Technology Dependency, that good for us? Will humans evolve or devolve because of Information Technology in the future and will the use of computers lead to a drain in HUMAN BRAIN POWER? What is the Impact of Technology on Our Society?. 2012. What is the Impact of Technology on Our Society?. [ONLINE] Available at: http://www.buzzle.com/articles/what-is-the-impact-of-technologyon-our-society.html. [Accessed 27 April 2012]. Adapted. 6 Page | 45 IT Management 2B Group Work As an Information Technology manager one has to take the following into consideration as the following if not looked at will result in a negative impact of Information Technology on an organisation. Place yourself in the shoes of an Information Technology Manager and discuss the following issues and their relevance to the impact of Information Technology in an Organisation. 1. High costs of hardware and software, and the need to upgrade every few years 2. Training costs 3. Maintenance costs, such as salaries of skilled IT personnel 4. Hacking 5. Phishing 6. Malware such as viruses, Trojans and worms 7. Load-shedding and its impact 8. Network down time and its impact 9. Internet abuse by employees 2. 5 POSITIVE IMPACT OF TECHNOLOGY ON THE ORGANISATION, INDIVIDUAL AND SOCIETY Automation of Processes in the Industry and the Household: Technology has automated many of the critical processes in the industry as well as the household. Imagine the amount of labor that must have been involved in industrial processes when the concept of automation did not exist. Electronic gadgets have entered homes of the common man to rescue him from the boredom of daily chores. Imagine the amount of time people must be spending doing household chores during the time there were no machines and household appliances. It's better not imagined. Today's is the age of robotics. Machines can learn, adopt new things and perform tasks with nearhuman efficiency. Changed Modes of Transport: The automobile industry and technology are interwoven. Time has witnessed this industry evolve from mechanical scooters to automated aircraft. Animals were the only modes of transport in the olden days. Technology was the driving force behind the creation and design of the modern-day automobiles. Bicycles evolved into scooters and sports bikes. The idea of having four-wheeled modes of transport gave rise to the creation of cars. Modes of air and water transport came up, thanks to technology. Reduced Risk to Human Life: Machines have automated many crucial industrial processes. Machines are now taking up mundane jobs that were once done by human workers. Technology has evolved to an extent where machines can perform tasks that are not feasible for man, either because they are risky or life-threatening or Page | 46 IT Management 2B because they are beyond human capacity. The use of advanced technologies like robotics and artificial intelligence has proven to be helpful in life-risking endeavors like mining and space exploration. Data Management and Information Retrieval: Computer technology, needless to say, has changed the face of the world. Computers can store, organize and manage huge amounts of data. They can process large amounts of information. Computers have given rise to the software industry, one of the most progressive industries of the world. The Internet that seeded from computer networking concepts is the most effective communication platform and the largest information base existing today. Impact on the Entertainment and Advertising Industries: The Internet has brought a positive change to the entertainment and advertising industries. Over the Internet, advertisements can reach the masses within seconds. Internet advertisements have changed equations of the advertising industry. Branding on the Internet is much more effective that other forms of product promotion. The entertainment media has progressed because of advancements in technology. Movies, songs, games are a few clicks away. People have begun using the Internet to watch and download movies, listen to music, play games and entertain themselves. Thanks to handy, mobile and user-friendly devices, all this has become really easy. Onset of the Digital Age: There's hardly anything analog now, we live in a digital world, a digital age. Talk pixels and bytes. The digitization of information has made it possible for us to store it in a compact form. Ever wondered how gigabytes of data can be stored on a small chip? Digitization it is! Also, digitization enriches the quality of data storage. Digital voice and digital images are of a higher quality. Digital cameras and digital TVs provide users with an enriched picture quality, thus bettering user experience with technology. Communication Redefined: Cellular communication has revolutionized the communication industry. The conventional telephone, also a piece of technology, was one of the earliest technological developments in communication. Mobile phones have broadened the horizons of communication by enabling convenient longdistance calling and mobile use. Letters have taken a backseat and emails and cell phone messages have become the easiest means to connect. Owing to developments in technology, communication is wireless. Social networking is another defining factor here. It has given an all new dimension to communication, entertainment and recreation. Satellite Technology: Satellite communication is an important facet of technology. Satellite TV and satellite radio have eased the broadcasting of events across the globe. How else do you think could matches and concerts be broadcasted live? Not just TV and radio, even communication to ships and airplanes wouldn't have been possible if not for satellite communication. Even your hand-held devices wouldn't be of use, if not for radio communication. These were still a few fields influenced by technology. It is almost impossible to enlist all the positive effects of technology on society. The fast-advancing technology on the whole, has given impetus to developments in various fields and improved the quality of human life. There's less risk, less effort, less mess. There's more leisure, more ease and more speed - all because of that ten-letter word - not a word, a phenomenon technology. "7 Positive Effects of Technology on Society. 2012. Positive Effects of Technology on Society. [ONLINE] Available at: http://www.buzzle.com/articles/positive-effects-of-technology-on-society.html. [Accessed 27 April 2012]. 7 Page | 47 IT Management 2B "Technology has progressed by leaps and bounds in the last few decades, and the benefits of technology are there for all to see. One of the biggest arguments against technology is its sometimes ridiculously high cost which limits its usage and places it out of reach of many people. But it is an undeniable fact that technology has helped us make many tasks easier, and it has also made the world a much smaller place. The latest developments in technology can be seen and felt in many industries, but there are some areas that have been benefited more than others. Costs of production have fallen, networking has become easier, employment levels have risen (in some cases), and we have certainly become more efficient at many complex tasks and processes. With this in mind, let's look at some of the most obvious benefits of technology that we live with today. Healthcare Perhaps the single biggest beneficiary of advancing technology has been the healthcare sector. Medical research has led to the end of many diseases and ailments, and also to the discovery of many drugs and medications that have helped prevent many lethal diseases and disorders. Personal records are easier to study now, and medical research has advanced magnificently. Millions of lives have been saved as a result of this. Here are some of the benefits of technology in this industry in brief. Communication between patients and doctors has become easier, more personal, more flexible and more sensitive. Personal records of patients are maintained, which makes it easier to study symptoms and carry out diagnosis of previously unexplainable conditions. Several medical aids have helped people overcome many medical conditions which they had to live with earlier. New medicines have led to the demise of many illnesses and diseases. Medical research has become supremely advanced, and every ailment seemingly has a cure, or at least a prevention. Costs of medical procedures and operations have fallen dramatically over the decades. positive effects of technology on society. Education "Interactive learning and feedback systems ICT is changing the face of education as we know it. ICT in many countries have already brought interactive and individualized learning to these environments. Students press buttons in response to questions in a classroom, instead of raising their hands. The results of the questions are then displayed to the whole class. Asking multiple choice questions and giving the students immediate feedback to their responses could tip the scales in a learning environment with this process of instant feedback to both the students and the lecturers. The lecturer can immediately see when their explanations are not making sense to the students and change their explanations to suit that class."8 8 Khan, Yasean. (2011). BACHELOR OF COMMERCE IN INFORMATION AND TECHNOLOGY MANAGEMENT (YEAR 2),MODULE 1,IT MANAGEMENT 2A,Study Guide. Durban, Mancosa Page | 48 IT Management 2B It is no surprise that the benefits of technology in the classroom and the benefits of technology in schools have opened up a whole new learning environment. Knowledge can be easily procured with the help of Internet technology now, and it is easier to help children with special needs as well. Here are some more benefits of assistive technology that the educational sector has witnessed. Personalized learning has come to the fore. Students can pick their own curriculum with ease, and set their own personal targets. Distance learning has become much easier, and this has led to a rise in the number of people who receive education. E-learning and online education has made it very simple and systematic for an individual to receive personal attention, so that all his specific needs are fulfilled. Immediate response to queries and tests have made the whole education process a lot faster. The use of computers and technology in classrooms has opened up a whole new method of teaching and effective learning. Communication The communication industry has witnessed a huge growth. Social networking and blogging has opened up a whole new world to people from remote locations, and the reach of the mass media has increased thousand fold. People can communicate with each other on the move, and there are no limitations anymore to the benefits of information technology. Here are some more benefits. The speed of talking to one another is instantaneous. The mode of talking has become more personalized and can be done from just about anywhere. The world has become a smaller place, since no one is out of reach anymore. The clarity of communication has also improved with improvements in audio quality and video quality. Information and news broadcasting has become more personalized as well. Moreover, it can reach more people at a faster speed, and people's response can also be felt immediately. Business Companies have become more profitable with the help of various advanced machines and equipment, and this has led to a rise in the standard of living of people. The national income of countries has also expanded as a result of this. Costs of production have fallen dramatically thanks to automated processes. Research and development has become far more advanced than ever, and this leads to the invention of ground breaking technology. Company accounts and customer records can be easily stored and accessed, and this increases the market penetration of the business. Global collaborations and partnerships are easier to start and maintain, and this benefits everyone involved with international business. It has become easier to combat competition, and this has led to more choice for the consumer. All of these benefits of technology are there for everyone to see. Even though there are certain repercussions and a negative impact of technology as well, nobody can say that technology has not Page | 49 IT Management 2B aided society on a whole. The world is a better place thanks to technology, and the future looks much brighter, thanks to these advancements. "9 2.6 CONCLUSION The effects of the use, misuse or non use of technology can be seen within the strands of most of society. Although, society is affected in various ways, modifications in our lifestyles are constantly occurring. From the invention of the simplest of human accessory, like clothing to the most complex research, such as the human genome project, there are very few areas of human activity that is out of bounds for technological intervention or has not been touched by technology in one form or another. It is the way that we have used or avoided technology, that has come to define the success of failure of people, companies and even cities and countries. It is quite understandable that it is a challenging area of management to both be aware of the latest technological developments and to also temper this with caution and foresight in selecting the correct technological pathways that would suit the goals of those concerned. The topic at hand is extremely important and the impact of Information Technology on the enterprise as well as its people, both positive as well as negative, is something the IT manager has to be intimately aware of in order to make informed decisions when setting up an IT infrastructure. Furthermore, this knowledge will equip the IT manager to aid senior management in putting Information Technology policies in place and help the organisation use Information Technology to support the driving goals of the organisation and in some cases even speed up the attainment of those goals! Benefits of Technology. 2012. Benefits of Technology. [ONLINE] Available at: http://www.buzzle.com/articles/benefits-of-technology.html. [Accessed 27 April 2012]. 9 Page | 50 IT Management 2B Attempt the following questions and research further if you could not answer the question. Some Guidance is provided below Test Your Knowledge How do business around the world utilise Information Technology ? How does Information Technology Impact them? Possible Solution to Test Your Knowledge Questions I.T. has helped in customer service, huge corporations like Microsoft attend to customer needs through email and chat services. Networking internal and external in organizations has improved the working of businesses. Staffs and clients likewise can get in touch with the managers for feedback, progress reports and extensions. Communication has bloomed, two business organizations if they need to work together can easily do so. Hotmail, when merged with MSN was easy since the service was online. Business these days require a lot of planning, due to high tech organization systems on computers, planning can be done on an organized pattern, with schedule formats, grant charts etc. Huge databases can now be controlled and stored on network and back up drives. Together with the advancement of science and technology, technological innovations grew along with it, resulting to the emergence of new equipment and gadgets. No matter how big or small your company is, technology brings both intangible and tangible benefits to become cost efficient and to meet the growing demands and needs of customers. Technological innovations affect corporate efficiency, culture and relationship among employees, clients, suppliers and customers. The type and quality of technology used affect the security of confidential business information. Due to the burden brought by administrative tasks, like inventory, bookkeeping and records keeping, both big and small companies rely on computers to do their administrative works. The birth of Internet and online social networking sites tremendously decreased the costs of business operations. It also makes it easier for companies to use the Six Sigma management methodologies. Some firms shifted to outsourcing instead of hiring their own personnel due to the low costs associated with it. Because of the huge impact of technological innovations to companies, it is impossible for them to live with it. Commonly used high technology equipment: Computers Photocopier Telephone Computer printer Page | 51 IT Management 2B Internet Paper shredder Multimedia projector Touch screen monitors Computer mouse Laptop computers Advantages of Technology to Business: Customer Relations. Technology affects the way companies communicate and establish relations with their clients. In a fast moving and business environment, it is vital for them to interact with clients regularly and quickly to gain their trust and to obtain customer loyalty. With the use of Internet and online social networks, firms interact with consumers and answer all their queries about the product. Establishing effective communication with customers not only creates rapport with them, but it also creates strong public image. It allows business enterprises to reduce and to cut carbon emissions. A bit more about the latest trends in CRM: "Related trends Many CRM vendors offer Web-based tools (cloud computing) and software as a service (SaaS), which are accessed via a secure Internet connection and displayed in a Web browser. These applications are sold as subscriptions, with customers not needing to invest in purchasing and maintaining IT hardware, and subscription fees are a fraction of the cost of purchasing software outright. The trend towards cloud-based CRM has forced traditional providers to move into the “cloud” through acquisitions of smaller providers: Oracle purchased RightNow in October 2011 and SAP acquired SuccessFactors in December 2011. Salesforce.com pioneered the concept of delivering enterprise applications through a web browser and paved the way for future cloud companies to deliver software over the web Salesforce.com continues to be the leader amongst providers in cloud CRM systems. The era of the "social customer" refers to the use of social media (Twitter, Facebook, LinkedIn, Yelp, customer reviews in Amazon, etc.) by customers in ways that allow other potential customers to glimpse real world experience of current customers with the seller's products and services. This shift increases the power of customers to make purchase decisions that are informed by other parties sometimes outside of the control of the seller or seller's network. In response, CRM philosophy and strategy has shifted to encompass social networks and user communities, podcasting, and personalization in addition to internally generated marketing, advertising and webpage design. With the spread of selfinitiated customer reviews, the user experience of a product or service requires increased attention to design and simplicity, as customer expectations have risen. CRM as a philosophy and strategy is Page | 52 IT Management 2B growing to encompass these broader components of the customer relationship, so that businesses may anticipate and innovate to better serve customers, referred to as "Social CRM"."10 Business Operations. With the use of technological innovations, business owners and entrepreneur understand their cash flow better, how to manage their storage costs well and enables you to save time and money. Corporate Culture. Technology lets employees communicate and interact with other employees in other countries. It establishes clique and prevents social tensions from arising. Security. Modern security equipment enables companies to protect their financial data, confidential business information and decisions. Research Opportunities. It provides a venue to conduct studies to keep themselves ahead of competitors. It allows companies to virtually travel into unknown markets. Corporate Reports. With technology, business enterprises communicate effectively with their branch offices to deliver quality financial and operational reports. Industrial Productivity. Through the use of business software programs or software packages, it automated traditional manufacturing process, reduces labor costs and enhances manufacturing productivity. It enables companies to increase efficiency and production output. Business mobility. Technological innovations improved companies' sales, services, shorted lead time on receiving and delivering goods and services. Enables them to penetrate multiple markets at least costs. Research capacity. It enables them to conduct studies on various companies to gain knowledge on the new trends in the market and way on avoiding them. Technology affects businesses on many levels. The more efficient an employee is, the more productive he is to the company. In addition, the more a business stays in touch with its customer base, the better the chance of building customer loyalty. Advances in technology make that possible, as well as allowing employees from around the world to work via video conferencing and telecommuting to work. Consumers The impact of technology on a business isn't restricted to business use. A business is also affected when consumers use technology. At one time, the only way some people had to file their tax returns was through going to either a certified public accountant or a professional tax preparer, or doing taxes themselves. The tax code is complex and some people might not have felt secure in preparing their taxes on their own. However, accounting software evolved to the point where many people simply had to answer a series of questions and the computer would do the rest, including filing the information electronically. Customer relationship management - Wikipedia, the free encyclopedia. 2012. Customer relationship management - Wikipedia, the free encyclopedia. [ONLINE] Available at: http://en.wikipedia.org/wiki/Customer_relationship_management. [Accessed 30 June 2012]. 10 Page | 53 IT Management 2B Crossover The technology a business uses might not have been designed for businesses. From a marketing point of view, a company makes more money by going after consumers than businesses. Consumers might buy the latest upgrade to a technological device, such as an iPhone, while businesses tend to use products for longer periods of time. On the other hand, the more consumers purchase the latest product, the better the business side of manufacturing does. A company can reach the consumer market first, then expand into the business arena. When Apple added enhanced security features to the iPhone, businesses began to look at adding iPhones to the list of acceptable phones to use in the business environment, resulting in a crossover market. Social Networking Social networking affects the business environment. Employees are connected to social networks. This can be a double-edged sword, however. An employee might post something about the business publicly which should not be shared. In addition, employees need to understand what gets posted for the public to see can have an impact on the work environment, especially if the employee is posting negative comments about the work environment or other employees. On the flip side, businesses can use social networks to monitor customer satisfaction. For example, if a customer is not happy with a product and he posts his feelings online, the company can contact the customer and try to resolve any problems. Since social networks have links to friends and family, seeing the company work hard to make things right with the customer might turn the potential loss of a customer into the chance to gain new customers. Telecommuting Technology has had a large impact on the business environment in terms of telecommuting. With broadband access and computers today, as well as smartphones, employees can work out of their homes, saving the company money by not needing as physically large a space to operate. With video conferencing, business meetings no longer need to be face-to-face, saving on air fare and hotel reservations. Page | 54 IT Management 2B Case Study and Group Work Look at the Company SEMAS below: Discuss what they are doing to combat some of the effects of modern technology such as calculators Look at your local Government and consider the ways it is deploying technology in the various areas of our society. Provide a holistic view first then provide a more detailed summary of the effects on Society. What are Companies like Google and Microsoft doing that impact educational organisations in terms of technology and cost? Page | 55 IT Management 2B SECTION THREE: INFORMATION TECHNOLOGY INVESTMENTS CONTENTS SECTION THREE: INFORMATION TECHNOLOGY INVESTMENTS ...................................................................... 56 3.1 LEARNING OUTCOMES ............................................................................................................................... 58 3.2 READING ..................................................................................................................................................... 59 3.3 INTRODUCTION .......................................................................................................................................... 60 3.4 TYPES OF INFORMATION TECHNOLOGY INVESTMENT DECISION MAKING PROBLEMS ...................................................... 61 3.5 INVESTIGATE THE FOLLOWING METHODOLOGIES. .................................................................................... 83 3.6 STRATEGIES FOR MAKING THE RIGHT IT INVESTMENT DECISIONS AND AVOIDING IT COSTS ............................................ 90 3.7 CONCLUSION .................................................................................................................................................. 91 Page | 56 IT Management 2B Think point How much has your organisation spent on Information Technology? Approximately how much of the company's annual turnover does this spend represent? Do you think the cost in Information Technology is justified by the return on investment? Page | 57 IT Management 2B 3.1 LEARNING OUTCOMES Analyse and evaluate the benefits and drawbacks of information technology investments After completing this chapter, you should be able to: Describe different types of IT investment decisions manager face. Briefly describe some of the methodologies that are used in IT investment decisionmaking. Explain some of the limitations that should be considered when using IT investment methodologies. Consider some strategies when facing Information Technology investment decisions.. Page | 58 IT Management 2B 3.2 READING Prescribed Reading: Schniederjans, M.J., 2004. Information Technology Investment: Decision-Making Methodology. World Scientific Pub Co Inc. See (Case Sensitive) https://docs.google.com/open?id=0B1ZF9spPlWD-Z2VjbVM4UExtYWs Paige Baltzan, A.P., 2009. Business Driven Information Systems. New York: McGraw-Hill. Page | 59 IT Management 2B 3.3 INTRODUCTION "Periods of business activity are often marked by and referred to as “ages” in the historical development of the field of business. According to most business historians we have advanced from the “age of information” into the “age of knowledge”. In both of these periods of time, information technology has been a determining factor in the survival and success of firms competing with one another. Those firms that know how to best invest in information technology have been and will continue to be the successors in this and future eras of business history. Regardless of your position in an Organization, investing in information technology may be the most important decision you will ever face in business. Unfortunately, investing in information technology is not as easy as common financial investment decisions. Careful consideration of financial and non-financial criteria may have to be included in the analysis to render an optimal solution. To make good decisions on information technology today requires the use of a variety of investment methodologies. These investment methodologies must be able to integrate the complexity of decision criteria in such a way that a decision choice is clear and clearly supported by the analysis. Today, just generating a decision is not enough. Information technology decisions must be supported by comprehensive inclusion of all relevant decision-making criteria."11 (Schniederjans, 2004, p.4) Mentions the productivity paradox and the research that was undertaken to establish the absence of a positive relationship between Information Technology spending and the resulting contribution to productivity or profitability. The results were contradictory as several researchers had evidence that supported each of their conflicting outcomes. Schniederjans indicates that this can be considered to be a metaphor on the subject of Information Technology invetsment decision making. The conclusion was: " That is, there are no single, simple methodologies that will give a consistent, reliable and optimal solution to mangers facing an IT investment decision. One type of investment methodology can suggest one alternative and another methodology a completely different alternative to an if investment decision choice. To try to help in this very complex decision situation, the purpose of this book is to explore a series of methodologies that can be used individually or in concert to help aid in IT investment decision-making." 12 11 12 (Schniederjans, 2004, p.vii) (Schniederjans, 2004, p.4) Page | 60 IT Management 2B 3.4 Types of Information Technology Investment Decision making problems Information Technology investment decisions get complicated due to the variety of choices that one can make in this area. "Hardware asset management Hardware asset management entails the management of the physical components of computers and computer networks, from acquisition through disposal. Common business practices include request and approval process, procurement management, life cycle management, redeployment and disposal management. A key component is capturing the financial information about the hardware life cycle which aids the organization in making business decisions based on meaningful and measurable financial objectives. Software Asset Management is a similar process, focusing on software assets, including licenses, versions and installed endpoints. Role of IT asset management in an organization The IT Asset Management function is the primary point of accountability for the life-cycle management of information technology assets throughout the organization. Included in this responsibility are development and maintenance of policies, standards, processes, systems and measurements that enable the organization to manage the IT Asset Portfolio with respect to risk, cost, control, IT Governance, compliance and business performance objectives as established by the business. IT Asset Management uses integrated software solutions that work with all departments that are involved in the procurement, deployment, management and expense reporting of IT assets. Goals of ITAM ITAM business practices have a common set of goals: Uncover savings through process improvement and support for strategic decision making Gain control of the inventory Increase accountability to ensure compliance Enhance performance of assets and the life cycle management Improve Availability Time of the Business/Applications/Processes. Process ITAM business practices are process-driven and matured through iterative and focused improvements. Most successful ITAM programs are invasive to the organization, involving everyone at some level, such as end users (educating on compliance), budget managers (redeployment as a choice), IT service departments (providing information on warranties), and finance (invoice reconciliation, updates for fixed asset inventories). Page | 61 IT Management 2B IT asset management generally uses automation to manage the discovery of assets, so inventory can be compared to ownership information. Full business management of IT assets requires a repository of multiple types of information about the asset, as well as integration with other systems such as supply chain, help desk, procurement and HR systems."13 The problems are: The decision has a monetary impact on the company. The decision need to be based on quantitative methods and qualitative measures . The decision cannot always be objective as the criteria being used is often complex and has multiple complicated dimensions of sub choices. Let us expand on the above points: The decision has a monetary impact on the company. The decision to purchase any Information Technology in any form has a twofold impact on the organisation. The first type is the actual cost of the purchase or rental of the software or hardware solution. The second not so obvious cost is the running costs of actually using the solution. The intention of the solution was to increase productivity and profits, but an incorrect choice can actually result in an even greater loss than if the organisation had not used the solution at all. An example of this is recent e-tolling solution that met public outcry. In a nutshell, there was a lot of new technology that was employed to deal with high speed road tolls. However the greatest issue was the public was never fully consulted. The company then made a massive investment in rolling this out, but the system was highly debated after it had been installed and may at the time of printing this be still unused. Read Below: READ THE FOLLOWING: "Even as a high court battle to stop the Gauteng e-tolling system played out in Pretoria, the government was sticking to its guns, saying the implementation of the tolling project had reached the point of no return. Presenting his R39-billion departmental budget for the next financial year in the National Assembly, Transport Minister S'bu Ndebele claimed that the Gauteng freeway improvement project had won the support of the majority of its users. But opposition parties - the DA, COPE and the African Christian Democratic Party - slammed the looming system, some branding it the ''most expensive in the world". Ndebele said a "huge majority" of the estimated 800000 regular users of Gauteng's freeways had given etolling the thumbs-up by buying e-tags. IT asset management - Wikipedia, the free encyclopedia. 2012. IT asset management - Wikipedia, the free encyclopedia. [ONLINE] Available at: http://en.wikipedia.org/wiki/IT_asset_management. [Accessed 30 June 2012]. 13 Page | 62 IT Management 2B "We are encouraged that 501245 e-tags have so far been sold and distributed to regular users of this road network. It's a clear indication that people are cooperating with us," he said. A court battle waged by various lobby groups to interdict the implementation of the Gauteng tolling regime is scheduled to resume today after a judge ruled that the matter was urgent. The tolling system is due to take effect at midnight on Monday. Opposition MPs are not impressed by Ndebele's assertions. The DA's Ian Ollis is leading the charge. "What we have been forced into with the e-tolls is the world's most expensive toll collection system,'' said Ollis. ''It will cost over R1-billion a year just to collect the tolls. That money will not go to upgrading highways but to the company that won the tender." Ollis argued that it would cost only R4-million a year to administer a "small fuel levy" increase instead of the "expensive tolls". The ACDP's Steve Swart weighed in, saying his party was opposed to the tolling of suburban roads because of rising fuel prices. He said the government should have thought about the high cost of collecting the tolls before it entered into the R20-billion agreement. "This tolling project will impose an indirect cost on the economy via the associated strikes and will impose a direct cost by increasing transport costs," he said. Ndebele hit back by insisting that there was "no way" the government would abandon e-tolling. "Who is going to say which road toll should be stopped? Which project do you want stopped because you've got R20-billion to pay . the road is there, you can't roll it away like a carpet. "It's your problem." He argued that the tolls had to be enforced to enable the SA National Roads Agency (Sanral) to repay its loan of R20-billion, used to finance the improvement of highways around Pretoria and Johannesburg in the last two years. He said failure to service the debt could cause it to skyrocket to R32-billion because of higher interest rates in the near future, and could compromise the credit rating of the government."14 COMMENT ON THE ABOVE. E-tolling a done deal, says Ndebele - Times LIVE . 2012. E-tolling a done deal, says Ndebele - Times LIVE . [ONLINE] Available at: http://www.timeslive.co.za/local/2012/04/26/e-tolling-a-done-dealsays-ndebele. [Accessed 30 June 2012]. 14 Page | 63 IT Management 2B The decision needs to be based on quantitative methods and qualitative measures . Besides the cost in the entire decision making process, the complicating factor is measuring the value of the Information Technology investment to the organization. In a nutshell the following are reasons and benefits that one needs to look at during the Information Technology Investments process. Means of achieving competitive advantage Poor investments can be a competitive disadvantage Avoid physical risks-Equipment Avoid managerial risks-Goals Organisational Strategic Planning in Information Technology Investment Decision making process Figure 19- MIS Hierarchical planning stages (Schniederjans, 2004, p.16) It is important to know where Information Technology investment and decision-making methodologies fits into the general framework of an organisation 1. Strategic planning stage: Senior managers are expected to be involved in developing specific systems to implement corporation-wide strategy, and also develop the strategies themselves. In this phase management has to weigh the risks against the rewards for expanding on Information Technology resources within the scope of the organisations mission or purpose. The outcomes of this stage is usually a general set of goals and objectives with corporate governance mandates. Page | 64 IT Management 2B 2. Tactical planning stage: Middle level managers are expected to implement the goals an objectives defined in the prior Strategy stage. This is where they will decide how to implement the stated goals and objectives. While the prior stage may have a 5 year schedule, this stage would break that down into smaller time chunks and what must be done in each time period. This is where the general plans are transformed into specific areas of work. The key outcome would be to determine the resources that would be required to achieve the desired work. It is at this stage the investment decisions on Information Technology are made. 3. Operational planning stage: The more detailed day to day work is planned and scheduled. Where tactical planning takes into consideration the total workload of a department, the operational planning stage targets individual goals and objectives. REMEMBER: Information Technology investment needs to use all three phases of planning: Strategic Tactical and Operation Planning Page | 65 IT Management 2B Page | 66 IT Management 2B The decision cannot always be objective as the criteria being used is often complex and has multiple complicated dimensions of sub choices. In the example (Schniederjans, 2004, p.7) of choosing a personal computer we see the number of ways we approach the problem, usually start of by looking at the cost factor and then looking at the options they can purchase depending on their need and what they can afford to get. The table below illustrate the sequential manner in which this is process is carried out. Figure 20- Complicated dimensions of sub choices What is Information Technology Investment ? Figure 21- A Management Information System - Allocating all resources to this can be considered to be an IT investment (Schniederjans, 2004) Page | 67 IT Management 2B Attempt the following questions and research further if you could not answer the questions. 1. Why is the “productivity paradox” important in IT investment decision making? 2. Why is there such diversity in the types of IT investment decision making problems? 3. What is the relationship between the components of an MIS and the use of IT investment decision making methodologies? That is, give examples of the MIS components that might require an investment. 4. Why is it important to consider the limitations of IT investment decision making methodologies in an analysis? 5. Why is it important to see where IT investment decision making fits into the overall planning of business organizations? Page | 68 IT Management 2B Read The Following Magazine Article- 15 MAGAZINE Architecture-Based IT Valuation Marc Lankhorst, Dick Quartel Wednesday, 31 March 2010 Supporting portfolio management and investment decisions This paper outlines our architecture-based approach to IT valuation and portfolio management. It sketches how different valuation criteria can be combined and linked to architecture models, and how a first part of this approach is implemented in an architecture modeling tool. In this manner, the value (costs & benefits) of different elements in the architecture can be computed and attributed to the various goals of the organization, thus supporting well-informed IT investment decisions. Introduction After almost half a century of IT developments, many large organizations face an unfavorable ratio between old (existing) IT and new IT. Because old IT systems tend to be monolithic, unwieldy and inflexible, organizations experience maintenance as difficult and modernization to meet new business demands as improbable. Some organizations spend up to 90% of their IT budget in 2009 on maintaining the existing IT landscape, leaving only 10% for innovation. If this trend of increasing budget requirements for existing IT is not reversed, then in the nearby future no budget at all will be available for new IT. In the worst case, innovation is squeezed out completely and budgets to spend on existing IT may become insufficient to perform crucial maintenance tasks. By focusing on the value of IT instead of considering costs only, organizations can decide which IT really contributes to their business goals and make a well balanced division into budgets for maintenance, exploration, realization and phasing out. Traditionally, IT has often been regarded only as a cost center in business case calculations. Its less tangible benefits have often been more or less neglected in portfolio management decisions. Furthermore, in the past information systems tended to be relatively stand-alone, supporting a single business silo. This made it easier to attribute its costs and benefits. Nowadays, however, IT systems and services are more and more interwoven with the business and may support many different activities, generate independent revenue streams, attract new business, et cetera. To create a clear insight in these effects, we need a valuation approach that takes as a starting point the overall coherence of the organization, its products and services, business processes, applications, and infrastructure, i.e., from the enterprise architecture. Enterprise architecture makes the connection between enterprise goals and the business functions, processes, people, IT systems and infrastructure required to reach these goals. It also considers the enterprise as an interrelated whole, instead of as a set of unrelated point solutions for problems. The valuation approach described in this paper uses enterprise architecture models to relate business goals to the IT artifacts, such as services, processes and applications that realize these goals. In this way, the KPIs associated with each goal can be related to the relevant attributes of the IT artifacts. This enables the development of automated and model-based techniques to analyze KPIs and business goals. Moreover, by performing such analyses as part of 15 http://www.via-nova-architectura.org/en/magazine/magazine/architecture-based-it-valuation.html Page | 69 IT Management 2B the architectural design process, different design alternatives can be assessed with regard to their contribution to business goals. The enterprise architecture foundation ensures that local optimization is avoided and enterprisewide effects of changes are taken into account. This paper describes the ingredients for an integrated IT valuation method that uses architectural models as its backbone. First, we explore the generic business requirements that comprise the high-level strategy of the organization with respect to its IT, such as its value center approach and operating model. These strategic choices determine the aspects that need to be taken into account when assessing the value of the IT portfolio. Next, we describe in more detail how business requirements can be modeled in conjunction with the enterprise architecture of the organization. This helps in realizing the requirements traceability that is needed to perform a well-founded portfolio assessment. Figure 1. Overall structure of our method. Business requirements and enterprise architecture are the main inputs for Bedell’s method, which computes the ‘value’ of IT systems. The method takes the importance of IT systems to the business and the effectiveness of their support and creates aggregate metrics across the entire IT landscape. Such metrics should preferably be as concrete as possible. We describe how to decide on such criteria and indicators for various aspects of the IT landscape that need to be evaluated. These include quality attributes such as the ‘-ilities’ well-known from software engineering, and risk analysis criteria. Finally, we give a first outline of a method in which the abovementioned ingredients are integrated, the structure of which is shown in Figure 1. Determining the IT strategy In putting a value to IT systems, projects and investments, it is highly important to first have a clear insight in the strategic choices the organization has made with respect to its IT operations. Venkatraman (1997) presents one approach to differentiation in IT goals: the value center orientation for IT. The main idea is that each center represents a different way of extracting value from IT resources. Note that the centers are interdependent. Venkatraman considers four different value centers (see Figure 2). ‘The cost center reflects an operational focus that minimizes risks with a predominant focus on operational excellence. Service center, while still minimizing risk, aims to create IT-enabled business capability to support current strategies. Investment center, on the other hand, has a longer-term focus and aims to create new IT-based business Page | 70 IT Management 2B capabilities. Finally, profit center is designed to deliver IT services to the external marketplace to realize incremental revenue as well as gain valuable learning and experience to become a world-class IT organization’. (Venkatraman, 1998). So on the one hand, there are the cost center and service center approaches, focusing on current business strategies. On the other hand, there are investment center and profit center that aim at maximizing opportunities from IT resources and shaping future business strategies. Figure 2. The concept of a value center (Venkatraman,1997) For each center, specific business goals and performance indicators can be defined. This approach with different IT strategies fits with the focus of the IT valuation method our applied research project is constructing. The business strategy and the matching value centers provide important input for the choice of valuation and assessment criteria for the IT portfolio. Cost center IT that is typically positioned in the cost center is not related to business goals. Examples are the operational infrastructure involving most data centers, telecommunications network and routine maintenance like installing and removing equipment, answering questions and administrative support. Specific performance metrics are used as decision criteria, which are not related to business metrics. Cost center works well when input and output can be clearly related, like doubling the budget results in a performance increase by factor 3. Relevant performance metrics are quantitative in nature, for example costs per unit of something, maintenance costs per unit, or costs per employee. Such measures need to be benchmarked against performance metrics of other organizations in order to be able to find opportunities for improvement. Service center The service center aims to create IT-enabled business capabilities that drive current business strategy. IT resources create tangible current business advantages. IT is strongly related to business goals. Investment decisions are not solely based on costs but rather on improving service provisioning. Whether an IT system is a cost center or a service center depends on the organization. In this way, an IT system can be considered as a service center for the one organisation and a cost center for the other. For example service characteristics such as minimize downtime and improve reliability can also be considered as performance metrics. The main question Page | 71 IT Management 2B in the service center category is whether an IT system gives the organization a competitive edge and differentiates the organisation from its competitors. So the purpose of use of an IT system is important and not the application and functionality in itself. From a service center perspective an organization should look at the degree that an IT system contributes to customer acquisition and retention. Investment center The investment center has a future orientation. It focuses on innovations, for example creating new business capabilities by means of IT. This requires more than IT. New business capabilities are created with a unique combination of structure, processes, systems and expertise. Investment centers should focus on more than technology. Next to IT investments complementary investments will be needed to realise a business capability. That is, IT investments become part of a total package. Investment center involves resource allocations based on strategic redirection and reliance on IT for business innovations. The real options approach fits with the investment center rather than traditional financial metrics, since the real options approach takes risks and uncertainties into account. The investment center should be run as a venture capitalist. It requires the forward look of a business innovator. Profit center The profit center has a focus on delivering IT products and services in an external marketplace. Next to financial benefits the intangible benefits should also be taken into account in investment decisions. The profit center needs an external, marketing orientation, instead of an internal captive monopoly. The profit center should work in value networks and partner with other companies in combining complementary skills and resources to deliver value. Operating model Next to the commercial strategy that is chosen for IT operations, as outlined in the previous sections, we also need to take into account the more operational aspects of the organization in defining an IT planning and valuation approach. As Ross, Weill and Robertson (2006) show with numerous case studies, successful enterprises employ an ‘operating model’ with clear choices on the levels of integration and standardization of business processes across the enterprise (Figure 3): 1. Diversification: different business units are allowed to have their own business processes. Data is not integrated across the enterprise. Example: diversified conglomerates that operate in different markets, with different products. 2. Replication: business processes are standardized and replicated across the organization, but data is local and not integrated. Example: business units in separate countries, serving different customers but using the same centrally defined business processes. Example: a fast food chain replicating its way of working through all its local branches. 3. Coordination: data is shared and business processes are integrated across the enterprise, but not standardized. Example: a bank serving its clients by sharing customer and product data across the enterprise, but with local branches and advisers having autonomy in tailoring processes to their clients. 4. Unification: global integration and standardization across the enterprise. Example: the integrated operations and supply chain of a chemicals manufacturing company. This operating model should fit both their area of business and their stage of development. Page | 72 IT Management 2B Ross et al. explain the role of enterprise architecture as the organizing logic for business processes and IT infrastructure, which must reflect the integration and standardization requirements of the operating model. For example, ERP systems are used extensively by companies that have a unification strategy, since these systems are well-suited for both sharing data and standardizing business processes across the enterprise. In a diversification scenario, however, investing in an ERP system might be a wrong choice, since the varied collection of business processes and localized data do not lend themselves to the ‘one size fits all’ approach of such a system. Figure 3. Operating models (Ross et al., 2006). Next to this operating model, they provide a stage model of the architectural development of organizations: 1. Business silos: every individual business unit has its own IT and does local optimization. 2. Standardized technology: a common set of infrastructure services is provided centrally and efficiently. 3. Optimized core: data and process standardization, as appropriate for the chosen operating model, are provided through shared business applications (e.g. ERP or CRM systems). 4. Business modularity: loosely coupled IT-enabled business process components are managed and reused, preserving global standards and enabling local differences at the same time. 5. Dynamic venturing: rapidly reconfigurable, self-contained modules are merged seamlessly and dynamically with those of business partners. In practice, most companies are still in stages 1–3. Investment decisions should be guided by the chosen operating model and the current and desired stage of an organization. E.g. if an organization wants to move from stage 1 to stage 2, the focus should be on standardizing and centralizing IT infrastructure in order to achieve efficient operations. The contribution of IT systems and projects to achieving the desired stage, in concordance with the chosen the operating model, should be a core criterion in valuating these systems or projects. Another reason for using enterprise architecture in investment decisions is that it provides a coherent view of the various dependencies between IT systems and of their contribution to business processes and services, and hence of the broader effects of a localized IT investment decision. Describing business requirements Knowing what the overall IT strategy and resulting operating model is, is only a first step. Next, we have to make Page | 73 IT Management 2B these strategic choice more concrete and define the resulting business goals and requirements are. Business requirements management denotes the early phase of the requirements management process that is concerned with the identification, description, analysis and validation of requirements at business level and their realization in enterprise architecture. These requirements are a reflection of the business strategy and provide a concretization of this strategy. A desired organizational and/or technical change requires the investigation of the stakeholders that are involved and their concerns regarding the change. New goals and requirements are identified, or existing ones are changed, to address these concerns. Analysis of these goals and requirements is needed to guarantee consistency and completeness, and to propose one or more alternative architecture designs that realize the goals and requirements. Validation of these alternative designs aims at assessing their suitability and selecting the best alternative. In this way, business requirements capture the motivation and rationale behind (the design of) enterprise architectures. Furthermore, architecture artifacts, such as business services, processes and supporting software applications, are related to the (high-level) goals and requirements they originate from. Or put in another way, goals and requirements can be traced towards the architecture artifacts that realize them. This traceability between goals and requirements on one side and architecture artifacts on the other side is important to valuate these artifacts. In the context of this work, the valuation of artifacts that represent or require IT support is of particular interest. The valuation of some artifact in terms of the allocation of costs and benefits may largely depend on the goals and requirements to which the artifact contributes. Problem chains Requirements engineering (RE) is concerned with the process of finding a solution for some problem. This concern can be approached from a problem-oriented view, which focuses on understanding the actual problem, and a solution-oriented view, which focuses on the design and selection of solution alternatives. Problem- and solution-oriented requirements engineering can be considered as two consecutive or complementary phases. Iterations of these phases may be applied to address a problem progressively, i.e., in multiple, successive steps. From this perspective we can identify so-called problem chains, where each chain links a problem to a solution such that the solution is considered again as a problem by the next chain. For example, a business analyst may investigate a business problem and specify a business solution for this problem. This new solution may require IT support, therefore becoming a problem for the IT analyst. Figure 4 illustrates the notion of problem chains. Figure 4. Problem chains Problem chains link requirements engineering to enterprise architecture. This is illustrated in Figure 5. The why column represents the problem-oriented view and defines the business needs, goals, requirements and usecases that should be addressed. The what column represents the solution-oriented view in terms of enterprise Page | 74 IT Management 2B architecture artifacts, such as services, processes and applications. These architecture artifacts define what the enterprise must do to address the business needs, goals, requirements and use-cases. At the same time, these requirements engineering artifacts motivate and justify why the enterprise architecture is defined the way it is. Figure 5. Relation between requirements engineering and enterprise architecture Requirements management and enterprise architecture Following the idea of problem chains enables an iterative way of working. Given some problem, the first step is to analyze the problem and elicit goals and requirements that address the problem. These goals and requirements are represented by a requirements model. The second step is to conceive a composition of products, services, processes and applications that realizes the goals and requirements. This composition is represented by an enterprise architecture model. Both steps can again be repeated for (the problem of) realizing the elements of the architecture. Figure 6. Relation between requirements and architecture models Figure 6 illustrates the relationship between requirements and architecture models, and indirectly, also the relationship between the requirements management and enterprise architecture processes. These processes are typically divided into distinct phases, which results in a series of requirements and architecture models such that models in succeeding phases refine models from preceding phases (as represented by the dashed arrows). For example, Figure 6 illustrates a process of two phases: the design and realization of some enterprise architecture. Requirements engineering cycle The idea of problem chains distinguishes two views on an architecture model: (i) as a design artifact that represents a solution for some design problem, and (ii) as a frame of reference that delimits the design or Page | 75 IT Management 2B solution space. These views are illustrated in the left part of Figure 7. Figure 7. Views on an architecture model In general, requirements engineering starts with some organizational goal that needs to be addressed. This issue cannot be approached ‘from scratch’, but has to take the current organization into account, as represented by architecture model A1. This means that any requirement or goal in requirements model M should be defined ‘relative’ to architecture A1 in order to address the change. In this situation, architecture A1 acts as a frame of reference for (problem-oriented) requirements engineering. Subsequently, a new architecture A2 is designed that realizes a solution for the requirements and goals in model M. In this situation, architecture A2 is considered a design artifact that results from (solution-oriented) requirements engineering. The right part of Figure 7 depicts a further decomposition of requirements engineering into three steps: Problem investigation, which focuses on the problem, i.e., the organizational change, by identifying and analyzing its cause in terms of the involved stakeholders and their concerns, and by setting goals to deal with the change. Investigate solution alternatives, which refines the goals in order to find possible solutions to realize them. Analyses are performed to reveal conflicts between (refined) goals or contribution relations between goals in which goals contribute positively or negatively to other goals. Typically, these analyses trigger the identification and elaboration of alternative solutions. Solution validation, which validates alternative solutions and chooses the ‘best’ among them. This choice is amongst others influenced by the conflict and contribution relations that have been identified. These steps constitute a generic requirements engineering cycle that can be repeated at successive phases in the development of some enterprise architecture, as indicated by the dashed arrows in Figure 7. Furthermore, the identification, analysis and refinement of solution alternatives in the second step may be repeated as well, leading to ‘sub-cycles’. In Quartel, et al. (2009), a method and modeling language, as an adjunct to the ArchiMate language (Lankhorst et al., 2009), have been presented that support business requirements management as outlined above. In this paper, we will not go deeper into this topic, but merely use these ideas in an example below. The interested reader is referred to the aforementioned publication. Computing aggregate IT valuations Page | 76 IT Management 2B In the previous sections, we addressed the business strategy and requirements that provide the context for determining the value of an organization’s IT portfolio. In the context of our method, the value of the IT portfolio is related to the way in which IT projects and applications support these strategic goals and requirements. To assess such a portfolio, the contributions of its various elements to the goals of the organization must be determined. Note that this method does not provide a direct link with the effects of IT projects, and hence of the organization, on the outside world; rather, it assesses the contribution of the IT portfolio to the organization’s goals, which in turn may contribute to such external effects. A contribution can be divided into two elements: its importance to a business goal and the quality or effectiveness in supporting that goal. The value of an organization’s IT portfolio thus depends on the contribution that its constituent elements provide to the business. An interesting and useful way of computing an IT portfolio’s value based on these business contributions is Bedell’s method (Schuurman et al., 2008). This method answers three questions: 1. Should the organization invest in information systems? 2. On which business processes should the investment focus? 3. Which information systems should be developed or improved? The underlying idea of the method is that a balance is needed between the level of effectiveness of the information systems and their level of strategic importance. Investments are more crucial if the ratio between the effectiveness of an information system and its importance is worse. In order to calculate this ratio, the following information needs to be determined: The importance of each business process to the organization. The importance of information systems to the business processes. The effectiveness of the information systems to the business processes. Based upon this information, three portfolios are calculated: for the organization as a whole, its business processes, and the information systems that support these processes. Figure 8 depicts an example of all three portfolios and associates a general investment decision to each quadrant of the portfolios. A dashed arrow points to the ideal position of some organization, business process or information system (IS) in the portfolio. Figure 8. Investment portfolios The prioritization of investment proposals is determined by the contribution of each information system, which is defined as the product of its importance and the projected improvement of its effectiveness. In addition, the value Page | 77 IT Management 2B of the investment can be evaluated by calculating a so-called project-return index. This index relates the contribution of the information system to the development costs. Foundation Bedell’s method is well-suited to be used in combination with enterprise architecture models. Figure 9 depicts the architecture elements on which the method operates: a business actor that represents the organization as a whole, the business processes of the organization, the activities that are performed by the business processes, and the information systems that support these activities. The architecture elements are represented in the ArchiMate language (Lankhorst et al., 2009). For convenience, the ‘used by’ relation is used to relate the architecture elements, except for the aggregation relation between an individual ‘Information system’ (represented as an application service) and the collection of (all) ‘Information systems’. As noted before, Bedell assumes the following restrictions on the architecture model: (i) a business process may comprise multiple business activities, but a business activity contributes to only a single business process, and (ii) a business activity is supported by a single information system (represented as an application service), and an information system supports only a single business activity. Figure 9. Bedell’s method and enterprise architecture The names that are annotated to the ‘used-by’ relations in Figure 9 represent the variables that need to be determined as input to the calculation of the investment portfolios as depicted in Figure 8: IBO = the current Importance of some Business process to the Organization; IAB = the current Importance of some Activity to some Business process; IIB = the potential Importance of Information systems to some Business process; ESA = the current Effectiveness of some Information System to some Activity. Plotting portfolios The information obtained from computing these indicators can be shown graphically, as illustrated by the figure below. This type of plot is familiar to anyone who knows the business value – technical value diagrams used by, for example, the ASL methodology, in particular its Application Lifecycle Duration Measurement Method (ALMM). Page | 78 IT Management 2B Figure 10. Example of an activity level portfolio Figure 10 depicts an example of an activity-level portfolio. The importance of an activity to a business process is represented by variable IAB at the y-axis. The effectiveness of a single information system in supporting an activity is represented by variable ESA at the x-axis. Similar plots can be made at the business process and organizations levels. In Bedell’s method, an information system is considered effective when it is cost-effective, has high technical quality and is functionally appropriate. It is considered strategically important when the activities it supports are crucial to a business process or the organization in obtaining its strategic objectives. The prioritization of investment proposals is determined by the contribution of each information system, which is defined as the product of its importance and the projected improvement of its effectiveness. In addition, the value of the investment can be evaluated by calculating a so-called project-return index. This index relates the contribution of the information system to the development costs. However, the determination of all these variables is rather subjective and lacks concrete guidance. Hence, we need more concrete measurements of the properties of the IS landscape. Tool support The input variables IBO, IAB, IIB and ESA can be defined as attributes of the used-by relation in an ArchiMate enterprise architecture model. This allows one to calculate the portfolios of Bedell’s method automatically. For this purpose, the BiZZdesign Architect tool has been extended with a valuation profile for Bedell’s method and a viewpoint for each portfolio. Figure 11 depicts part of the example from (Schuurman et al., 2008) as modeled in ArchiMate. In addition the figure shows the profile properties in the Architect tool that are used to represent the Bedell variables, including the labeling of some of the architecture elements with the values of the properties. Page | 79 IT Management 2B Figure 11. Valuation profile for Bedell’s method The portfolio viewpoints calculate the values of the variables at the axes of the portfolios as explained before. This information can be shown in a table (Figure 12) or in graphical form (Figure 13). Figure 12. Business process portfolio in BiZZdesign Architect Page | 80 IT Management 2B Figure 13. Business process folio in Excel Expressing and assessing value For assessing an IT portfolio, specific measures are needed as input for decision making. These measures or KPIs should be derived from the business goals. Bedell’s method uses ‘importance’ and ‘effectiveness’ as major criteria, which are both single measures related to an application or business process. The notion of ‘effectiveness’ (or rather ‘quality’) is broad and it depends on the value center approach that the organization chooses. For a service center approach, for example, customer satisfaction is an important criterion; the effectiveness with which a system supports this may depend more on aspects such as usability. For a cost center, low maintenance and efficient usage of resources is important, and for an innovation center, flexibility of a system is essential to obtain an effective support of future capabilities. Although the scope of the concept of effectiveness is large, the various views can all be related to concepts of IT quality that are addressed in the ISO 9126 standard for software quality (ISO/IEC, 1991). Although this standard was originally intended for classifying various types of requirements posed to a system before it is built, the attributes can also be used to assess its qualities after it has been constructed. The notion of ‘importance’ is more difficult to address. Although methods such as ASL [Van der Pols & Backer, 2006] provide questionnaires to investigate the business value of applications, much of this value is dependent on, for example, the value of the information a system provides to the business, the value of future opportunities opened up by IT, or the value of customer satisfaction created by a user-friendly system. A future project phase might pay more attention to these types of value assessments. One important category of indicators related to importance addresses risk. Risk in general is one of the criteria on which managers base their investment decisions. ‘Risk’ is often defined as the effect of uncertainty on business goals (e.g. in the ISO 31000 guide (ISO, 2009)). In the value center approach, ‘risk propensity’ is an important factor in the type of value center. The cost and service centers aim for low-risk operations, whereas the profit and investment centers allow for higher risks in order to obtain possible (but uncertain) gains from future business opportunities. There are also risks concerned with failure of projects. To provide the connection between the IT strategy and value center approach, we have investigated a first mapping between the four value centers and the specific indicators that are most relevant for these centers. Further research is needed to come up with concrete indicators that can be used within the context of the method outlined in the previous sections. Furthermore, decision making, whether the decisions apply to IT or not, is rarely performed under conditions of complete certainty. We will have to deal with these uncertainties and the risks associated with these decisions. Bayesian networks (Johnson et al., 2007) are an established mathematical Page | 81 IT Management 2B technique to deal with uncertainties in networks of dependencies like enterprise architectures. Another challenge is dealing with imprecise measures. If one asks an expert or managerial opinion on a qualitative aspect of an IT system, his or her answer is often expressed in rather vague terms, for example: ‘this system is rather good’, ‘this business process is very important’. But what does ‘rather good’ or ‘very important’ mean? Techniques such as fuzzy logic (Zadeh, 1965) could be used to express and reason about such terms. Putting it all together If we put all the elements described in the previous sections together, we arrive at the figure below. The value of an artifact or project is determined by its contribution to the achievement of business goals. Its contribution is loosely defined by ‘importance x quality / effectiveness’ of the artifact. Business goals are translated into (operational) requirements on the enterprise architecture and into the structure of its operating model, and further refined into KPIs for the artifacts. ‘Importance’ can be determined by assessing the ‘strength’ of the relations between the business goals and the artifacts. ‘Effectiveness’ or ‘quality’ is determined by measuring the identified KPIs. Based on these measures of importance and effectiveness, we can then determine the value of the artifacts. Decision making and evaluation of alternatives based on the valuation of an IT portfolio will require an assessment of multiple aspects. An obvious case is the combination of financial aspects (e.g. direct cost, TCO, ROI, NPV) in relation to measures of business and technical value or effectiveness and importance, as described in the previous sections. Established financial instruments such as TCO or ROI calculations do not use the architectural structure and dependencies but do their computations only on the individual elements present in the portfolio. The outcomes of these techniques should of course be taken into account in making IT investment decisions. Each of these techniques results in some assessment or valuation. These results alone are of course not enough. Given an assessment of the cost, returns and qualities of different alternatives, for example renovating an application, replacing it completely, or leaving it as-is, how can the organization decide upon such a multitude of inputs? Rather than use a separate method for each of these assessments and combining the results by hand, our ultimate goal is to develop a flexible plug-in architecture for architecture-based valuation methods, in which different criteria can be combined using a central framework for multi-criteria analysis. Our aim is to provide an integral approach that can be implemented in tools for architectural design and analysis, to provide optimal support for architects and IT managers. Moreover, using these techniques as part of the architectural design process, the value of using enterprise architecture as a foundation for decision making is strengthened. Different design alternatives can be assessed on their contribution to business value and well-informed decisions can be made that take the enterprise-wide effects of changes into account. In summary the above article should be looked at in the light of Information Technology investment, however as an Information Technology manager, its very simple! Know what you want and need before you invest, therefore one must have a proper design that will feed and service the goals of the organisation, and then make Information Technology investments based on this planned design. Page | 82 IT Management 2B 3.5 INVESTIGATE THE FOLLOWING METHODOLOGIES. Use this https://docs.google.com/open?id=0B1ZF9spPlWD-Z2VjbVM4UExtYWs Attempt explaining the following methodologies after reading (Schniederjans, 2004) - This is an important reading to understand the following and cannot be all explained here without making this section of the book far too long. Here is the summary of what you will find in that book. Description Type of criteria Tangible Application Benchmark Technique Construct a computer program to be run by vendors so as to determine the run time of individual computer system configurations Application Transfer Team Conduct a study to determine exact requirements of the IT and to support the business case Automatic Value Points Calculate the degree of automation based on a set of criteria concerning the contribution of IT to the overall business performance Tangible and intangible Tangible and intangible Bedell’s Method Calculate contribution of an IT system by multiplying an importance score by the level of quality improvement made by the system Tangible and intangible Information Economics Calculate the overall value of an investment based on enhanced ROI, business domain, and technology domain criteria Make a financial comparison between the organization and its competitors, examine the portfolio of existing applications and prepare the business case for areas with expected high returns Tangible and intangible Tangible and intangible Investment Mapping Calculate evaluation criteria scores and plot investment alternatives on a grid Investment Portfolio Calculate contribution of IT system to business and technology domain and calculate financial consequences (NPV) of the system Tangible and intangible Tangible and intangible Information Systems Investment Strategies Page | 83 IT Management 2B Information Economics Calculate the overall value of an investment based on enhanced ROI, business domain, and technology domain criteria Tangible and intangible Information Systems Investment Strategies Make a financial comparison between the organization and its competitors, examine the portfolio of existing applications and prepare the business case for areas with expected high returns Tangible and intangible Investment Mapping Calculate evaluation criteria scores and plot investment alternatives on a grid Investment Portfolio Calculate contribution of IT system to business and technology domain and calculate financial consequences (NPV) of the system Tangible and intangible Tangible and intangible Investment Portfolio Calculate contribution of IT system to business and technology domain and calculate financial consequences (NPV) of the system Tangible and intangible Knowledge Based System for IS Evaluation Obtain an overall quantitative rank based on traditional capital budgeting techniques and an overall qualitative rank of projects based on rules established by MIS planning groups and MCDM models Tangible and intangible MIS Utilization Technique Calculate the overall success of an IT investment based on 48 performance criteria Process Quality Management Analyze mission, critical success factors and key business processes to identify areas for IT investment Tangible and intangible Tangible and intangible Page | 84 IT Management 2B RequirementsCosting Technique Description Calculate total cost of an investment as cost of the mandatory features plus additional costs for desirable but not included features Type of criteria Tangible Return on Management Calculate the return of an investment that can be attributed to management productivity Tangible SESAME Compare the cost of a computer system with the cost of performance without a computer system Tangible SIESTA Assess benefits and risks of the fit between IT technology strategy/infrastructure and business strategy/infrastructure Mostly intangible Strategic Application Search and Systems Invest. Meth. Analyze the extent of existing systems and identify the most productive areas for future investment Intangible Value Analysis Establish value of a system (and/or prototype) by asking management simple value-related questions and compare that value to investment cost Tangible and intangible Ward’s Portfolio Approach Assess risk of investment and risk of the portfolio of investments after undertaking investment Tangible and intangible Zero-based budgeting Partition projects into smaller projects, assess each smaller project based on the same evaluation framework, and select the most important smaller projects assuming limited funding Tangible and intangible Balanced Scorecard Evaluate an investment from the user’s, business value, efficiency, and innovation/ learning perspectives Tangible and intangible Boundary Values/Spending Ratios Cost Displacement/ Avoidance Calculate the ratio of IT cost to a known aggregate value (total sales, total assets, etc.) Tangible Compare the cost of IT investment to the current costs displaced by the IT system plus the projected costs avoided by the system Tangible Cost Effectiveness Analysis Compare the effectiveness of a system with its cost and select the system with the lowest cost, best effectiveness, or the optimal combination of both Tangible and intangible Page | 85 IT Management 2B Description Obtain, compare, and rank factors critical to business success, and based on these rankings, deduce investment priorities Type of criteria Intangible Hedonic Wage Based on employee activity time allocation, calculate the marginal value of each employee and use these values to estimate the value of IT investment benefits Tangible Real Options Valuation Calculate additional value of investment that exists because it provides the option for a second investment Tangible and intangible Quality Engineering Translate perceived value and risk into a quality score Survey and compare user and IS professionals’ opinions on the effectiveness and importance of installed systems Intangible Critical Success Factors Satisfaction/ Priority Surveys Intangible Structural Models Create a model to analyze how an information Tangible and intangible system affects the costs and revenues of the particular business function or line of business it is intended to serve Time Savings Times Salary Calculate the value added of an IT investment by estimating the percentage of time the system will save workers and multiply by the cost of the workers Tangible Value Chain Analysis Assess how an IT investment can provide competitive advantage in each phase of the chain Tangible and intangible (Schniederjans, 2004) In a macro economic sense, a firm operates within an industry and within global markets. The integration of IT creates linkages between all possible stakeholders that are connected to or do business with any firm. Stakeholders in a macro economic sense include the external partnering companies that help the firm perform their business functions, their supply-chains that link firms together in their industry and with other supply-chains, the REMEMBER: If a firm in a particular industry does not make the right IT investment decision, then all stakeholders can be negatively impacted and incur costs government, and society as whole. Page | 86 IT Management 2B If a firm in a particular industry does not make the right IT investment decision, then all stakeholders can be negatively impacted and incur costs. IMPACT OF STAKE HOLDER AND COSTS Stakeholder Examples of macro economic costs Industry customers Poor IT decisions could cause the firm to go out of business. That reduces competition and increases the likelihood of higher prices to customers. It also diminishes the quality of selection of products within the industry to all customers. Industry members Poor IT decisions could cause the firm to go out of business, which could diminish the industry’s demand for supplies, and in turn possibly diminish the supply-chain network that support other companies in the same industry. Industry partners and supply-chain members Poor decisions on IT can burden suppliers, vendors, and consultants forcing them to incur needless costs to maintain equally poor IT that may not serve their internal needs. Poor IT and the interfaces across supply-chains can slow down communications, making them less efficient and more costly for all members. Since in economic theory all supply-chains are linked together, diminishing one supply-chain will have a negative impact on all those other supply-chains that are linked to it. Government Poor IT can inhibit information between the firm and the government agencies in monitoring problems. Earlier detection of problems and notification by the government might save the firm unnecessary rework costs. Poor IT can also burden the government in their efforts to do a better service for all society and increases the government’s costs. Society Poor IT can delay, delete, and cancel customer orders causing frustration and costs of all kind. Poor IT investments will eventually be passed on to the consumer, which means needless higher costs to them. Some bad decisions can cause an entire company to go out of business, resulting in the loss of jobs to the employees and revenue to their local economies. MICRO ECONOMIC VIEW IT asset risks to hardware, software, and data Vulnerability due to access can cause law suits due to revealing sensitive customer information IT staff risks Employee training exceeds estimates requiring additional expenses IT design and development risks Failure to obtain anticipated benefits adds to cost of operations IT implementation risks Costs that exceed estimates Page | 87 IT Management 2B Vulnerability due to piracy or theft requires replacement costs Changes in salary to match new technology skills increases expenses IT unable to support current business operations requires ongoing and additional future expenditures to fix Time exceeding estimates can cause lost customers and penalty costs Vulnerability due to purposeful or accidental deletion Management time exceeds expectations IT unable to support future business operations requires ongoing and additional future expenditures to fix Unexpected user resistance to using IT can cause lost productivity adding to operating expenses Vulnerability due to natural disasters can cause a loss of customers Employee motivation drops as time increases, requiring overtime expense Incompatibility or integration system failures requires ongoing and additional future expenditures to fix Changes cause temporary loss of productivity adding to operating expenses (Schniederjans, 2004) Page | 88 IT Management 2B Group Work Please research the following methodologies for Information Technology Investment: It is required to do this reading and research to understand strategies for making the right IT investment decisions and avoiding IT costs. METHOD: Accounting rate of return: Analytic hierarchy process: Application benchmark technique: Application transfer team: Automatic value points: Balanced scorecard: Bayesian analysis: Bedell's method Buss's method: Benefits-risk portfolio: Benefit assessment grid: Breakeven analysis: Boundary value: Cost benefit analysis: Cost benefit ratio: Cost displacement/avoidance: Cost effectiveness analysis: Cost-value technique: Cost revenue analysis: Critical success factors: Customer resource life cycle: Decision analysis: Delphi evidence: Executive Planning for Data Processing: Functional Analysis of Office Requirements: Gameplaying: Hedonic wage model: Information Economics: Investment mapping: Investment portfolio: Information systems investment strategies: Knowledge based system for IS evaluation: MIS utilisation technique: Multi-objective, multi-criteria methods: Option theory: Potential problem analysis: Profitability index: Process quality management: Quality engineering: Return on investment: Return on management: Requirements-costing technique: Schumann's method: SESAME: Seven milestone approach: Strategic application search: Strategic option generator: SEE: REQUIRED READING AT START OF CHAPTER. Page | 89 IT Management 2B 3.6 Strategies for Making the Right IT Investment Decisions and Avoiding IT Costs Schniederjans says "IT value and implementation must be discussed in the context of the organization’s goals, strategies, tactics, operational plans, and culture. In order to determine a payback, you must determine the benefits as they help an organization achieve their goals Executive managers, not IT managers, should determine strategic allocation decisions. The total amount of funds to invest in IT, which business processes should receive funding and which IT capabilities are needed organization-wide are decisions that executive managers or vice presidents (VPs) should make, not IT managers In order to measure IT value and its performance over time, utilize many measures of contribution and performance. The fastest way to fail in IT value measurement is to limit an analysis of cost or benefits to just a few points in an information system or just a few measures of performance General guidelines on issues of security and privacy risks, project failure risks, and the quality of IT services should be determined by executive managers and not IT managers. Security, privacy and project failure risks can be very large risks, involving the potential destruction of the entire organization. They are, therefore, serious enough for executive managers, CIOs or VPs to have a hand in establishing their willingness to access these risks. IT evaluation methods must evolve with the organization. Organizations change over time, IT adapts to those changes, and the measurement methods and systems used to monitor and assess the value of IT must also change Recognize the limitations of the IT investment methodologies at each phase of the IT investment decision process. These limitations may in some cases disqualify methodologies from being applied, and rightfully so Recognize in all the selection processes mentioned above that the IT manager has potential biases that can preclude the right IT decision choice from the analysis. Making the right decision on both the criteria to include in the IT investment decision analysis and the methodology to use requires decision making skills that make us aware of factors that may bias our decision process. 16" 16 (Schniederjans, 2004, p.375) Page | 90 IT Management 2B 3.7 Conclusion If you make the right IT decisions, you will end up with an investment that helps your organization to introduce, create or enhance a competitive advantage Improving organization agility: One of the most important competitive advantages in today’s markets is the ability to be agile or develop the capacity to react quickly and successfully to change so as to compete effectively in many developed and emerging global markets. Helps organizations adjust marketing mix factors to better compete: As markets for products change, so do what customers look for in a product change. Successful firms must change their marketing efforts to match the consumer expectations in the mix features offered with a product. A means of identifying strategic external competitive intelligence: Implicitly or explicitly an organization’s strategic intelligence is a pre-requisite for change, and that effective investments in IT represent a critical requirement for implementing the changes that will take place as a results of that intelligence Reducing IT investment costs: The right decision on IT investment sometimes means not making an investment at all REMEMBER: Invest in Information Technology to: Improve agility, marketing efforts must match consumer expectations Strategic intelligence is a pre-requisite for change Information Technology investments should be made only after proper investigation Sometimes you should not invest at all at that moment! Page | 91 IT Management 2B SECTION FOUR: BUSINESS INTELLIGENCE CONTENTS SECTION FOUR: BUSINESS INTELLIGENCE ....................................................................................................... 92 4.1 LEARNING OUTCOMES ............................................................................................................................... 94 4.2 READING ..................................................................................................................................................... 95 4.3 INTRODUCTION ............................................................................................................................................... 96 4.4 WHAT IS BI? ................................................................................................................................................ 97 4. 5 REASONS FOR BUSINESS INTELLIGENCE................................................................................................................ 98 4.6 BENEFITS OF BUSINESS INTELLIGENCE .................................................................................................................. 99 4.7 FACTORS INFLUENCING BUSINESS INTELLIGENCE .................................................................................................... 99 4.8 FUTURE OF BUSINESS INTELLIGENCE .................................................................................................................. 103 4.9 CONCLUSION ................................................................................................................................................ 109 GROUP WORK .................................................................................................................................................... 110 Page | 92 IT Management 2B Think point One of the critical areas for success within an organisation is doing their homework. What must the organisation do to in terms of the decisions it makes in order increase profits and its success? Who said to succeed in war, one should have full knowledge of one's own strength and weaknesses and full knowledge of the enemies strength and weaknesses? How can we turn the tide on being data rich but information poor? Page | 93 IT Management 2B 4.1 LEARNING OUTCOMES Understand that smart business decisions are based on factual information that is constantly being analyzed Understand what Business Intelligence is? Understand why we would want to use Business Intelligence Understand how to use various tools in the Business Intelligence process. Page | 94 IT Management 2B 4.2 READING Recommended Reading: Reynolds, George W. (2010) Information Technology for Managers, International Edition. United States of America: Cengage Learning DETAILS: Chapter of Book that should be read. Chapter 1: Managers: Key to Information Technology Results. Chapter 2: Strategic Planning. Chapter 8: Enterprise Resource Planning. Chapter 9: Business Intelligence. Chapter 10: Knowledge Management. Williams, B and Sawyer,S. (2010) Using Information Technology, 8th Edition. USA, New York: Mcgraw-Hill Paige Baltzan, A.P., 2009. Business Driven Information Systems. New York: McGraw-Hill. DETAILS: Chapter of Book that should be read. Chapter 1: Information Systems in Business Chapter 2: Strategic Decision Making Chapter 3: E-Business Chapter 5: IT Architectures Chapter 6: Databases and Data Warehouses Chapter 8: Supply Chain Management Chapter 9: Customer Relationship Management Chapter 10: Enterprise Resources Planning and Collaboration Systems Web Links Please view as many of these presentations as you wish: BTI Presentations. 2012. BTI Presentations. [ONLINE] Available at: http://www.bolder.com/presentations.htm. [Accessed 17 May 2012]. Page | 95 IT Management 2B 4.3 Introduction Gartners 2008 17 CIO survey highlights that Business Intelligence (BI) is of extreme importance to all CIO's. The Business performance of an enterprise can dramatically improve when decisions are no longer just decisions, but smart decisions based factual relevant information. If you are just learning about BI or trying to build BI into your own businesses and you are not sure where to start or how to proceed, then you are not alone. It is a challenge to design a successful BI. Some key contributing factors will be the selection of people, processes and technology and how they "gel" together to create a cohesive working system. BI helps you to get all the facts needed to make critical and well-timed decisions that will achieve the objectives of advancing business. By making the very best use of the information available, smart decisions can be made which are geared towards the objectives of the company, however this needs to be tempered by a conscious approach of the dynamics of staff and resources within the organisation. In a nutshell you must establish a strategy before you bring technology or techniques into play. It is extremely important to understand the factors which influence BI and learn how to design an effective BI strategy. Prior to starting work on a BI strategy, you must document your overall business objectives to help formulate BI vision for the growth of business. After documenting the initial list of key objectives, you should work with the key stakeholders to confirm the validity of items on the list and their prioritization. This will ensure that you start building your BI strategy with a proper foundation aligned with your business and with the buy-in from stakeholders. Scope of BI should include making the best use of information for strategic, tactical, and operational needs. Your purpose in building BI strategy is to help business with long-term planning, help middle management with tactical reporting, and help operations with day-today decision making to run the business efficiently. BI is all about REMEMBER: To help formulate BI vision, you must document your overall business objectives Then you should work with the key stakeholders to confirm the validity of items on the list and their prioritization providing people with the information they need to do their jobs more effectively. A wide range of BI services needs to be provided to meet a wide range of requirements. Scope of BI Strategy should be determined by the business drivers and business goals. Scope should always account for the changing 17 Gartner, Gartner identifies the top 10 Strategic Technologies for 2009, October 2008 Page | 96 IT Management 2B business requirements to keep the BI strategy aligned with business. You should not limit your ability to apply the principles with a restrictive BI strategy. BI strategy should include a broad set of processes, technologies, and stakeholders for collecting, integrating, accessing, and analyzing information for the purpose of helping enterprise make better business decisions. BI solutions should enable users to be able to quickly adapt to new business requirements and evolving sources of information. Overall, BI vision should be planned in advance of any iteration being implemented. It is vital to establish a BI vision to ensure that implementation of specific components fits in the overall BI strategy. BI strategy should state and document the needs as identified by the stakeholders, highlighting how BI fits into the broader enterprise vision. BI strategy should take into consideration appropriate framework, methodology, processes, governance, systems, and technology to deliver value that aligns with the business objectives and priorities. 4.4 WHAT IS BI? According to Baltzan and Philips, Business intelligence (BI) refers to applications and technologies that are used to gather, provide access to, and analyze data and information to support decision making efforts. "Business intelligence (BI), relates to the intelligence as information valued for its currency and relevance. It is expert information, knowledge and technologies efficient in the management of organizational and individual business. Therefore, in this sense, business intelligence is a broad category of applications and technologies for gathering, providing access to, and analyzing data for the purpose of helping enterprise users make better business decisions. The term implies having a comprehensive knowledge of all of the factors that affect your business. It is imperative that you have an in depth knowledge about factors such as your customers, competitors, business partners, economic environment, and internal operations to make effective and good quality business decisions. Business intelligence enables you to make these kinds of decisions. A specialized field of business intelligence known as competitive intelligence focuses solely on the external competitive environment. Information is gathered on the actions of competitors and decisions are made based on this information. Little if any attention is paid to gathering internal information. Page | 97 IT Management 2B 4. 5 Reasons for Business Intelligence Business Intelligence enables organizations to make well informed business decisions and thus can be the source of competitive advantages. This is especially true when you are able to extrapolate information from indicators in the external environment and make accurate forecasts about future trends or economic conditions. Once business intelligence is gathered effectively and used proactively you can make decisions that benefit your organization before the competition does. The ultimate objective of business intelligence is to improve the timeliness and quality of information. Timely and good quality information is like having a crystal ball that can give you an indication of what's the best course to take. Business intelligence reveals to you: The position of your firm as in comparison to its competitors Changes in customer behaviour and spending patterns The capabilities of your firm Market conditions, future trends, demographic and economic information The social, regulatory, and political environment What the other firms in the market are doing You can then deduce from the information gathered what adjustments need to be made. . Page | 98 IT Management 2B 4.6 Benefits of Business Intelligence Business Intelligence provides many benefits to companies utilizing it. It can eliminate a lot of the guesswork within an organization, enhance communication among departments while coordinating activities, and enable companies to respond quickly to changes in financial conditions, customer preferences, and supply chain operations. Business Intelligence improves the overall performance of the company using it. Information is often regarded as the second most important resource a company has (a company's most valuable assets are its people). So when a company can make decisions based on timely and accurate information, the company can improve its performance. Business Intelligence also expedites decision-making, as acting quickly and correctly on information before competing businesses do can often result in competitively superior performance. It can also improve REMEMBER: The use of BI Businesses realize that in this very competitive, fast paced, and everchanging business environment, a key competitive quality is how quickly they respond and adapt to change. Business intelligence enables them to use information gathered, so they can quickly and constantly respond to changes as they happen. customer experience, allowing for the timely and appropriate response to customer problems and priorities. 4.7 Factors Influencing Business Intelligence Customers are the most critical aspect to a company's success. Without them a company cannot exist. So it is very important that you have information on their preferences. You must quickly adapt to their changing demands. Business Intelligence enables you to gather information on the trends in the marketplace and come up with innovative products or services in anticipation of customer's changing demands. Page | 99 IT Management 2B Competitors can be a huge hurdle on your way to success. Their objectives are the same as yours and that is to maximize profits and customer satisfaction. In order to be successful you must stay one step ahead of your competitors. In business you don't want to play the catch up game because you would have lost valuable market share. Business Intelligence tells you what actions your competitors are taking, so you can make better informed decisions. Business Partners must possess the same strategic information you have so that there is no miscommunication that can lead to inefficiencies. For example it is common now for businesses to allow their suppliers to see their inventory levels, performance metrics, and other supply chain data in order to collaborate to improve supply chain management. With Business Intelligence you and your business partners can share the same information. Economic Environment such as the state of the economy and other key economic indicators are important considerations when making business decisions. You don't want to roll out a new line of products during an economic recession. BI gives you information on the state of the economy so that you can make prudent decisions as to when is the right time to maybe expand or scale back your business operations. Internal Operations are the day to day activities that go on in your business. You need in-depth knowledge about the internal workings of your business from top to bottom. If you make an arbitrary decision without knowing how your entire organization works it could have negative effects on your business. BI gives you information on how your entire organization works. Technology Business intelligence provides organizational data in such a way that the organizational knowledge filters can easily associate with this data and turn it into information for the organization. Persons involved in business intelligence processes may use application software and other technologies to gather, store, analyze, and provide access to data, and present that data in a simple, useful manner. The software aids in business performance management, and aims to help people make "better" Page | 100 IT Management 2B business decisions by making accurate, current, and relevant information available to them when they need it. Some businesses use data warehouses because they are a logical collection of information gathered from various operational databases for the purpose of creating business intelligence. Technology Requirements For the Business Intelligence system to work effectively, enterprises must address the following technical issues: o Security and specified user access to the warehouse o Data volume (capacity) o How long data will be stored (data retention) o Benchmark and performance targets Software Types People working in business intelligence have developed tools that ease the work, especially when the intelligence task involves gathering and analyzing large quantities of unstructured data. Each vendor typically defines Business Intelligence their own way, and markets tools to do Business Intelligence the way that they see it. Business intelligence includes tools in various categories, but the ones that we are able to help you with include the following: o Data Mining, Data Marts o Decision Support Systems o Enterprise Integration and Reporting o Enterprise Reporting for Mainframes o Web Based Reporting o Web Enabling o Web Services History An early reference to non-business intelligence occurs in Sun Tzu's The Art of War. Sun Tzu claims that to succeed in war, one should have full knowledge of one's own strengths and weaknesses and full knowledge of one's enemy's strengths and weaknesses. Lack of either one might result in defeat. A Page | 101 IT Management 2B certain school of thought draws parallels between the challenges in business and those of war, specifically: collecting data discerning patterns and meaning in the data (generating information) responding to the resultant information Prior to the start of the Information Age in the late 20th century, businesses sometimes struggled to collect data from non-automated sources. Businesses then lacked the computing resources to properly analyze the data, and often made business decisions primarily on the basis of intuition. As businesses started automating more and more systems, more and more data became available. However, collection remained a challenge due to a lack of infrastructure for data exchange or to incompatibilities between systems. Analysis of the data that was gathered and reports on the data sometimes took months to generate. Such reports allowed informed long-term strategic decisionmaking. However, short-term tactical decision-making continued to rely on intuition. In modern businesses, increasing standards, automation, and technologies have led to vast amounts of data becoming available. Data warehouse technologies have set up repositories to store this data. Improved Extract, transform, load (ETL) and even recently Enterprise Application Integration tools have increased the speedy collecting of data. OLAP reporting technologies have allowed faster generation of new reports which analyze the data. Business intelligence has now become the art of sifting through large amounts of data, extracting pertinent information, and turning that information into knowledge upon which actions can be taken. Business intelligence software incorporates the ability to mine data, analyze, and report. Some modern BI software allow users to cross-analyze and perform deep data research rapidly for better analysis of sales or performance on an individual, department, or company level. In modern applications of business intelligence software, managers are able to quickly compile reports from data for forecasting, analysis, and business decision making. In 1989 Howard Dresner, a Research Fellow at Gartner Group popularized "BI" as an umbrella term to describe a set of concepts and methods to improve business decision-making by using fact-based support systems. Page | 102 IT Management 2B 4.8 Future of Business Intelligence In this rapidly changing world consumers are now demanding quicker more efficient service from businesses. To stay competitive, companies must meet or exceed the expectations of consumers. Companies will have to rely more heavily on their business intelligence systems to stay ahead of trends and future events. Business intelligence users are beginning to demand Real time Business Intelligence or near real time analysis relating to their business, particularly in frontline operations. They will come to expect up to date and fresh information in the same fashion as they monitor stock quotes online. Monthly and even weekly analysis will not suffice. In the not too distant future companies will become dependent on real time business information in much the same fashion as people come to expect to get information on the internet in just one or two clicks. Also in the near future business information will become more democratized where end users from throughout the organization will be able to view information on their particular segment to see how it's performing. So, in the future, the capability requirements of business intelligence will increase in the same way that consumer expectations increase. It is therefore imperative that companies increase at the same pace or even faster to stay competitive. "BI 2.0" is the recently-coined term which is part of the continually developing Business Intelligence industry and heralds the next step for BI. "BI 2.0" is used to describe the acquisition, provision and analysis of "real time" data, the implication being that earlier Business Intelligence and Data Mining products (BI 1.0?) have not been capable of providing the kind of timely, current data end-users are now clamoring to have. Realizing that hype has historically outpaced reality as Business Intelligence software companies compete for marketshare As long as Business Intelligence relies upon some kind of data warehouse structure (including web-based virtual data "warehouses"), data will have to be converted into what Hayler calls "a lowest common denominator consistent set." When it comes to dealing with multiple, disparate data sources and the constantly changing, often volatile, business environment which requires tweaking and restructuring of IT systems, getting BI data in a genuinely true, "real time" format remains, again according to Hayler, "a pipe dream...As long as people design data models and databases the traditional way, you can forget about true 'real-time' business Page | 103 IT Management 2B intelligence across an enterprise: the real world gets in the way".In the near future business information will become more democratized where end users from throughout the organization will be able to view information on their particular segment to see how it's performing. In the future, the capability requirements of business intelligence will increase in the same way that consumer expectations increase. It is therefore imperative that companies increase at the same pace or even faster to stay competitive.18 Business intelligence (BI) has two basic different meanings related to the use of the term intelligence. The primary, less frequently, is the human intelligence capacity applied in business affairs/activities. Intelligence of Business is a new field of the investigation of the application of human cognitive faculties and artificial intelligence technologies to the management and decision support in different business problems. The second relates to the intelligence as information valued for its currency and relevance. It is expert information, knowledge and technologies efficient in the management of organizational and individual business. The paper explores the concepts of BI, its components, emergence of BI, benefits of BI, factors influencing BI, technology requirements, designing and implementing business intelligence, and various BI techniques. Powerful transaction-oriented information systems are now commonplace in every major industry, effectively leveling the playing field for corporations around the world. To remain competitive, however, now requires analytically oriented systems that can revolutionize a company's ability to rediscover and utilize information they already own. The Business Intelligence (BI) has evolved over the past decade to rely increasingly on real time data. The Business Intelligence (BI) has evolved to rely increasingly on real time data. Business analysis is becoming essential. It involves actions in response to analysis of results and instantaneously changes parameters of business processes making BI beneficial for several reasons. Scifort - Business Intelligence garden. 2012. Scifort - Business Intelligence garden. [ONLINE] Available at: http://www.scifort.com/index.php?option=com_content&task=view&id=92&Itemid=151. [Accessed 06 May 2012]. 18 Page | 104 IT Management 2B Key performance indicators Business Intelligence often uses Key Performance Indicators (KPIs) to assess the present state of business and to prescribe a course of action. More and more organizations have started to make more data available more promptly. In the past, data only became available after a month or two, which did not help managers to adjust activities in time to hit Wall Street targets. Recently, banks have tried to make data available at shorter intervals and have reduced delays. The KPI methodology was further expanded with the Chief Performance Officer methodology which incorporated KPIs and root cause analysis into a single methodology."19 Let's look at BI in more detail. Figure 22- Basic Understanding of Business Intelligence (BI) What is Business Intelligence | Products General. 2012. What is Business Intelligence | Products General. [ONLINE] Available at: http://www.selectbs.com/products-general/what-is-businessintelligence. [Accessed 06 May 2012]. 19 Page | 105 IT Management 2B Business intelligence (BI) software is applied at three different levels in the enterprise: strategic, tactical and operational. At the strategic level, BI provides performance metrics to management and executives, often in conjunction with a formal management methodology such as Balanced Scorecard or Six Sigma. Strategic business intelligence, one of the latest crazes, is generally called performance management (PM). Depending upon which analyst firm you subscribe to, PM might be preceded by a C for corporate performance management, an E for enterprise performance management or a B for business performance management (not to be confused with BPM, the acronym for business process management). Tactical business intelligence, called traditional and/or analytical in various industry articles, is the application of business intelligence tools to analyze business trends, frequently comparing a specific metric (such as sales or expenses) to the same metric from a previous month or year. In most companies, there are usually a few analysts in each department who use online analytical processing (OLAP) and ad hoc query to perform this task. To date, BI tools are mostly used to analyze historical business data to discover trends or anomalies that need attention. Finally, operational business intelligence delivers information to the point of business - the front lines of a business where information is used as part of an operational process. For example, when a person calls a toll-free number to speak to a customer service representative about his or her telephone bill, that representative will most likely be looking at a report about the caller's previous billing history and payment record on a computer monitor. The most interesting thing about this example, as in many examples of operational BI, is that the person using the BI tool has probably never even heard of the term business intelligence. Customer service reps do not consciously use a business intelligence tool. The information is simply put in front of them when they're doing their operational jobs - in this case, customer support. Page | 106 IT Management 2B Figure 23- BI Strategic, Tactical and Operational20 Strategic, tactical and operational business intelligence are like the navigation system, the dashboard, and the gas pedal, brake pedal and steering wheel in an automobile. The navigation system constantly shows you whether or not you are on course to reach your destination. This works exactly like a strategic BI scorecard or performance management system that tells management whether or not the company is on target to meet its goals. In both cases, the driver and management will take corrective action if they see that they are off course. The dashboard, with its fuel gauge, odometer, speedometer and engine lights, mimics tactical business intelligence. The gauges tell the driver how far he or she has traveled, if the car's systems are functioning correctly and whether or not more fuel is needed. Similarly, tactical BI looks at historical data to see if enough has been sold compared to last month and whether or not there is inventory to meet expected demands. Finally, operational BI is very much like the steering wheel and the gas and brake pedals, which are used for all immediate front-line reactions in driving. There is a detour in the road; you must turn right here to avoid it. A car in front of you has stopped, so you need to slow down and stop as well. The customer support call is handled in the same way. It is an immediate reactive business process. Strategic, Tactical and Operational Business Intelligence - Information Management Online Article. 2012. Strategic, Tactical and Operational Business Intelligence - Information Management Online Article. [ONLINE] Available at: http://www.information-management.com/news/1055164-1.html. [Accessed 06 May 2012]. 20 Page | 107 IT Management 2B Figure 24 - Operational Tactical and Strategic BI21 Figure 25- The three forms of BI must work according towards a common goal.22 21 22 (Paige Baltzan, 2009, p.336) (Paige Baltzan, 2009, p.337) Page | 108 IT Management 2B Figure 26 - The Latency between a business event and an action Taken from Richard Hackathorn, Bolder Technologies.23 4.9 Conclusion We can see that time and analysed data is key to decision making in an organisation. Let's conclude this with an analogy of an automotive system to the car and driver and of the three levels of BI to the company. Of the three levels of automobile components - navigation system, dashboard, and steering, brake and gas - which can you not live without, even for one second? The steering, brake and gas. Without them, you would either crash or potentially make no progress. The same is true for operational BI. While strategic and tactical BI look at historical data to tell management and analysts where the business has been and how it is performing, it is the company's operational processes that keep it running. Ask the corporate executive whether the company could live without its performance scorecard report or without the customer support system for a day or two. Customer support cannot stop. It is part and parcel of how a business operates. Many people can drive a car with just a steering wheel, gas pedal and brake, and even get to their final destination. Sooner or later, however, they will either run out of gas or get lost. It is the same for business. To truly get the most out of business intelligence, you need to have all three levels - strategic, tactical and operational - working in conjunction with one another. However, a business executive 23 (Paige Baltzan, 2009, p.337) Page | 109 IT Management 2B cannot forget the importance of operational delivery of information to front-line workers - without it the company might crash. Group Work Look at the following example of business intelligence software in a live context and answer the following questions: "How does a user maintain the gaming floor? vizMapEditor allows users to make changes and updates to the casino floor map image within the floorVizPLUS software to reflect actual changes on the gaming floor (Figure 1). This ensures that the analysis is correctly represented against the correct casino floor map. vizMapEditor is fully integrated into floorVizPLUS and allows a user to change an existing map or create multiple designs for analysis purposes and for future use. vizMapEditor is web based and not only does it manage the casino floor maps, it also manages the slowly changing dimensions that are associated with the casino floor map. The management of the slowly changing dimensions is very important for analysis of changes on the gaming floor. The software makes the management of this data very straight forward. Furthermore, when the updates to the floor maps are made, they are automatically made in the database, so the normal data management such as backups and restores can be managed by the data team"24 24 Product Overview » BIS². 2012. Product Overview » BIS². [ONLINE] Available at: http://www.bis2.net/home/products/productoverview/. [Accessed 17 May 2012 Page | 110 IT Management 2B 1. If Company ABC wanted to implement this, what would the reason be for implementing this? 2. Why would a live analysis of information be crucial in a casino? 3. What other software is out there geared for BI. Find at least 3 and compare them and the value especially in terms of dashboards and live information, IE: BI 2 Page | 111 IT Management 2B SECTION FIVE: DATA WAREHOUSING AND DATA MINING CONTENTS SECTION FIVE: DATA WAREHOUSING AND DATA MINING ........................................................................... 112 5.1 LEARNING OUTCOMES ............................................................................................................................. 114 5.2 READING ................................................................................................................................................... 115 5.3 YOU NEED A DATA WAREHOUSE TO DO ANY DATA MINING ................................................................................... 116 5.4 DEFINITION OF DATA MINING (DM) ................................................................................................................. 118 5.5 PURPOSE OF DATA MINING(DM)..................................................................................................................... 118 5.6 PROCESS OF DATA MINING ............................................................................................................................. 118 5.7 WHAT IS DATA MINING AND PREDICTIVE ANALYTICS USED FOR? .............................................................................. 119 5.8 CONCLUSION AND SUMMARY .......................................................................................................................... 120 Page | 112 IT Management 2B Think point What underlying infrastructure is required to make BI function? What is the difference between raw data and analyzed data? What are some of the data mining tools that are used? What are some of the data mining activities? Page | 113 IT Management 2B 5.1 LEARNING OUTCOMES To understand where the organisation stores data. How does one mine data? How is data mining useful? Page | 114 IT Management 2B 5.2 READING Recommended Reading: Paige Baltzan, A.P., 2009. Business Driven Information Systems. New York: McGraw-Hill. DETAILS: Chapter of Book that should be read. Chapter 6: Databases and Data Warehouses Page | 115 IT Management 2B 5.3 You need a Data Warehouse to do any Data Mining "The data warehouse (DW or DWH) is a database used for reporting and analysis. The data stored in the warehouse are uploaded from the operational systems (such as marketing, sales etc., shown in the figure at bottom). The data may pass through an operational data store for additional operations before they are used in the DW for reporting. The typical data warehouse uses staging, integration, and access layers to house its key functions. The staging layer or staging database stores raw data extracted from each of the disparate source data systems. The integration layer integrates the disparate data sets by transforming the data from the staging layer often storing this transformed data in an operational data store (ODS) database. The integrated data is then moved to yet another database, often called the data warehouse database, where the data is arranged into hierarchal groups often called dimensions and into facts and aggregate facts. The combination of facts and dimensions is sometimes called a star schema. The access layer helps users retrieve data. A data warehouse constructed from integrated data source systems does not require ETL, staging databases, or operational data store databases. The integrated data source systems may be considered to be a part of a distributed operational data store layer. Data federation methods or data virtualization methods may be used to access the distributed integrated source data systems to consolidate and aggregate data directly into the data warehouse database tables. Unlike the ETLbased data warehouse, the integrated source data systems and the data warehouse are all integrated since there is no transformation of dimensional or reference data. This integrated data warehouse architecture supports the drill down from the aggregate data of the data warehouse to the transactional data of the integrated source data systems. Data warehouses can be subdivided into data marts. Data marts store subsets of data from a warehouse. Page | 116 IT Management 2B This definition of the data warehouse focuses on data storage. The main source of the data is cleaned, transformed, cataloged and made available for use by managers and other business professionals for data mining, online analytical processing, market research and decision support."25 Figure 27- Data Warehouse (Wikimedia Commons) Information about data mining is widely available. No matter what your level of expertise, you will be able to find helpful books and articles on data mining. Here are two web sites to help you get started: http://www.kdnuggets.com/ — This site is an excellent source of information about data mining. It includes a bibliography of publications. http://www.twocrows.com/ — On this site, you will find the free tutorial, Introduction to Data Mining and Knowledge Discovery, and other useful information about data mining. Data warehouse - Wikipedia, the free encyclopedia. 2012. Data warehouse - Wikipedia, the free encyclopedia. [ONLINE] Available at: http://en.wikipedia.org/wiki/Data_warehouse. [Accessed 01 July 2012]. 25 Page | 117 IT Management 2B 5.4 Definition of Data Mining (DM) (Williams & Sawyer, 2010, p.418) Define Data Mining as "The computer-assisted process of sifting through and analysing vast amounts of data in order to extract hidden patterns and meanings and to discover new knowledge." 5.5 Purpose of Data Mining(DM) (Williams & Sawyer, 2010, p.418) "The purpose is to simply describe past trends and to predict future trends." This is so simple to understand, however the impact and implication of using data mining is profound in the results that can be achieved. In a nutshell, a company can analyse all the large data it has on its clients to then draw conclusions or emerging opportunities which it can then use to create new avenues of income. 5.6 Process of Data Mining In DM, data is acquired and prepared for data warehousing. In simple terms the data is sorted into information sets that can be used for later queries in the process of DM. The following steps by Williams & Sawyer indicate the DM process . 1. Data sources: Where is the data coming from? This can range from: Point of Sale Transactions databases of all kinds, other data warehouses News feeds other online internet sources. 2. Data fusion & Cleaning: Is the data in the correct format and is it consistent and free of errors? This is where the data, regardless of the sources is mashed or fused together and put through a process known as "data cleaning" or data scrubbing". During this process, the information is made into a standard format and checked for errors in consistency. Poor quality data is removed and meta data is created. Meta data is additional information about the properties of the information is recorded. In a nutshell it is data about the data! 3. Data and Meta Data. The data and the meta data go hand in hand. The meta data is used to create a picture of the information that has been acquired. It is a crucial part of the data warehouse in understanding the information stored in a data warehouse. It contains the origin of the data. the transformations it has undergone, and summary information about it which makes it particularly more useful than the cleansed but unintergrated, summarised data. Page | 118 IT Management 2B Data mining is a set of automated techniques used to extract buried or previously unknown pieces of information from large databases. Successful data mining makes it possible to unearth patterns and relationships, and then use this “new” information to make proactive knowledge-driven business decisions. Data mining then, “centers on the automated discovery of new facts and relationships in data. The raw material is the business data, and the data-mining algorithm is the excavator, sifting through the vast quantities of raw data looking for the valuable nuggets of business information. 5.7 What is data mining and predictive analytics used for? "Direct marketing You probably have heard the marketing manager phrase “I know that half of my marketing budget is wasted, the only question is what half?” The challenge of marketing is that while there are constantly more and more competing offers, the number of channels (ways of communication) available to communicate with the buyer also increases. In addition to traditional direct marketing means such as direct mailing, advertising in newspapers, TV and other media, new means of communication such as the Internet, not only has introduced a large number of new channels for direct marketing, it has also brought measurability of the response to a whole new level. Today, there is a large amount of data being generated not only in internal customer data bases, but also related to the response of the audience to marketing campaigns. This is where predictive data mining comes in. By applying predictive data mining to historical data, such as customer response for the various channels, demographic, geographic, sales history etc, it is possible to significantly improve the odds of directing a campaign towards the right audience. By successfully applying predictive data mining, you not only will be able to target the right audience, thereby increasing return on invested marketing money. In addition to this, you will also get to know them better, and by adapting the message to the preferences of your audience you will be able to communicate more effectively. Collection All companies with a large customer base have a number of customers who do not pay their dues on time. Collecting these payments from the debtors requires a great deal of resources, and a large proportion of this work is wasted on customers that are difficult or impossible to recover. By applying predictive data mining to historical customer debt data, the collection procedure can be optimized by identifying the debtors most likely to pay and finding the most effective contact methods or legal actions for each debtor. By successfully applying predictive data mining within collection, you will recover more money while reducing collection costs. Scientific applications In pharmaceutical companies, chemistry is one of the most resource intensive areas within the research and development (R&D) activities. The whole purpose of the pharmaceutical company’s R&D is to produce new chemical entities (NCE) that will make it all the way through clinical trials to the market as new drugs. The search for new chemical compounds is in essence a trial-and-error process. The job of the R&D chemist is to synthesise (produce) new compounds for testing in the laboratory. One such chemist may spend up to three weeks for making just one such compound. Page | 119 IT Management 2B Despite the expensive production of new compounds, pharmaceutical companies test very many compounds in their R&D activities and stores all the results in large databases (there is also a fairly large industry selling chemical compounds of great diversity). By applying predictive data mining to such historical laboratory test data, it is possible to reasonably predict the outcome of the laboratory tests without having to synthesise the compounds. This means that the chemist can find out the most likely properties of the alternative compounds and choose to work on the most promising ones, before spending the next three weeks in the laboratory, thereby increasing the quality of the resulting compounds. Recommendation systems All companies want to sell more to existing customers. This is often the most effective way of increasing the profitability. For companies that sell many different products to large customer bases and that keep records of sales transactions for their customers, it is possible to apply predictive data mining to identify sales opportunities as products likely to appeal to a particular customer who has not yet bought them. This type of application is also commonly referred to as cross-selling, and some of the most notable examples of companies using it are Amazon.com where you will get relevant books recommended, and the DVD rental site Netflix, who now even has arranged a $1Million prize money competition for the best improvement of their recommendation system. Other applications Other applications of predictive data mining include fraud detection (e.g. within credit card transactions, taxation, telephony, and insurance industry) and risk management (e.g. for determining insurance policy rates or managing credit applications). "26 Williams and Sawyer summarise data mining being used: To improve customer acquisition and retention; To reduce fraud; To identify internal inefficiencies and then revamp operations; To map the unexplored terrain of the Internet. 5.8 Conclusion and Summary Data Warehousing is the strategy of ensuring that the data used in an organization is available in a consistent and accurate form wherever it is needed. Often this involves the replication of the contents of departmental computers in a centralized site, where it can be ensured that common data definitions are in the departmental computers in a centralized site, where it can be ensured that the common data definitions are in use… The reason Data Warehousing is closely connected with Data Mining is that when data about the organization’s processes becomes readily available, it becomes easy and therefore economical to mine it for new and profitable relationships. Compumine - What is data mining used for?. 2012. Compumine - What is data mining used for?. [ONLINE] Available at: http://www.compumine.com/web/public/what-is-data-mining-used-for. [Accessed 01 July 2012]. 26 Page | 120 IT Management 2B Thus, data warehousing introduces greater efficiencies to the data mining exercise. “Without the pool of validated and scrubbed data that a data warehouse provides, the data mining process requires considerable additional effort to pre-process the data. Notwithstanding, it is also possible for companies to obtain data from other sources via the Internet, mine the data, and then convey the findings and new relationships internally within the company via an Intranet. There are four stages in the data warehousing process: 1. 2. 3. 4. The first stage is the acquisition of data from multiple internal and external sources and platforms. The second stage is the management of the acquired data in a central, integrated repository. Stage three is the provision of flexible access, reporting and analysis tools to interpret selected data. Stage four is the production of timely and accurate corporate reports to support managerial and decision-making processes. Though the term data mining is relatively new, the technology is not. Many of the techniques used in data mining originated in the artificial intelligence research of the 80s and 90s. It is only more recently that these tools have been applied to large databases. Why then are data mining and data warehousing mushrooming now? IBM has identified six factors that have brought data mining to the attention of the business world: A general recognition that there is untapped value in large databases; A consolidation of database records tending toward a single customer view; A consolidation of databases, including the concept of an information warehouse; A reduction in the cost of data storage and processing, providing for the ability to collect and accumulate data; Intense competition for a customer’s attention in an increasingly saturated marketplace; The movement toward the de-massification of business practices. With reference to point six above, “de-massification” is a term originated by Alvin Toffler. It refers to the shift from mass manufacturing, mass advertising and mass marketing that began during the industrial revolution, to customized manufacturing, advertising and marketing targeted to small segments of the population. Data mining usually yields five types of information: associations, sequences, classifications, clusters, and forecasting: Associations happen when occurrences are linked in a single event. For example, a study of supermarket baskets might reveal that when corn chips are purchased, 65% of the time cola is also purchased, unless there is a promotion, in which case cola is purchased 85% of the time. In sequences, events are linked over time. [For example][ I]f a house is bought, then 45% of the time a new oven will be bought within one month and 60% of the time a new refrigerator will be bought within two weeks. Classification is probably the most common data mining activity today… Classification can help you discover the characteristics of customers who are likely to leave and provide[s] a model that can be used to predict who they are. It can also help you determine which kinds of promotions have been effective in keeping which types of customers, so that you spend only as much money as necessary to retain a customer. Using clustering, the data mining tool discovers different groupings with the data. This can be applied to problems as diverse as detecting defects in manufacturing or finding affinity groups for bank cards. All of these applications may involve predictions, such as whether a customer will renew a subscription … forecasting, is a different form of prediction. It estimates the future value of continuous variables — like sales figures — based on patterns within the data. Page | 121 IT Management 2B Generally then, applications of data mining can generate outputs such as: Buying patterns of customers; associations among customer demographic characteristics; predictions on which customers will respond to which mailings; Patterns of fraudulent credit card usage; identities of “loyal” customers; credit card spending by customer groups; predictions of customers who are likely to change their credit card affiliation; Predictions on which customers will buy new insurance policies; behavior patterns of risky customers; expectations of fraudulent behavior; Page | 122 IT Management 2B Case Study and Group Work Analyse the following and comment on questions that follow: "Stilgherrian: there’s no way I’m handing over data to Google+ by Stilgherrian The sheer stupidity of technology’s early adopters never ceases to amaze me. Facebook continues to be slammed for its dodgy privacy practices. But Google launches Google+, essentially the same thing, and the shiny-chasers are clamouring to pour in their most intimate information. “This is basically a giant data mining operation,” freelance journalist and blogger Neerav Bhatt told today’s Patch Monday podcast. “People voluntarily link themselves in and feed even more data into Google than they did before.” No secret there. That’s the business model for the entire web these days. You pay for services with your personal information, which in turn enables advertisers to target you more accurately. Social networking services (SNS) are the ultimate expression of this imbalanced exchange. Who you communicate with, when and how, reveals far more than you may realise. Research on Facebook, for example, has shown that you can predict when people will develop a romantic relationship before they know it themselves. Gays can be outed by algorithm. Semantic analysis of the words you use reveals your mood. Yet you can’t make meaningful use of an SNS without revealing this personal data. It’s kind of the point. Just as you can’t make use of accounting software without first revealing how you spend your money, you can’t use the SNS until you reveal and categorise your family, friends and acquaintances — your social graph, it’s called. Facebook has been copping flak over two ongoing privacy outrages. One, continually changing how its insanely complicated privacy controls work and trying to trick people into accepting a wide-open setting by default. Two, a legalistic privacy policy that’s longer than the US Constitution. Google seems to have addressed the first problem. The Circles feature in Google+ allows you to categorise your contacts into circles of friends — family, workmates, your hockey team, payday drinking buddies — and you post information only to specific circles. Things are private by default. Mostly. But when it comes to the terms and conditions, Google is no better than the rest. As Paul Ducklin from information security vendor Sophos points out, there’s Google’s general privacy policy, a separateprivacy policy for Google+, the user content and conduct policy, the+1 button privacy policy for Google’s equivalent of the “Like” button, the mobile privacy policy if you use your smartphone, the Picasa privacy notice if you upload a photo … When I started writing this article, I’d intended to have a go at people who were foolish enough to reveal which of their contacts were “prayer group” and which “rough trade” — and which were both — without reading and understanding the rules. But I think they can be forgiven. In Google’s privacy centre you’ll find 37 written policies. And of course any of those policies can be changed upon Google’s whim. After they’ve got your data. Talk to any privacy analyst and they’ll tell you that “informed consent” is the key. By all means let people exchange privacy for services, as long as they understand the trade-off. But how can anyone possibly Page | 123 IT Management 2B comprehend 37 policies?"27 QUESTIONS: 1. Facebook's use of data mining. How far do you think that is true? Does the article below have any truth about SNS? 2. Is Google a data Mining Giant? 3. Compare Facebook and Google's strategies in terms of data mining. 4, Who do you think is winning? See if you can find out about their revenues and where it comes from. Case Study and Group Work - 2 1. Do some research in a group and tackle the subject of Data Mining: It’s Banks vs. Google, Apple, and Facebook. What is your group's opinion on Data Mining in these organisations and how it affects each of us? 27 Google +: Like Facebook, Google + is about data mining | Crikey. 2012. Google +: Like Facebook, Google + is about data mining | Crikey. [ONLINE] Available at: http://www.crikey.com.au/2011/07/12/google-plus-data-mining/. [Accessed 17 May 2012 Page | 124 IT Management 2B SECTION SIX: PRINCIPLES OF INFORMATION SECURITY CONTENTS SECTION SIX: PRINCIPLES OF INFORMATION SECURITY ................................................................................ 125 6.1 LEARNING OUTCOMES ............................................................................................................................. 127 6.2 READING ................................................................................................................................................... 128 6.3 WHAT IS INFORMATION SECURITY ........................................................................................................... 129 6.4 IS IT JUST THE INFORMATION TECHNOLOGY DEPARTMENT WHO SHOULD BE INVOLVED IN SECURITY? . 129 6.5 KEY INFORMATION SECURITY TERMS AND CONCEPTS ............................................................................. 131 6.6 DATA .......................................................................................................................................................... 134 6.7 PEOPLE........................................................................................................................................................ 134 6.8 PROCEDURES ................................................................................................................................................ 134 6.9 NETWORKS .................................................................................................................................................. 135 6.10 BALANCING INFORMATION SECURITY AND ACCESS ............................................................................................. 135 6.11 INFORMATION SECURITY PROJECT TEAM............................................................................................... 137 6.12 DATA RESPONSIBILITIES .......................................................................................................................... 137 6.13 CONCLUSION .......................................................................................................................................... 138 Page | 125 IT Management 2B Think point Why does information security make an impact on our lives and organisations? What is the weakest link in an organisation? What are the reasons for an attack? Should we keep our data disconnected from the net? - Pro's and Cons Page | 126 IT Management 2B 6.1 LEARNING OUTCOMES understand and apply the basic principles of information security Be able to define information security. Define key terms and critical concepts of information security understand and apply the basic principles of information security Page | 127 IT Management 2B 6.2 READING Prescribed Reading: Whitman, M.E. & Mattford, H.J., 2012. Principles of Information Security. 4th ed. China: China Translation and Printing Services Limited. 1. Introduction to Information Security. 2. The Need for Security. 3. Legal, Ethical, and Professional Issues in Information Security. 4. Risk Management. 5. Planning for Security. 6. Security Technology: Firewalls, VPNs, and Wireless 7. Security Technology: Intrusion Detection and Prevention Systems 8. Cryptography. 9. Physical Security. 10. Implementing Information Security. 11. Security and Personnel. 12. Information Security Maintenance and eDiscovery. Page | 128 IT Management 2B 6.3 WHAT IS INFORMATION SECURITY " The term information security relates to the protection of information, as well as the systems and equipment that contain and process that information. One possible definition is: Information security refers to all the strategies, policies, procedures, mechanisms and technical tools used for safeguarding information and information systems from unauthorized access, alteration, theft and physical damage. While the above definition gives a nice insight in all the different aspects of information security, the enumeration of "what is protected", "how it is protected" and "what it is protected from", will always leave something out. Another much broader definition (but not necessarily better) is: Information security is keeping anyone from doing things you do not want them to do to, with, or from your information, computers or peripherals. Unfortunately, this last definition gives a lot less insight in what is involved with information security. It is so broad that it also includes the even more complex issue of privacy, which I would prefer to keep separate from information security.28" 6.4 IS IT JUST THE INFORMATION TECHNOLOGY DEPARTMENT WHO SHOULD BE INVOLVED IN SECURITY? Clearly it is the perception amongst many people and organisations that information security is only the domain of the Information Technology department. It is imperitive that when and organisation is tackling information security that there are members from every department that are present to contribute to the process and success of tackling information security. What are the areas and organisaton should tackle in security operations? A successful organization should have the following multiple layers of security in place to protect its operations: Physical security, to protect physical items, objects, or areas from unauthorized access and misuse Personnel security, to protect the individual or group of individuals who are authorized to access the organization and its operations What is information security.. 2012. What is information security.. [ONLINE] Available at: http://www.how-to-guides.com/security/encyclopedia/informationsecurity.htm. [Accessed 12 May 2012]. 28 Page | 129 IT Management 2B Operations security, to protect the details of a particular operation or series of activities Communications security, to protect communications media, technology, and content Network security, to protect networking components, connections, and contents Information security, to protect the confidentiality, integrity and availability of achieved via the application of policy, education, training and awareness, and technology.29 Figure 28 - Components of Information Security (Whitman & Mattford, 2012) 29 (Whitman & Mattford, 2012, p.8) Page | 130 IT Management 2B 6.5 KEY INFORMATION SECURITY TERMS AND CONCEPTS "Access: A subject or object’s ability to use, manipulate, modify, or affect another subject or object. Authorized users have legal access to a system, whereas hackers have illegal access to a system. Access controls regulate this ability. Asset: The organizational resource that is being protected. An asset can be logical, such as a Web site, information, or data; or an asset can be physical, such as a person, computer system, or other tangible object. Assets, and particularly information assets, are the focus of security efforts; they are what those efforts are attempting to protect. Attack: An intentional or unintentional act that can cause damage to or otherwise compromise information and/or the systems that support it. Attacks can be active or passive, intentional or unintentional, and direct or indirect. Someone casually reading sensitive information not intended for his or her use is a passive attack. A hacker attempting to break into an information system is an intentional attack. A lightning strike that causes a fire in a building is an unintentional attack. A direct attack is a hacker using a personal computer to break into a system. An indirect attack is a hacker compromising a system and using it to attack other systems, for example, as part of a botnet (slang for robot network). This group of compromised computers, running software of the attacker’s choosing, can operate autonomously or under the attacker’s direct control to attack systems and steal user information or conduct distributed denial-of-service attacks. Direct attacks originate from the threat itself. Indirect attacks originate from a compromised system or resource that is malfunctioning or working under the control of a threat. Control, safeguard, or countermeasure: Security mechanisms, policies, or procedures that can successfully counter attacks, reduce risk, resolve vulnerabilities, and otherwise improve the security within an organization. The various levels and types of controls are discussed more fully in the following chapters. Exploit: A technique used to compromise a system. This term can be a verb or a noun. Threat agents may attempt to exploit a system or other information asset by using it illegally for their personal gain. Or, an exploit can be a documented process to take advantage of a vulnerability or exposure, usually in software, that is either inherent in the software or is created by the attacker. Exploits make use of existing software tools or custom-made software components. Exposure: A condition or state of being exposed. In information security, exposure exists when a vulnerability known to an attacker is present. Loss: A single instance of an information asset suffering damage or unintended or unauthorized modification or disclosure. When an organization’s information is stolen, it has suffered a loss. Protection profile or security posture: The entire set of controls and safeguards, including policy, education, training and awareness, and technology, that the organization implements (or fails to implement) to protect the asset. The terms are sometimes used interchangeably with the term security program, although the security program often comprises managerial aspects of security, including planning, personnel, and subordinate programs. Risk: The probability that something unwanted will happen. Organizations must minimize risk to match their risk appetite—the quantity and nature of risk the organization is willing to accept. Subjects and objects: A computer can be either the subject of an attack—an agent entity used to conduct the attack—or the object of an attack—the target entity, as shown in Figure 1-5. A computer can be both the subject and object of an attack, when, for example, it is compromised by an attack (object), and is then used to attack other systems (subject). Page | 131 IT Management 2B 30 Threat: A category of objects, persons, or other entities that presents a danger to an asset. Threats are always present and can be purposeful or undirected. For example, hackers purposefully threaten unprotected information systems, while severe storms incidentally threaten buildings and their contents. Threat agent: The specific instance or a component of a REMEMBER: threat. For example, all hack-ers in the world present a collective threat, while Kevin Mitnick, who was convicted Consider every bit of for hacking into phone systems, is a specific threat agent. information in the Likewise, a lightning strike, hailstorm, or tornado is a following context: threat agent that is part of the threat of severe storms. Vulnerability: A weaknesses or fault in a system or Threat protection mechanism that opens it to attack or damage. Threat agent Some examples of vulnerabilities are a flaw in a software Vulnerability package, an unprotected system port, and an unlocked Exposure door. Some well-known vulnerabilities have been Risk examined, documented, and published; others remain Attack 30 latent (or undiscovered). " Exploit (Whitman & Mattford, 2012, pp.9-11) Page | 132 IT Management 2B Components of Information systems within an organization. Figure 29- Components of an Information System (Whitman & Mattford, 2012) "An information system (IS) is much more than computer hardware; it is the entire set of software, hardware, data, people, procedures, and networks that make possible the use of information resources in the organization. These six critical components enable information to be input, processed, output, and stored. Each of these IS components has its own strengths and weaknesses, as well as its own characteristics and uses. Each component of the information system also has its own security requirements. Software The software component of the IS comprises applications, operating systems, and assorted command utilities. Software is perhaps the most difficult IS component to secure. The exploitation of errors in software programming accounts for a substantial portion of the attacks on information. The information technology industry is rife with reports warning of holes, bugs, weaknesses, or other fundamental problems in software. In fact, many facets of daily life are affected by buggy software, from smart phones that crash to flawed automotive control computers that lead to recalls. Software carries the lifeblood of information through an organization. Unfortunately, software programs are often created under the constraints of project management, which limit time, cost, and manpower. Information security is all too often implemented as an afterthought, rather than developed as an integral component from the beginning. In this way, software programs become an easy target of accidental or intentional attacks. Hardware Hardware is the physical technology that houses and executes the software, stores and trans¬ports the data, and provides interfaces for the entry and removal of information from the system. Physical security policies deal with hardware as a physical asset and with the protection of physical assets from harm or theft. Applying the traditional tools of physical security, such as locks and keys, restricts access to and interaction with the hardware components of an information system. Securing the physical location of computers and the computers themselves is important because a breach of physical security can result in a loss of information. Unfortunately, most information systems are built on hardware platforms that cannot guarantee any level of information security if unrestricted access to the hardware is possible. Page | 133 IT Management 2B Before September 11, 2001, laptop thefts in airports were common. A two-person team worked to steal a computer as its owner passed it through the conveyor scanning devices. The first perpetrator entered the security area ahead of an unsuspecting target and quickly went through. Then, the second perpetrator waited behind the target until the target placed his/her computer on the baggage scanner. As the computer was whisked through, the second agent slipped ahead of the victim and entered the metal detector with a substantial collection of keys, coins, and the like, thereby slowing the detection process and allowing the first perpetrator to grab the computer and disappear in a crowded walkway. While the security response to September 11, 2001 did tighten the security process at airports, hardware can still be stolen in airports and other public places. Although laptops and notebook computers are worth a few thousand dollars, the information contained in them can be worth a great deal more to organizations and individuals. 6.6 Data Data stored, processed, and transmitted by a computer system must be protected. Data is often the most valuable asset possessed by an organization and it is the main target of intentional attacks. Systems developed in recent years are likely to make use of database management systems. When done properly, this should improve the security of the data and the application. Unfortunately, many system development projects do not make full use of the database management system’s security capabilities, and in some cases the database is implemented in ways that are less secure than traditional file systems. 6.7 People Though often overlooked in computer security considerations, people have always been a threat to information security. Legend has it that around 200 B.C. a great army threatened the security and stability of the Chinese empire. So ferocious were the REMEMBER: invaders that the Chinese emperor commanded the construction of a great wall that would defend against the Hun invaders. Around 1275 A.D., Information Kublai Khan finally achieved what the Huns had been trying for thousands of years. Initially, the Khan’s army tried to climb over, dig under, and systems are made break through the wall. In the end, the Khan simply bribed the up of six major gatekeeper—and the rest is history. Whether this event actually occurred components: or not, the moral of the story is that people can be the weakest link in an organization’s information security program. And unless policy, education hardware, and training, awareness, and technology are properly employed to software, data, prevent people from accidentally or intentionally damaging or losing people, information, they will remain the weakest link. Social engineering can prey on the tendency to cut corners and the commonplace nature of human procedures, and error. It can be used to manipulate the actions of people to obtain access networks information about a system. 6.8 Procedures Another frequently overlooked component of an IS is procedures. Procedures are written instructions for accomplishing a specific task. When an unauthorized user obtains an organization's procedures, this poses a threat to the integrity of the information. For example, a consultant to a bank learned how to wire funds by using the computer center’s procedures, which were readily available. By taking advantage of a security weakness (lack of authentication), this bank consultant ordered millions of dollars to be transferred by wire to his own Page | 134 IT Management 2B account. Lax security procedures caused the loss of over ten million dollars before the situation was corrected. Most organizations distribute procedures to their legitimate employees so they can access the information system, but many of these companies often fail to provide proper education on the protection of the procedures. Educating employees about safeguarding procedures is as important as physically securing the information system. After all, procedures are information in their own right. Therefore, knowledge of procedures, as with all critical information, should be disseminated among members of the organization only on a need-to-know basis. 6.9 Networks The IS component that created much of the need for increased computer and information security is networking. When information systems are connected to each other to form local area networks (LANs), and these LANs are connected to other networks such as the Internet, new security challenges rapidly emerge. The physical technology that enables network functions is becoming more and more accessible to organizations of every size. Applying the traditional tools of physical security, such as locks and keys, to restrict access to and interaction with the hardware components of an information system are still important; but when computer systems are networked, this approach is no longer enough. Steps to provide network security are essential, as is the implementation of alarm and intrusion systems to make system owners aware of ongoing compromises. 6.10 Balancing Information Security and Access Even with the best planning and implementation, it is impossible to obtain perfect information security. We need to balance security and access. Information security cannot be absolute: it is a process, not a goal. It is possible to make a system available to anyone, anywhere, anytime, through any means. However, such unrestricted access poses a danger to the security of the information. On the other hand, a completely secure information system would not allow anyone access. For instance, when challenged to achieve a TCSEC C-2 level security certification for its Windows operating system, Microsoft had to remove all networking components and operate the computer from only the console in a secured room. To achieve balance—that is, to operate an information system that satisfies the user and the security professional—the security level must allow reasonable access, yet protect against threats. Page | 135 IT Management 2B Figure 30- Balancing Security and Access to information (Whitman & Mattford, 2012, p.19) Because of today’s security concerns and issues, an information system or data-processing department can get too entrenched in the management and protection of systems. An imbalance can occur when the needs of the end user are undermined by too heavy a focus on protecting and administering the information systems. Both information security technologists and end users must recognize that both groups share the same overall goals of the organization—to ensure the data is available when, where, and how it is needed, with minimal delays or obstacles. In an ideal world, this level of availability can be met even after concerns about loss, damage, interception, or destruction have been addressed."31 31 REMEMBER: Security should not impede the operations within an organisation, but create a balance between Information security and Access (Whitman & Mattford, 2012, pp.16-20) Page | 136 IT Management 2B 6.11 INFORMATION SECURITY PROJECT TEAM The information security project team should consist of a number of individuals who are experienced in one or multiple facets of the required technical and nontechnical areas. Many of the same skills needed to manage and implement security are also needed to design it. Members of the security project team fill the following roles: Champion: A senior executive who promotes the project and ensures its support, both financially and administratively, at the highest levels of the organization. Team leader: A project manager, who may be a departmental line manager or staff unit manager, who understands project management, personnel management, and information security technical requirements. Security policy developers: People who understand the organizational culture, existing policies, and requirements for developing and implementing successful policies. Risk assessment specialists: People who understand financial risk assessment techniques, the value of organizational assets, and the security methods to be used. Security professionals: Dedicated, trained, and well-educated specialists in all aspects of information security from both a technical and nontechnical standpoint. Systems administrators: People with the primary responsibility for administering the systems that house the information used by the organization. End users: Those whom the new system will most directly affect. Ideally, a selection of users from various departments, levels, and degrees of technical knowledge assist the team in focusing on the application of realistic controls applied in ways that do not disrupt the essential business activities they seek to safeguard. 6.12 DATA RESPONSIBILITIES The three types of data ownership and their respective responsibilities are outlined below: Data owners: Those responsible for the security and use of a particular set of information. They are usually members of senior management and could be CIOs. The data owners usually determine the level of data classification (discussed later), as well as the changes to that classification required by organizational change. The data owners work with subordinate managers to oversee the day-to-day administration of the data. Data custodians: Working directly with data owners, data custodians are responsible for the storage, maintenance, and protection of the information. Depending on the size of the organization, this may be a dedicated position, such as the CISO, or it may be an additional responsibility of a systems administrator or other technology manager. The duties of a data custodian often include overseeing data storage and backups, implementing the specific procedures and policies laid out in the security policies and plans, and reporting to the data owner. Data users: End users who work with the information to perform their assigned roles supporting the mission of the organization. Everyone in the organization is responsible for the security of data, so data users are included here as individuals with an information security role. Communities of Interest Each organization develops and maintains its own unique culture and values. Within each organizational culture, there are communities of interest that develop and evolve. As defined here, a community of interest is a group of individuals who are united by similar interests or values within an organization and who share a common goal of Page | 137 IT Management 2B helping the organization to meet its objectives. While there can be many different communities of interest in an organization, this book identifies the three that are most common and that have roles and responsibilities in information security. In theory, each role must complement the other; in practice, this is often not the case. Information Security Management and Professionals The roles of information security professionals are aligned with the goals and mission of the information security community of interest. These job functions and organizational roles focus on protecting the organization’s information systems and stored information from attacks. Information Technology Management and Professionals The community of interest made up of IT managers and skilled professionals in systems design, programming, networks, and other related disciplines has many of the same objectives as the information security community. However, its members focus more on costs of system creation and operation, ease of use for system users, and timeliness of system creation, as well as transaction response time. The goals of the IT community and the information security community are not always in complete alignment, and depending on the organizational structure, this may cause conflict. Organizational Management and Professionals The organization’s general management team and the rest of the resources in the organization make up the other major community of interest. This large group is almost always made up of subsets of other interests as well, including executive management, production management, human resources, accounting, and legal, to name just a few. The IT community often categorizes these groups as users of information technology systems, while the information security community categorizes them as security subjects. In fact, this community serves as the greatest reminder that all IT systems and information security objectives exist to further the objectives of the broad organizational community. The most efficient IT systems operated in the most secure fashion ever devised have no value if they are not useful to the organization as a whole. 6.13 CONCLUSION Security is needed in an organisation, especially information security. This responsibility however does not just rest with a single person or department. There are many areas that need attention, such as physical security, personal security, operations security, communications security, national security, and network security, to name a few. We can only protect the information from risk by the application of policy, education and technology. Page | 138 IT Management 2B TEST YOUR KNOWLEDGE Summary Questions: 1. What is the difference between a threat agent and a threat? 2. What is the difference between vulnerability and exposure? 3. Identify the six components of an information system. 4. Who should lead a security team? Should the approach to security be more managerial or technical? SOLUTION TO TEST YOUR KNOWLEDGE QUESTIONS 1. The Main difference between threat and threat agent are Threat is a category of object, person, or other entity that represents a constant danger to an asset. Whereas a threat agent is the facilitator of an attack. Threats are always present. Some threats manifest themselves in accidental occurrences, while others are purposeful. A threat agent is the specific instance or component of a threat. Answer from (Whitman & Mattford, 2012) 2. What is the difference between vulnerability and exposure? The difference is that a vulnerability is the POSSIBILITY or POTENTIAL of the information being compromised, however it may never actually happen. Exposure is the knowledge that this exploit exists and has a definite result when exploited. Page | 139 IT Management 2B In a nutshell one is the potential problem that MAY exists, and the latter is the CERTAINTY that will lead to information being compromised. 3. Identify the six components of an information system. Hardware, software, data, people, procedures, and networks 4. Who should lead a security team? Should the approach to security be more managerial or technical? Ideally, the lead of a security team should have some technical background, but it isn't essential. A good manager is one who listens to what other team members are saying and is able to make decisions based on the evidence. The manager must rely on the technical expertise of the members, even if they themselves are also technical in nature. For a security team it is usually the case where a senior technical lead becomes the manager after a period of time. That would be the best case scenario, but as mentioned, you have to have a person with good management skills overall, whether they are technical in the area or not. A balanced approach is the goal from this team. The end results are technical, but the decisions and how the team operates come from management, and how they interface with the rest of the corporation is very important. Page | 140 IT Management 2B Group Work Exercises: Consider the information stored on your personal computer. For each of the terms listed, find an example and document it: threat, threat agent, vulnerability, exposure, risk, attack, and exploit. Using the Web, identify the chief information officer, chief information security officer, and systems administrator for Apple the makers of the IPAD. Which of these individuals represents the data owner? Data custodian? Using the Web, find out more about Kevin Mitnick. What did he do? Who caught him? Write a short summary of his activities and explain why he is infamous. Page | 141 IT Management 2B Case Study and Group Work 1 Introduction "The Sequential Label and Supply Company (often referred to as SLS) is a . national supplier of stock labels as well as a manufacturer of custom labels and distributor of supplies often used in conjunction with labels, such as envelopes, adhesive tape, mailing cartons, and related office supplies. The company was founded by Fred Chin in 1992 and has grown steadily in the intervening years. As the case study begins, the company has recognized its growing dependence on information technology and has organized its information technology group as shown below: Figure 31- SLS Organisation Trouble It started out like any other day for Amy Windahl at Sequential Label and Supply Company. She liked her technical support job at the help desk. Taking calls and helping the office workers with PC problems was not glaPage | 142 IT Management 2B morous, but it was challenging and paid pretty well. Some of her friends worked at bigger companies, some at higher-tech companies, but everyone kept up with each other, and they all agreed that technology jobs were a good way to pay the bills. The phone rang. This was not a big deal for Amy. She answered her phone about 35 times an hour, 315 times a day, nine days every two weeks. The first call of the day started out the same as usual, with a worried user hoping Amy could help him out of a jam. The call display on her screen gave her all the facts: the user's name, his phone number, the department in which he worked, where his office was on the company campus, and a list of all the calls he'd made in the past. "Hi, Bob," she said. "Did you get that document formatting problem squared away after our last call?" "Sure did, Amy. Hope we can figure out what's going on today." "We'll try, Bob. Tell me about it." "Well, my PC is acting weird," Bob said. "When I go to the screen that has my e-rnail program running, it doesn't respond to the mouse or the keyboard." "Did you try a reboot yet, Bob?" "Sure did. But the window wouldn't close, and I had to turn it off. Once it finished the reboot, and I opened the e-rnail program.Tt's just like it was before-no response at all. The other stuff is working OK, but really, really slowly. Even my Internet browser is sluggish." "OK, Bob. We've tried the usual stuff we can do over the phone. Let me open a case, and I'll dispatch a tech over as soon as possible." Amy looked up at the LED tally board on the wall at the end of the room. She saw that there were only two technicians dispatched to desks ide support at the moment, and since it was the day shift, there were four available. "Shouldn't be long at all, Bob." She clicked off the line from Bob and typed her notes into ISIS, the company's Information Status and Issues System. She assigned the newly generated case to the deskside dispatch queue, knowing the roving desks ide team would be paged with the details and would attend to Bob's problem in just a few minutes. A moment later, Amy looked up to see Charles Moody walking briskly down the hall. Charlie was the senior manager of the server administration team. He was being trailed by three of his senior technicians as he made a beeline from his office to the door of the server room where the company servers were kept in a controlled environment. They all looked worried. Just then, Amy's screen beeped to alert her of a new e-mail. She glanced down. It beeped again-and again. It started beeping constantly. She clicked on the envelope icon, and after a short delay, the mail window opened. She had 47 new e-rnails in her inbox. She opened one from Davey Martinez, an acquaintance from the Accounting Department. The subject line said, "Wait till you see this." The message body read, "Look what this Page | 143 IT Management 2B has to say about our managers' salaries ... " There was an icon for a file attachment that Amy did not recognize. But, she knew Davey, he often sent her interesting and funny e-rnails. She clicked on the icon. Her PC showed the hourglass pointer icon for a second and then resumed showing its normal pointer. Nothing happened. She clicked on the icon for the next e-mail message. Nothing happened. Her phone rang again. She clicked on the ISIS icon on her computer desktop to activate the call management software, and activated her headset. "Hello, Tech Support, how can I help you?" She couldn't greet the caller by name because ISIS had not yet opened the screen on her Pc. "Hello, this is Erin Williams in Receiving." Amy glanced down at her screen. Still no ISIS. She glanced up to the tally board and was surprised to see the inbound call counter tallying up waiting calls like digits on a stopwatch. Amy had never seen so many calls come in at one time. "Hi, Erin," Amy said. "What's up?" "Nothing," Erin answered. "That's the problem." The rest of the call was an exact replay of Bob's earlier call, except Amy couldn't type the notes into ISIS and had to jot them down on a legal pad. She also couldn't dispatch the deskside support team either. She looked at the tally board. It had gone dark. No numbers at all. Then she saw Charlie running down the hall from the server room. He didn't look worried anymore. He looked frantic. Amy picked up the phone. She wanted to check with her supervisor about what to do now. There was no dial tone. The next day at SLS found everyone in technical support busy restoring computer systems to their former state and installing new virus and worm control software. Amy found herself learning how to install desktop computer operating systems and applications as SLS made a heroic effort to recover from the previous day's attack. 1. Do you think this event was caused by an insider or outsider? Why do you think this? 2. Other than installing virus and worm control software, what can SLS do to be ready for the next incident? 3. Do you think this attack was the result of a virus, or a worm? Why do you think this? Starting Out Fred Chin, CEO of Sequential Label and Supply, leaned back in his leather chair. He propped his feet up on the long mahogany table in the conference room where the SLS Board of Directors had just adjourned their quarterly meeting. "What do you think about our computer security problem?" he asked Page | 144 IT Management 2B Gladys Williams, the company's chief information officer, or CIa. He was referring to last month's outbreak of a malicious worm on the company's computer network. Gladys replied, "I think we have a real problem this time, and we need to put together a real solution, not just a quick patch like the last time." Eighteen months ago someone had brought an infected floppy disk in from home and infected the network. To prevent this from happening again, all the floppy drives were removed from the company computers. Fred wasn't convinced. "Let's just add another thousand dollars in the next budget to fix it up." Gladys shook her head. "You've known for some time now that this business runs on computers. That's why you hired me as CIa. I've been researching information security, and my staff and I have some ideas to discuss with you. I've asked Charlie Moody to come in today to talk about it. He's waiting to speak with us." Charlie joined the meeting, and Fred said, "Hello, Charlie. As you know the Board of Directors met today. They received a report on the expenses and lost production from the virus outbreak last month, and they directed us to improve the security of our computers. Gladys says you can help me understand what we need to do about it." "To start with," Charlie said, "instead of setting up a computer security solution, we need to develop an information security program. We need a thorough review of our policies and practices, and we need to establish an ongoing risk management program. There are some other things that are part of the process as well, but these would be a good start." "Sounds expensive," said Fred. Charlie looked at Gladys, then answered,"Well, there will be some extra expenses for specific controls and software tools, and we may have to slow down our product development projects a bit, but the program will be more of a change in our attitude about security than a spending spree. I don't have accurate estimates yet, but you can be sure we will put costbenefit worksheets in front of you before we spend any money." Fred thought about this for a few seconds. "OK. What is our next step?" Gladys answered, "To start with, we need to initiate a project plan to develop our new information security program. We'll use our usual systems development and project management approach. There are a few differences, but we can adapt our current models easily. We will need to appoint or hire a person to be responsible for information security." "Information security? What about computer security?" asked Fred. Charlie responded, "Information security includes all the things we use to do business: software, procedures, data, networks, our staff, and computers." "I see," Fred said. "Bring me the draft project plan and budget in two weeks. The audit committee of the board meets in four weeks, and we'll need to report our progress." Soon after the board of directors meeting, Charlie was promoted to chief information security officer, a new position that reports to the CIa Gladys Williams, and that was created to provide leadership for SLS's efforts to improve its security profile. Page | 145 IT Management 2B 1. How do Fred, Gladys, and Charlie perceive the scope and scale of the new information security effort? 2. How will Fred measure success when he evaluates Gladys' performance for this project? How about Charlie's performance? 3. Which of the threats discussed in this chapter should receive Charlie's. attention early in his planning process? Industrial Espionage Henry Magruder made a mistake: he left a CD at the coffee station. Later, Iris Majwabu was at the coffee station, topping off her coffee cup, hoping to wrap up her work on the current SQL code module before it was time to go home. As she turned to leave, she saw the unlabeled CD on the counter. Being the helpful sort, she picked it up, intending to return it to the person who'd left it behind. Expecting to find perhaps the latest device drivers, or someone's work from the development team's office, Iris slipped the disk into the drive of her computer and ran a virus scan against its contents. She then opened the file explorer program. She had been correct in assuming the CD contained data files, lots of them. She opened a file at random, and names, addresses, and Social Security numbers scrolled down her screen. These were not the test records she expected; instead they looked more like critical payroll data. Concerned, she found a readme.txt file and opened it. It read: Jill, see files on this disc. Hope they meet your expectations. Wire money to my account as arranged. Rest of data sent on payment. Iris realized that someone was selling sensitive company data to an outside information broker. She looked back at the directory listing and saw that the files spanned the range of every department at Sequential Label and Supply-everything from customer lists to shipping invoices. She saw one file that she knew contained the credit card numbers for every Web customer the company supplied. She opened another file and saw that it stopped about halfway through the data. Whoever did this had split the data into two parts. That made sense: payment on delivery of the first half. Now, who did this belong to? She opened up the file properties option on the readme.txt file. The file owner was listed as "hmagruder." That must be Henry Magruder, the developer two cubes over in the next aisle. Iris pondered her next action. Iris called the company security hotline. The hotline was an anonymous way to report any suspicious activity or abuse of company policy, although Iris chose to identify herself. The next morning, she was called to a meeting with an investigator from corporate security, which led to more meetings with others in corporate security, and then finally a meeting with the Director of Human Resources and Gladys Williams, the CIO of SLS. Page | 146 IT Management 2B 1. Was Iris justified in determining who the owner of the CD was? 2. Should Iris have approached Henry directly, or was the hotline the most effective way to take action? 3. Should Iris have placed the CD back at the coffee station and forgotten the whole thing? Would that response have been ethical on her part? Deciding What to Protect Charlie Moody called the meeting to order. The conference room was full of developers, systems analysts, IT managers, business users, and business managers. "All right everyone, let's get started. Welcome to the kick-off meeting of the Sequential Label and Supply Information Security Task Force. That's the name of our new project team, and we're here today to talk about our objectives and to review the initial work plan." "Why are all of the users here?" asked the manager of sales. "Isn't security a problem for the IT Department?" Charlie explained, "Well, that used to be the case, but we've come to realize that information security is about managing the risk of using automated systems, which involves almost everyone in the company. In order to make our systems more secure, we will need the participation of people from all departments." Charlie continued, "1 hope everyone has read the packets we sent out last week with the legal requirements we face in our industry and the background articles on threats and attacks. Today we'll begin the process of identifying and classifying all of the information technology risks that face our organization. This includes everything from fires and floods that could disrupt our business to criminal hackers who might try to steal or destroy our data. Once we identify and classify the risks facing our assets, we can discuss how to reduce or eliminate these risks by establishing controls. Which controls we actually apply will depend on the costs and benefits of each control." "Wow, Charlie!" said Amy Windahl from the back of the room. "I'm sure we need to do it-I was hit by the last attack, just as everyone here wasbut we have hundreds of systems." "It's more like thousands," said Charlie. He went on, "That's why we have so many people on this team and why the team includes members of every department." Charlie continued, "Okay, everyone, please open your packets and take out the project plan with the work list showing teams, tasks, and schedules. Any questions before we start reviewing the work plan?" As Charlie wrapped up the meeting, he ticked off a few key reminders for everyone involved in the asset identification project. "Okay, everyone, before we finish, please remember that you should try to make your asset lists complete, but be sure to focus your attention on the more valuable assets first. Also, remember that we evaluate our assets based on business impact to profitability first, and then economic cost of Page | 147 IT Management 2B replacement. Make sure you check with me about any questions that come up. We will schedule our next meeting in two weeks, so please have your draft inventories ready." 1. Did Charlie effectively organize the work before the meeting? Why or why not? Make a list of the important issues you think should be covered by the work plan. For each issue, provide a short explanation. 2. Will the company get useful information from the team it has assembled? Why or why not? 3. Why might some attendees resist the goals of the meeting? Does it seem that each person invited was briefed on the importance of the event and the issues behind it? "32 SLS Case. 2012. SLS Case. [ONLINE] Available at: http://brainmass.com/business/informationsystems/360471. [Accessed 12 May 2012]. 32 Page | 148 IT Management 2B Case Study and Group Work 2 "Government executives expressed widespread concern about data leakage, whether caused by malicious actions or accidental missteps, according to an online survey of 209 executives, conducted by 1105 Government Information Group Content Solutions. In total, the survey conducted online in February, garnered 209 responses from public sector executives from organizations ranging from the Department of Defense to civilian federal agencies, to executives from state and local governments. Roughly a fifth of government agencies responding to the survey reported that external IT security incidents have increased in the past year. The seemingly constant stream of viruses, worms, rootkits, denial-of-service (DoS) attacks and other security threats underscore how the government’s network perimeter has expanded and blurred, as the proliferation of mobile and remote users has grown. A whopping 92% of those surveyed said they expect to spend at least as much, if not more for information security threat prevention in the coming year. The average annual agency budget for IT security threat prevention, across all levels of government was reported at $2.75 million Progressive or leading edge agencies expressed concern about the proliferation of mobile devices and the impact of cloud computing on security, and are most likely to be investigating single-sign on authentication alternatives, in their ongoing efforts to improve agency IT threat prevention infrastructures. The proliferation of mobile devices with confidential information and access to internal systems was viewed as an increasing security concern, by 78% of respondents. Page | 149 IT Management 2B IT security audits are conducted to test and ensure an agency’s IT assets are, in fact, protected. Not surprisingly, those respondents who reported failing an IT security audit were also more apt to increase their budgets for IT security protections. Since agencies undergo both external security audits as well as internal audits, the survey results indicated that nearly 20% of respondents had failed at least one external audit and 22% had failed at least one recent internal security audit. Although a lack of adequate protection against data loss or leaks is considered a serious problem, survey respondents to the 1105 Government Information Group Content Solutions Information Security Survey, said investments in content security and data loss prevention were not as high on the priority list, as were investments in intrusion detection, firewalls, VPNs, IP security and continuous monitoring. Data loss prevention (DLP) helps ensure that sensitive personal information and classified information housed on government networks remains safe and secure. Page | 150 IT Management 2B Tools for Protection In the 1105 Government Information Group’s survey, respondents were asked to select the tools they turn to most to help reduce risks associated with a broad array of information security threats. Firewalls and virtual private network services, along with anti-malware, anti-spam, encryption, authentication, content filtering, intrusion detection and continuous monitoring topped the list of tools to protect government resources." 33 Read the above and research further and then the questions below: 1. Discuss in detail some of the greatest Information Technology threats that governments and organisations face? 2. Why do these threats to Information Technology exist? What would be some of the reasons for these Information Technology incursions? 3. Discuss how Mobile access and cloud storage have added the risk areas facing organisations. 4. How much should a company spend on investing in securing their information? 5. Do Information Technology audits assist in driving security awareness? 6. Could some organisation's data be compromised without their knowledge? 7. How well prepared is your government against threats facing organisations? 8. What are the ways in which threats to organisations are examined and the most common threat preventions systems around the world that are in practice or being used today? 33 Research Report: Information Security -- Federal Computer Week. 2012. Research Report: Information Security -- Federal Computer Week. [ONLINE] Available at: http://fcw.com/microsites/2012/download-information-security/index.aspx. [Accessed 17 May 2012] Page | 151 IT Management 2B SECTION SEVEN: CONCLUSION In conclusion I would like to thank you for taking the time to go through this module. The journey ahead is bright and positive. The foundations laid in this and the previous module, will put you on a very rewarding track in terms of gearing towards taking an organisation to new modes of acquiring success simply by understanding this module and applying relevant methods or methodologies. I hope this study guide has helped in contextualizing this information. It should have firmed up your understanding of Business Intelligence and at the processes, policies and principles of protecting your data and using your data with business intelligence. This diagram should help you recap what we have already covered. Thank you. Page | 152 IT Management 2B Prescribed Reading: Reynolds, George W. (2010) Information Technology for Managers, International Edition. United States of America: Cengage Learning Schniederjans, M.J., 2004. Information Technology Investment: Decision-Making Methodology. World Scientific Pub Co Inc. Williams, B and Sawyer,S. (2010) Using Information Technology, 8th Edition. USA, New York: Mcgraw-Hill Recommended Reading: Bidgoli, H. (2012) MIS2. Boston: Cengage Learning Whitman, Michael E. (2011) Principles of Information Security. 4 Edition. Course Technology. Paige Baltzan, A.P., 2009. Business Driven Information Systems. New York: McGraw-Hill. Page | 153