Title: Chapter 17 Managing Information
1Chapter 17Managing Information
Designed Prepared byB-books, Ltd.
2Moores Law
3Why Information Matters
After reading these sections, you should be able
to
- explain the strategic importance of information.
- describe the characteristics of useful
information (i.e., its value and costs).
4Data versus Information
- Raw data facts figures
- Information useful data that influences choices
5Biz Flix Lorenzos Oil
Beyond the Book
Take Two Video Click
Do the scientists present data or information
during the symposium?
6Strategic Importance of Information
1
7First-Mover Advantage
1.1
8Cable versus DSL
Cable companies have invested 90 billion over
the last decade to create a first-mover advantage
in delivering high-speed Internet.
9Fast Facts on First Movers
ON AVERAGE
First movers earn a 30 market share. Later
movers earn a 19 share. Of market leaders, a
whopping 44 were first movers.
10Sustaining a Competitive Advantage
1.2
11Characteristics of Useful Information
- Accurate
- Complete
- Relevant
- Timely
2
12Costs of Useful Information
- Acquisition
- Processing
- Storage
- Retrieval
- Communication Costs
2
13Getting and Sharing Information
After reading these sections, you should be able
to
- explain the basics of capturing, processing, and
protecting information. - describe how companies can access and
shareinformation and knowledge.
14Capturing Information
3.1
1510 Uses for RFID
- tracking computer equipment
- security access for employees
- EZpass on toll roads
- instant credit card payments
- cell phone SIM cards
- shipping labels
- preventing shrinkage
- tracking files
- collecting data on meeting participants
- customer loyalty cards (instead of a stamp)
- Source 10 Business Uses for RFID, Inc.,
available online at http//technology.inc.com/mult
imedia/slideshows/content/10-business-uses-for-rfi
d.html/
16Processing Information Data Mining
3.2
17Unsupervised Data Mining
3.2
18Protecting Information
- Authentication
- Authorization
- Two-factor authentication
- Firewalls
- Antivirus software
- Data encryption
- Virtual private networks
- Secure Sockets Layer (SSL) encryption
3.3
19Tips for Protecting Data
Beyond the Book
- Rule 1 Understand the real value of data (not
just the value of the disk its on) and treat it
accordingly. - Encrypt data.
- Track data that you send to someone else.
- Use a coding system to label the value of a disk
or a memory stick. - Source B. Worthen, Workers Losing Computer Data
May Lack Awareness of its Value, The Wall Street
Journal, 27 November 2007, B3.
20Accessing and SharingInformation and Knowledge
4
21Executive Information System (EIS)
- Uses internal and external data
- Used to monitor and analyze organizational
performance - Must provide accurate, complete, relevant,
andtimely information to managers
4.1
22Characteristics of Best-Selling EIS
Ease of Use
- Few commands to learn
- Important views saved
- 3-D charts
- Geographic dimensions
Analysis of Information
- Sales tracking
- Easy-to-understand displays
- Time periods
- Compare to standards
- Trigger exceptions
- Drill down
- Detect alert newspaper
- Detect alert robots
Identification ofProblems and Exceptions
4.1
23Intranets
- Private company networks
- Allow employees to access, share, and publish
information - A firewall permits only authorized
internalaccess
4.1
24Why Companies Use Intranets
- Inexpensive
- Increase efficiencies and reduce costs
- Intuitive and easy to use
- Work across all computer systems
- Can be built on top of existing network
- Work with software programs that convert to HTML
- Software is available at no cost or is less
expensive
4.1
25Corporate Portals
4.1
26External Access and Sharing
4.2
27Benefits of External Access and Sharing
4.2
28Electronic Data Interchange (EDI)
4.2
29Web Services
Web Services
Using standardized protocols to describe data
from one company in such a way that those data
can automatically be read, understood,
transcribed, and processed by different computer
systems in another company.
4.2
30Extranet
Extranet
Allows companies to exchange information and
conduct transactions with outsiders by providing
them direct, Web-based access to authorized parts
of a companys intranet or information system.
4.2
31Sharing Knowledge and Expertise
4.3