SlideShare a Scribd company logo
1 of 87
WRITING A CRITICAL REVIEW
What is a critical review?
A critical review is much more than a simple summary; it is an
analysis and evaluation of a book, article,
or other medium. Writing a good critical review requires that
you understand the material, and that you
know how to analyze and evaluate that material using
appropriate criteria.
Steps to writing an effective critical review:
Reading
Skim the whole text to determine the overall thesis, structure
and methodology. This will help you better
understand how the different elements fit together once you
begin reading carefully.
Read critically. It is not enough to simply understand what the
author is saying; it is essential to
challenge it. Examine how the article is structured, the types of
reasons or evidence used to support the
conclusions, and whether the author is reliant on underlying
assumptions or theoretical frameworks. Take
copious notes that reflect what the text means AND what you
think about it.
Analyzing
Examine all elements. All aspects of the text—the structure,
the methods, the reasons and evidence, the
conclusions, and, especially, the logical connections between all
of these—should be considered.
The types of questions asked will vary depending on the
discipline in which you are writing, but the
following samples will provide a good starting point:
Structure What type of text is it? (For example: Is it a primary
source or secondary
source? Is it original research or a comment on original
research?)
What are the different sections and how do they fit together?
Are any of the sections particularly effective (or ineffective)?
Methodology Is the research quantitative or qualitative?
Does the methodology have any weaknesses?
How does the design of the study address the hypothesis?
Reasons/Evidence What sources does the author use (interviews,
peer-reviewed journals,
government reports, journal entries, newspaper accounts, etc.)?
What types of reasoning are employed (inductive, deductive,
abductive)?
What type of evidence is provided (empirical, statistical,
logical, etc.)?
Are there any gaps in the evidence (or reasoning)?
Conclusions Does the data adequately support the conclusion
drawn by the researcher(s)?
Are other interpretations plausible?
Are the conclusions dependent on a particular theoretical
formulation?
What does the work contribute to the field?
Logic What assumptions does the author make?
Does the author account for all of the data, or are portions left
out?
What alternative perspectives remain unconsidered?
Are there any logical flaws in the construction of the argument?
© Allyson Skene. The Writing Centre, University of Toronto at
Scarborough. See terms and conditions for use at
http://www.utsc.utoronto.ca/~tlsweb/TWC/webresources/terms.
htm
Writing
Formulate a thesis based on your overall evaluation. A strong
thesis will acknowledge both strengths
and limitations.
E.g. While the article reports significant research supporting the
view that certain types of computer
use can have a positive impact on a student’s GPA, the
conclusion that game playing alone can
improve student achievement is based on a misinterpretation of
the evidence.
Not: This article misinterprets key evidence to support the
conclusion that game playing can improve GPA.
Ensure that your thesis answers the assignment. If you are asked
to write a review of a single text, with
no outside sources, then your essay should focus strictly on the
material in the text and your analysis and
evaluation of it. If you are asked to write about more than one
work, or to draw connections between an
article or book and the course material, then your review should
address these concerns.
Choose a structure that will best allow you to support your
thesis within the required page constraints.
The first example below works well with shorter assignments,
but the risk is that too much time will be
spent developing the overview, and too little time on the
evaluation. The second example works better for
longer reviews because it provides the relevant description with
the analysis and evaluation, allowing the
reader to follow the argument easily.
Two common structures used for critical reviews:
Example 1 Example 2
Introduction
Overview of the text
Evaluation of the text
� Point 1
� Point 2
� Point 3
� Point 4 …(continue as necessary)
Conclusion
Introduction (with thesis)
Point 1: Explanation and evaluation
Point 2: Explanation and evaluation
Point 3: Explanation and evaluation
(continue elaborating as many points as
necessary)
Conclusion
Important: Avoid presenting your points in a laundry-list style.
Synthesize the information as much as
possible.
“Laundry-List” Style of Presentation Synthesized Argument.
The article cites several different studies in support
of the argument that playing violent video games can
have a positive impact on student achievement.
These studies refer to educational games and other
types of computer use. The argument is not logically
well constructed. Educational games are not the same
as violent video games. The article also ignores data
indicating that people with the highest GPA are those
that reported low computer use. Also, different types
of computer use could include things like researching
or word-processing, and these activities are very
different from playing violent video games.
The evidence cited in the article does not support the
overall conclusion that playing violent games improves
GPA. One study only examines educational games in
relation to GPA, so it is questionable whether the same
findings will hold true for other types of games. Another
study does not distinguish between different types of
computer use, making it difficult to assess whether it is
game playing or activities such as research and writing
that contributed to improvements in GPA. Further, the
author disregards relevant data that indicates that students
with the highest GPAs are those who report low
computer use, which means that a direct correlation
between game playing and GPA cannot be supported.
5/28/2015
1
McGraw-Hill-Ryerson ©2015 The McGraw-Hill Companies, All
Rights Reserved
Opening Case:
The Ironman
6-2 Copyright © 2015 McGraw-Hill Ryerson Limited
Chapter Six Overview
• SECTION 6.1 – NETWORKS AND
TELECOMMUNICATIONS
– Introduction
– Network Basics
– Internet Providers
– Networks Enable Data Sharing
• SECTION 6.2 – MOBILE TECHNOLOGY
– Business Drivers for Mobile Technologies
– Using Cellular Technologies in Business
– Using Satellite Technologies in Business
– Using Wireless Technologies in Business
– Challenges of Business Mobility
– Mobile Business Trends
6-3 Copyright © 2015 McGraw-Hill Ryerson Limited
Learning Outcomes
1. Explain network basics and how networks enable data sharing
to occur.
2. Describe the use of networks and telecommunications in
business (i.e., VoIP, networking businesses, increasing speed
of business, and the challenges associated with securing
business networks).
3. Describe the business drivers for using mobile technologies,
and the advantages and disadvantages of using cellular
technologies in business.
4. Describe how satellite technologies are used in business, and
how LBS, GPS, and GIS help create business value.
5. Explain Wi-Fi, Wi-MAX, and RFID technologies, their use in
business, as well as mobile business trends.
5/28/2015
2
McGraw-Hill-Ryerson ©2015 The McGraw-Hill Companies, All
Rights Reserved
NETWORKS AND
TELECOMMUNICATIONS
6-5 Copyright © 2015 McGraw-Hill Ryerson Limited
Learning
Outcome • Telecommunication system
– Enables the transmission of data over public or private
networks
• Network
– A system created by linking two or more computers and
establishing standards, or protocols, so that they can work
together
Introduction
6.1
6-6 Copyright © 2015 McGraw-Hill Ryerson Limited
Learning
Outcome • Three types of networks include:
– Local Area Network
• Operates within a geographically limited area usually a
building or groups of buildings
– Wide Area Network
• Operates over a widely dispersed area, including
around the world
– Metropolitan Area Network
• Large computer network spanning a city
Network Basics
6.1
5/28/2015
3
6-7 Copyright © 2015 McGraw-Hill Ryerson Limited
Learning
Outcome • Internet Service Provider (ISP)
– Provides access to the Internet and related services
• Wireless Internet Service Provider (WISP)
– Allows subscribers to connect using a wireless at specific
“hotspots”
• Online Service Provider (OSP)
– Connects subscribers through its own web site offering a
wide array
of ancillary resources
• Application Service Provider (ASP)
– Offers Internet-based business services
• Service Level Agreements (SLA)
– Define the responsibilities of the service provider and the
customer’s
expectations
Internet Service Providers
6.1
Learning
Outcome
Copyright © 2015 McGraw-Hill Ryerson Limited 6-8
Wireless Access Diagram
Figure 6.1
6.1
6-9 Copyright © 2015 McGraw-Hill Ryerson Limited
Learning
Outcome
Advantages
• Uses existing networks and Internet infrastructure
• Cheaper than traditional phone service
• Visual connection as well as voice
• Ability to send reports etc. through file transfer
feature
Disadvantages
• Similar to other Internet communications problems
– Dropped connections
– Security threats
Voice over IP (VoIP)
6.2
Uses TCP/IP technology to transmit voice and visuals over
long-distance telephone lines
5/28/2015
4
Learning
Outcome
Copyright © 2015 McGraw-Hill Ryerson Limited 6-10
Voice over IP (VoIP)
Figure 6.2
. Diagram of a VoIP Connection 6.2
6-11 Copyright © 2015 McGraw-Hill Ryerson Limited
Learning
Outcome Traditional networking systems include:
Virtual Private Network (VPN)
• Secure access through the Internet to an organization’s
internal
network
Value-Added Network (VAN)
• Private network for securely exchanging information through a
high-capacity connection
Disadvantages
• Handle limited types of business data
• Do not support real-time business process integration
• Relatively expensive, complex and difficult to expand
Networking Business
6.2
Learning
Outcome
Copyright © 2015 McGraw-Hill Ryerson Limited 6-12
E-Business Network Characteristics
Transparent exchange of data with suppliers, trading partners
and
customers.
Reliable and secure exchange of information internally and
externally
via the Internet or other networks.
End-to-end integration and message delivery across multiple
systems,
in particular databases, clients, and servers.
Scalable processing power and networking capacity to meet
high
demands.
Integrator and transactions framework for both digital
businesses and
traditional bricks-and-mortar businesses that want to leverage
the
Internet for any type of business.
Figure 6.3
6.2
5/28/2015
5
Learning
Outcome
Copyright © 2015 McGraw-Hill Ryerson Limited 6-13
Virtual Private Network Overview
Figure 6.4
6.2
6-14 Copyright © 2015 McGraw-Hill Ryerson Limited
Learning
Outcome Speed is measured by the
volume of data that can
be transmitted per unit
of time.
• Bandwidth measures
the medium’s capacity
• Hertz is cycles per
second
• Bits per second (bps)
refers to the number of
signals transmitted per
second
Increasing the Speed of Business
6.2
Figure 6.5
Telecommunications Transmission
Speeds
Learning
Outcome
Copyright © 2015 McGraw-Hill Ryerson Limited 6-15
Internet Function Average Download Time
6.2
Function
Dial-Up
(56 K)
Satellite
(512 K)
DSL
(1M)
Cable
(5M)
Wireless
(5M)
An email 1 sec <1 sec
A basic Web
page 10 sec <1 sec
One 5-minute
Song (5M) 15 min 2 min 1 min 40 sec
One 2-hour
Movie (500M) 20 hours 4 h 2 h 70 min
Figure 6.6
5/28/2015
6
Learning
Outcome
Copyright © 2015 McGraw-Hill Ryerson Limited 6-16
Advantages & Disadvantages of
Broadband Technology
6.2
Technology
Typical
Download
Speed
(Mbps)
Typical
Upload
Speed
(Mbps)
Advantages and Disadvantages
DSL 0.5-3 0.25-1.0
-Uses existing telephone lines
-Slower downloads than cheaper
alternatives
Cable 0.5-250 0.5-15
-Uses existing cable
-Shared connections can overload
system
T1/T3
dedicated line 1.5-3 1.5-3
-Uses existing telephone wiring
-Susceptible to crosstalk
From Figure 6.7
Learning
Outcome
Copyright © 2015 McGraw-Hill Ryerson Limited 6-17
Advantages & Disadvantages of
Broadband Technology
6.2
Technology
Typical
Download
Speed
(Mbps)
Typical
Upload
Speed
(Mbps)
Advantages and Disadvantages
Fibre-to-the-
home 5-300 1-15
-Fast data speeds, low power costs
-Not widely available
Fixed
Wireless 0.5-12 0.5
-Inexpensive to install
-Weather, topography etc. can
cause interference
Satellite 0.5-2 0.05
-Nearly universal coverage
-Expensive service/equipment
From Figure 6.7
6-18 Copyright © 2015 McGraw-Hill Ryerson Limited
Learning
Outcome Organizations must be concerned about proper
identification and authorization of users for
network access
• Logon and Password
– Employees must be trained to guard their
passwords and used them properly
• Data Encryption
– Confidential information must be coded
– “Keys” for decoding must be protected
– Cost of encryption is related to strength of the
codes
• Digital certificates/Digital Cash
– Methods of reducing credit card fraud
Securing Business Networks
6.2
5/28/2015
7
6-19 Copyright © 2015 McGraw-Hill Ryerson Limited
OPENING CASE QUESTIONS
The Ironman
1. Why is having real-time data of an athlete’s progress in
a race important to the Ironman championship?
2. How is WTC using telecommunications and networks to
improve its competitive advantage in the professional
sports broadcasting industry?
3. How could WTC employ VoIP to enhance the
experience of family and friends watching the
triathalon?
4. What disadvantages or challenges would WTC likely
face implementing broadband technology?
5. What security issues does WTC likely need to address in
its use of network technologies?
McGraw-Hill-Ryerson ©2015 The McGraw-Hill Companies, All
Rights Reserved
Data Warehousing
Learning
Outcome
Copyright © 2015 McGraw-Hill Ryerson Limited 6-21
Drivers of Wireless Growth
Mobile refers to technologies that travel with the user.
Wireless is any type of electronic operation that does not use
a “hard wired” connection, physical plug in a physical outlet.
6.3
Universal access to
data and
applications
People are mobile and can access more data than ever
before but are not at the point of all data, anytime,
anywhere, and anyplace.
Automation of
business processes
Wireless technologies can centralize critical data
and eliminate redundant processes.
User convenience,
timeliness, and
accessibility
People are no longer cut off from the world or from
the office. Through wireless tools and mobile devices
they can have real time data access and transmission.
From Figure 6.8
5/28/2015
8
Learning
Outcome
Copyright © 2015 McGraw-Hill Ryerson Limited 6-22
Mobile Devices Changing Business
6.3
Figure 6.9
6-23 Copyright © 2015 McGraw-Hill Ryerson Limited
Learning
Outcome • Mobile Applications can:
– Help track materials and
shipments from suppliers and
distributors to customers
– Manage inventory
– Support Point of Sale
– Collect data in an automated
fashion
– Provide immediate data
analysis
Mobile Strategy
6.3
Learning
Outcome
Copyright © 2015 McGraw-Hill Ryerson Limited 6-24
Factors to Consider When Deploying
Mobile Strategies
6.3
Step
Defining Risk Define potential risk to the organization of a GO
or NO GO decision.
Knowing the Limits
Of Technology
Set realistic expectations regarding needed
functionality, about the IT resources deploying
it and the capabilities of ultimate users.
Protecting Data
From Loss
Security must be a multi-faceted approach
covering all areas of exposure.
Compliance in the
Mobile Enterprise
More mobility, more devices, more potential for
security breaches.
Staying flexible &
Embracing Change
Once implemented, monitor and modify
strategy on a regular basis.
From Figure 6.10
5/28/2015
9
6-25 Copyright © 2015 McGraw-Hill Ryerson Limited
Learning
Outcome • 3G cellular networks are designed for
high-speed transmission of multi-media
data and voice.
• 4G networks are set up to integrate radio
and television transmission and to
consolidate the world’s phone standards
into one high-speed technology.
• Convergence of voice, video, and data
allow users to make calls, surf the Web,
use touch controls, access music,
audiobooks, videos, TV shows and movies
on mobile devices.
Cellular Technologies
6.3
Learning
Outcome
Copyright © 2015 McGraw-Hill Ryerson Limited 6-26
Cellular Technology Overview
Figure 6.11
6.3
Learning
Outcome
Copyright © 2015 McGraw-Hill Ryerson Limited 6-27
Cellular Technology Advantages &
Disadvantages
6.3
Figure 6.12
5/28/2015
10
6-28 Copyright © 2015 McGraw-Hill Ryerson Limited
Learning
Outcome • Smartphone
Make calls, surf the Web, email a photo and
download an enormous variety of “apps”
• Tablets
Small, flat computer with a touch-screen
and virtual keyboard. Mobile office
applications have spurred rapid business
adoption.
• Bluetooth
A telecommunications industry
specification that allows mobile devices to
use a short-range wireless connection.
Cellular Technologies
6.3
Figure 6.13
The Bluetooth
Virtual Keyboard
6-29 Copyright © 2015 McGraw-Hill Ryerson Limited
Learning
Outcome Communication Satellite
• A large, expensive, microwave
repeater in the sky
• Cost-effective for transmitting
large quantities of data
Microwave Transmitter
• Uses the atmosphere (or outer
space) as a transmission medium
to send signals to a microwave
receiver
• Communications satellites
Facilitate data transmission
Communication Satellite Technologies
Figure 6.14
6.4 Satellite Microwave Link
6-30 Copyright © 2015 McGraw-Hill Ryerson Limited
Learning
Outcome Applications that use the geographic location of the
device
to provide location-specific data to the mobile user.
Privacy Issues
• Subject geographically targeted for promotions without prior
consent
• Customer’s knowledge of another’s location may lead to
embarrassing situations
• Location data can be used for harassment or attack
• Service denial because a location for delivery is deemed
unsafe
• Legal restrictions
Location-Based Services (LBS)
6.4
5/28/2015
11
Learning
Outcome
Copyright © 2015 McGraw-Hill Ryerson Limited 6-31
Mass Market LBS Market Segments
6.4
Market
Emergency -Locate emergency call
-Roadside Assistance
Navigation -Directions to points of interest
-E-tourism
-Avoidance of traffic jams
Tracking -Tracking of children or elderly
-Find-a-friend
Location Advertising -Located video push
Gaming -N-Gage (allows multiple gamers to play
against each other over Bluetooth or
wireless phone network connections.)
From Figure 6.15
Learning
Outcome
Copyright © 2015 McGraw-Hill Ryerson Limited 6-32
Professional Market LBS Market Segments
6.4 Market
Workforce Organization -Field force management
-Optimization of routes
-Logistics
-Enterprise Resource Planning
Security -Field tracking
-Worker protection
From Figure 6.15
6-33 Copyright © 2015 McGraw-Hill Ryerson Limited
Learning
Outcome Global position systems (GPS)
• A constellation of 24 well-spaced satellites that orbit the Earth
and
make it possible for people with ground receivers to pinpoint
their
geographical location.
Global Positioning Systems
6.4
Global Positioning System Architecture
Figure 6.16
5/28/2015
12
6-34 Copyright © 2015 McGraw-Hill Ryerson Limited
Learning
Outcome Geographic information system (GIS)
• Consists of hardware, software, and data that provide location
information for display on a multidimensional map.
• Some Common Uses:
– Locating businesses or points of interest in a specific area
– Routing from departure to destination
– Mapping population densities
Geographic Information Systems
6.4
6-35 Copyright © 2015 McGraw-Hill Ryerson Limited
Learning
Outcome • Wireless LAN (WLAN) - A local area network that
uses radio
signals to transmit and receive data over distances of a few
hundred feet
• Wireless fidelity (Wi-Fi) - A means by which portable devices
can connect without a cable to a local area network, using
access points that send and receive data via radio waves
Wireless Fidelity (Wi-Fi)
6.5
Learning
Outcome
Copyright © 2015 McGraw-Hill Ryerson Limited 6-36
Wi-Fi in the Sky
Figure 6.17
6.5
5/28/2015
13
6-37 Copyright © 2015 McGraw-Hill Ryerson Limited
Learning
Outcome Worldwide Interoperability
for Microwave Access
• A communications technology
aimed at providing high-speed
wireless data over
metropolitan area networks
(MANs)
• Requires a tower & a receiver
• Wide range capability
provides service to remote
area
• Line-of-site and non-line-of-
site operability
WiMAX
Figure 6.18
6.5
6-38 Copyright © 2015 McGraw-Hill Ryerson Limited
Learning
Outcome • Radio frequency identification (RFID)
– Uses active or passive tags that store information and relay it
to
electronic readers
• RFID tag
– Contains a microchip and an antenna, and typically works by
transmitting an item’s numerical identifier via radio waves to a
network for tracking purposes
Radio Frequency Identification
6.5
RFID
Architecture
Figure 6.19
6-39 Copyright © 2015 McGraw-Hill Ryerson Limited
Learning
Outcome • RFID codes can be:
– Linked to the purchase of a particular product by a specific
customer
• A loyalty promotion code identifies the customer and the
purchase is saved towards a discount but also becomes data in
the
customer’s record
– Read at greater distances than bar codes allowing surveillance
• For example, reading what is in someone’s shopping bag in a
mall
can be done without the target being aware
• There are proposals to require all RFID products to be labeled
• RSA Blocker Tags are used to restrict reading of the tags to
within the store’s premises
RFID Privacy Issues
6.5
5/28/2015
14
Learning
Outcome
Copyright © 2015 McGraw-Hill Ryerson Limited 6-40
Challenges of Business Mobility
6.5
Figure 6.21
6-41 Copyright © 2015 McGraw-Hill Ryerson Limited
Learning
Outcome Mobility creates a large number of remote
access points into a network
• Wi-Fi Protected Access (WPA)
– A wireless security protocol to protect Wi-Fi
networks
• War chalking
– The practice of tagging pavement with
codes displaying where Wi-Fi access is
available
• War driving
– Deliberately searching for Wi-Fi signals
while driving by in a vehicle
Protecting Wireless Connections
6.5
6-42 Copyright © 2015 McGraw-Hill Ryerson Limited
Learning
Outcome • Direct marketing only to
contracted entities
• Electronic messages identify
senders
• Solicitation only with target’s
consent
• LBS indicates to user how the
data will be used
• Opportunities provided for user
to reject marketing initiatives
Privacy Policies for Location-based services
(LBS)
6.5
5/28/2015
15
6-43 Copyright © 2015 McGraw-Hill Ryerson Limited
Learning
Outcome • Social networking is pre-loaded on mobile devices.
• Mobile TV, real-time video streaming and cost-
effective content downloads are a reality with 4G
devices.
• Multi-function devices cheaper and more
versatile.
• Availability of increased bandwidth supports
expansion of Location-based services.
• Marketing and logistics applications are growing to
take advantage of Location-based services.
Mobile Business Trends
6.5
6-44 Copyright © 2015 McGraw-Hill Ryerson Limited
OPENING CASE QUESTIONS
The Ironman
6. How is WTC using mobile (cellular) technologies to
improve its operations?
7. How is WTC using satellite technologies to improve its
operations?
8. Explain how WTC is using WiMAX and RFID wireless
technologies in its operations. To what extent do these
technologies offer business value?
9. Identify the ethical and security dilemmas that WTC
faces in using wireless technologies in its business
operations.
6-45 Copyright © 2015 McGraw-Hill Ryerson Limited
CLOSING CASE ONE:
Wireless Bikes
1. What advantages does a wireless network provide
Denver B-cycle?
2. What challenges does a wireless network create for
Denver B-cycle?
3. What information not described in the case can Denver
B-cycle use with RFID and LBS data?
4. How could Denver B-cycle use other wired or wireless
network technologies to gain a competitive advantage?
5/28/2015
16
6-46 Copyright © 2015 McGraw-Hill Ryerson Limited
CLOSING CASE TWO: Geoblogging for
Chimpanzees and More
1. Now just imagine what you could do with Google Earth if
you added GPS. What other types of research might be
accomplished using GPS?
2. How could other nonprofits use geoblogs and GPS to
help their cause?
3. How could a business use Google Earth and GPS to create
a competitive advantage?
4. Are there any ethical or security concerns with this type
of geoblog?
6-47 Copyright © 2015 McGraw-Hill Ryerson Limited
CLOSING CASE THREE:
Crash Pads
1. How else can wireless devices be used to prevent injury?
2. Should all football teams, including professional,
academic, and recreational, use wireless sensors in
helmets?
3. Should other sports such as hockey and cycling start using
this technology? Why or why not?
4. How would you suggest that coaches and staff be trained
so that they don’t become over-reliant on these devices as
the primary indicator of a potential head injury?
BDT - Lecture Style Format Sample 1
McGraw-Hill-Ryerson ©2012 The McGraw-Hill Companies, All
Rights Reserved
CHAPTER 7
Enterprise
Computing
Challenges and
Enterprise Resource
Planning
Opening Case:
Shell Canada Fuels
Productivity with ERP
4-2
Copyright © 2012 McGraw-Hill Ryerson Limited
Chapter 7 Overview
• SECTION 7.1 - ENTERPRISE COMPUTING
CHALLENGES
– Innovation: Finding New
– Social Entrepreneurship: Going Green
– Social Networks: Who’s Who
– Virtual Worlds: It’s a Whole New World
4-3
Copyright © 2012 McGraw-Hill Ryerson Limited
Chapter 7 Overview
• SECTION 7.2 – ENTERPRISE RESOURCE
PLANNING
– Enterprise Resource Planning
– Core ERP Components
– Extended ERP Components
– Integrating SCM, CRM, and ERP
– Measuring ERP Success
– Choosing ERP Software
– ERP and SME Markets
BDT - Lecture Style Format Sample 2
4-4
Copyright © 2012 McGraw-Hill Ryerson Limited
Learning Outcomes
1. Explain what enterprise computing challenges are
happening in organizations today (e.g. innovation, going
green, social networks, and virtual worlds).
2. Describe enterprise resource planning as a
management approach and how information systems
can help promote ERP.
3. Describe the components of ERP systems and the
differences between them.
4-5
Copyright © 2012 McGraw-Hill Ryerson Limited
Learning Outcomes
4. Explain the business value of integrating supply chain
management, customer relationship management, and
enterprise resource planning systems together.
5. Explain how an organization can measure ERP
success, choose ERP software, choose ERP software,
and use ERP in SME markets.
McGraw-Hill-Ryerson ©2012 The McGraw-Hill Companies, All
Rights Reserved
SECTION 7.1
ENTERPRISE
COMPUTING
CHALLENGES
BDT - Lecture Style Format Sample 3
4-7
Copyright © 2012 McGraw-Hill Ryerson Limited
Warren Buffet
• Buffett believes in focused investing and believes that all
investors should
look at five features:
1. The certainty with which the long-term economic
characteristics of the
business can be evaluated
2. The certainty with which management can be evaluated, both
as to its
ability to realize the full potential of the business and to wisely
employ its
cash flows
3. The certainty with which management can be counted on to
channel the
reward from the business to the shareholders rather than to
itself
4. The purchase price of the business
5. The levels of taxation and inflation that will be experienced
and that will
determine the degree by which an investor’s purchasing-power
return is
reduced from his gross return
• .
4-1
Learning
Outcomes
4-8
Copyright © 2012 McGraw-Hill Ryerson Limited
Social Entrepreneurship:
Going Green
• When left on continuously, a single desktop computer
and monitor can consume at least 100 watts of power
per hour.
• To generate that much energy 24 hours a day for a year
would require approximately 714 pounds of coal.
• When that coal is burned, it releases on average 5
pounds of sulfur dioxide, 5 pounds of nitrogen oxides,
and 1,852 pounds (that is almost a ton) of carbon
dioxide.
4-1
Learning
Outcomes
4-9
Copyright © 2012 McGraw-Hill Ryerson Limited
Social Entrepreneurship:
Going Green
• Social Responsibility implies that an
organization has a responsibility to
society.
• Corporate Policy reflects the position a
company takes on social and political
issues.
• Sustainable or ―Green‖ describes
systems that minimize damage to the
environment.
4-1
Learning
Outcomes
BDT - Lecture Style Format Sample 4
4-10
Copyright © 2012 McGraw-Hill Ryerson Limited
Energy Consumption
• Computer servers in the United States account
for about 1 percent of the total energy needs of
the country.
• Put in perspective, this is roughly equivalent to
the energy consumption of Mississippi.
• Computers consume energy even when they
are not being used.
4-1
Learning
Outcomes
4-11
Copyright © 2012 McGraw-Hill Ryerson Limited
Energy Consumption
Breakdown of Power Usage in The Typical Data Centre
Figure 4.2
4-1
Learning
Outcomes
4-12
Copyright © 2012 McGraw-Hill Ryerson Limited
Energy Consumption
Some initiatives to improve sustainability include:
• Ontario offers energy rebate programs.
• Hewlett-Packard introduced several programs to
improve energy efficiency and recycling of
computer components.
• Sun Microsystems create servers that consume
30-80% less energy for the amount of work
processed.
4-1
Learning
Outcomes
BDT - Lecture Style Format Sample 5
4-13
Copyright © 2012 McGraw-Hill Ryerson Limited
E-waste
• Ewaste - Refers to discarded, obsolete or broken electronic
devices.
• Ewaste includes CDs, DVDs, thumb drives, printer cartridges,
cell phones, iPods, external hard drives, TVs, VCRs, DVD
players, microwaves, and so on
• Sustainable IT disposal - Refers to the safe disposal of MIS
assets at the end of their life cycle
• Electronic Product Stewardship Canada (EPSC) – an
industry association that educates and encourages e-waste
control
• Recent International laws restrict the use of hazardous
materials.
4-1
Learning
Outcomes
4-14
Copyright © 2012 McGraw-Hill Ryerson Limited
Greener IT
Ways to Save Energy in a Data Centre
Figure 4.4
4-1
Learning
Outcomes
4-15
Copyright © 2012 McGraw-Hill Ryerson Limited
Organizational Social Networking
Passive Search—Finding people for new jobs
who are happy and productive where they
through business networking sites.
Boomerangs—Former employees returning to
old jobs.
Marketing Networks—
Using business networks
for marketing and events.
4-1
Learning
Outcomes
BDT - Lecture Style Format Sample 6
4-16
Copyright © 2012 McGraw-Hill Ryerson Limited
It’s a Whole New World!
• Virtual World—An Internet
resource which presents a 3D
virtual community.
• Virtual Organizations–
interactive web presence for
businesses and their
customers.
• Virtual Workforce—working
from home…or anywhere via
the Internet.
Figure 4.5
4-1
Learning
Outcomes
4-17
Copyright © 2012 McGraw-Hill Ryerson Limited
Tools for the Virtual Workforce
• Mobile commerce (m-commerce)—ability to
purchase goods and services through a mobile
device.
• Telematics—The blending of wired and
wireless technologies for efficient electronic
communication.
• Electronic tagging—the use of RFID (radio
frequency identification) and other systems to
identify and tracking digital assets.
4-1
Learning
Outcomes
4-18
Copyright © 2012 McGraw-Hill Ryerson Limited
Virtual World—Second Life
• Most popular virtual world, logging just over
100 million user-hours per month.
• Over 40 competitors with a wide variety of
objectives:
– Warner Bros. Records launching new artists.
– Logo hosting Big Robots events in
cyberspace.
– Adidas market testing new gym shoes.
– Major League Baseball simulcasting its
homerun derby.
4-1
Learning
Outcomes
BDT - Lecture Style Format Sample 7
4-19
Copyright © 2012 McGraw-Hill Ryerson Limited
OPENING CASE QUESTIONS
Shell Canada Fuels Productivity
with ERP
1. How can large organizations like Shell Canada use
innovation to fuel productivity?
2. What advantages are there for Shell Canada to
recycle its IT equipment? How could recycling IT
equipment be potentially threatening to Shell Canada?
3. How could Shell Canada use social networking to
boost productivity and increase profits?
4. How could Shell Canada use virtual worlds such as
Second Life to make the company more successful?
Give specific examples
McGraw-Hill-Ryerson ©2012 The McGraw-Hill Companies, All
Rights Reserved
SECTION 7.2
ENTERPRISE
RESOURCE PLANNING
4-21
Copyright © 2012 McGraw-Hill Ryerson Limited
Enterprise Resource Planning
• Enterprise resource planning –
integrates all departments and functions
throughout an organization into a single IT
system (or integrated set of IT systems)
so that employees can make enterprise-
wide decisions by viewing enterprise-wide
information on all business operations
4-2
Learning
Outcomes
BDT - Lecture Style Format Sample 8
4-22
Copyright © 2012 McGraw-Hill Ryerson Limited
ERP—Powerful Organizational
Tools
ERP is:
•
Solution
to incompatible applications.
• Addresses the need for global information
sharing.
• Avoids the expense of fixing legacy systems.
Legacy Systems—are older computer
technology still in use.
Functional Systems—serve single business
departments or units.
4-2
Learning
Outcomes
4-23
Copyright © 2012 McGraw-Hill Ryerson Limited
Enterprise Resource Planning
Enterprise Resource Planning System
Figure 4.9
4-2
Learning
Outcomes
4-24
Copyright © 2012 McGraw-Hill Ryerson Limited
Enterprise Resource Planning
ERP Integration
Data Flow
• At the heart of all
ERP systems is a
database; when a
user enters or
updates
information in one
module, it is
immediately and
automatically
updated
throughout the
entire system
Figure 4.10
4-2
Learning
Outcomes
BDT - Lecture Style Format Sample 9
4-25
Copyright © 2012 McGraw-Hill Ryerson Limited
Enterprise Resource Planning
ERP Process Flow
Figure 4.11
4-2
Learning
Outcomes
4-26
Copyright © 2012 McGraw-Hill Ryerson Limited
Enterprise Resource Planning
The organization before ERP
Figure 4.12
4-2
Learning
Outcomes
4-27
Copyright © 2012 McGraw-Hill Ryerson Limited
Enterprise Resource Planning
The organization after ERP
Figure 4.13
4-2
Learning
Outcomes
BDT - Lecture Style Format Sample 10
4-28
Copyright © 2012 McGraw-Hill Ryerson Limited
Core and Extended ERP
Components
The Evolution of ERP
Figure 4.14
4-2
Learning
Outcomes
4-29
Copyright © 2012 McGraw-Hill Ryerson Limited
Core and Extended ERP
Components
Figure 4.15
4-2
Learning
Outcomes
4-30
Copyright © 2012 McGraw-Hill Ryerson Limited
Core and Extended ERP
Components
4-2
Learning
Outcomes
• City of Winnipeg had had problems with inconsistent
data and poor communications, wasted purchasing
power due to non-integrated procurement, lack of
coordination in payroll, and functional areas that
needed to interact but had few touch points.
• It used ERP to streamline and integrate more than
100 diverse systems in its various departments
• The new system aligned finance, HR, and
information technology across the service
departments saving the tax payer money and
improving satisfaction levels in customers and
employees.
BDT - Lecture Style Format Sample 11
4-31
Copyright © 2012 McGraw-Hill Ryerson Limited
Core and Extended ERP
Components
Core ERP component – traditional components
included in most ERP systems and they
primarily focus on internal operations
Extended ERP component – extra components
that meet the organizational needs not covered
by the core components and primarily focus on
external operations
4-2
Learning
Outcomes
4-3
4-32
Copyright © 2012 McGraw-Hill Ryerson Limited
Core ERP Components
• Three most common core ERP
components
1. Accounting and finance
2. Production and materials management
3. Human resource
4-3
Learning
Outcomes
4-33
Copyright © 2012 McGraw-Hill Ryerson Limited
Accounting and Finance ERP
Components
• Accounting and finance ERP
component – manages accounting data
and financial processes within the
enterprise with functions such as general
ledger, accounts payable, accounts
receivable, budgeting, and asset
management
4-3
Learning
Outcomes
BDT - Lecture Style Format Sample 12
4-34
Copyright © 2012 McGraw-Hill Ryerson Limited
Accounting and Finance ERP
Components
• Deeley Harley-Davidson Canada (DHDC), the exclusive
Canadian distributor of Harley-Davidson motorcycles, has
improved inventory, turnaround time, margins, and customer
satisfaction—all with the implementation of a financial ERP
system.
• The system has opened up the power of information to the
company and is helping it make strategic decisions when it
still has the time to change things.
• The ERP system provides the company with ways to
manage inventory, turnaround time, and utilize warehouse
space more effectively.
• Credit-management feature set limits on how much a
customer can owe at any time
4-3
Learning
Outcomes
4-35
Copyright © 2012 McGraw-Hill Ryerson Limited
Production and Materials
Management ERP Components
• Production and materials management ERP
component – handles the various aspects of
production planning and execution such as
demand forecasting, production scheduling, job
cost accounting, and quality control
4-3
Learning
Outcomes
4-36
Copyright © 2012 McGraw-Hill Ryerson Limited
Production and Materials
Management ERP Components
• Grupo Farmanova Intermed, located in Costa Rica, is a
pharmaceutical marketing and distribution company that
markets nearly 2,500 products to approximately 500
customers in Central and South America.
• The company identified a need for software that could unify
product logistics management in a single country.
• It decided to deploy PeopleSoft financial and distribution ERP
components allowing the company to improve customer data
management, increase confidence among internal and
external users, and coordinate the logistics of inventory.
• With the new PeopleSoft software the company enhanced its
capabilities for handling, distributing, and marketing its
pharmaceuticals.
4-3
Learning
Outcomes
BDT - Lecture Style Format Sample 13
4-37
Copyright © 2012 McGraw-Hill Ryerson Limited
Production and Materials
Management ERP Components
Figure 4.16
4-3
Learning
Outcomes
4-38
Copyright © 2012 McGraw-Hill Ryerson Limited
Human Resource ERP Component
• Human resource ERP component – tracks
employee information including payroll, benefits,
compensation, performance assessment, and
assumes compliance with the legal
requirements of multiple jurisdictions and tax
authorities
4-3
Learning
Outcomes
4-39
Copyright © 2012 McGraw-Hill Ryerson Limited
Extended ERP Components
• Extended ERP components include:
– Business intelligence – describes information that people use
to support their decision-making efforts
– Customer relationship management – involves managing all
aspects of a customer’s relationships with an organization to
increase customer loyalty and retention and an organization's
profitability
– Supply chain management – involves the management of
information flows between and among stages in a supply chain
to maximize total supply chain effectiveness and profitability
– E-business – means conducting business on the Internet, not
only buying and selling, but also serving customers and
collaborating with business partners
4-3
Learning
Outcomes
BDT - Lecture Style Format Sample 14
4-40
Copyright © 2012 McGraw-Hill Ryerson Limited
E-Business Components
• E-business components include e-logistics and e-
procurement
– E-logistics – manages the transportation and
storage of goods
– E-procurement – the business-to-business (B2B)
purchase and sale of supplies and services over the
Internet
• Best Buy checks inventory levels at each of its 750
stores in North America as often as every half-hour with
its SCM system, taking much of the guesswork out of
inventory replenishment
4-3
Learning
Outcomes
4-41
Copyright © 2012 McGraw-Hill Ryerson Limited
Integrating SCM, CRM and ERP
Primary Users and Business Benefits of Enterprise
Applications
Figure 4.17
4-3
Learning
Outcomes
4-4
4-42
Copyright © 2012 McGraw-Hill Ryerson Limited
Integration Tools
• Middleware – Several different types
of software that sit between and
provide connectivity for two or more
software applications
• Enterprise application integration
middleware – Takes a new approach
to middleware by packaging commonly
used applications together, reducing
the time needed to integrate
applications from multiple vendors
4-3
Learning
Outcomes
4-4
BDT - Lecture Style Format Sample 15
4-43
Copyright © 2012 McGraw-Hill Ryerson Limited
The Connected Corporation
• SCM, CRM, and ERP are the backbone of
e-business
• Integration of these applications is the key
to success for many companies
• Integration allows the unlocking of
information to make it available to any
user, anywhere, anytime
4-2
Learning
Outcomes
4-4
4-44
Copyright © 2012 McGraw-Hill Ryerson Limited
Choosing ERP Software
Successful ERP projects share 3 attributes
1. Overall fit
• Off the rack
• Off the rack and tailored to fit
• Custom made
2. Proper business analysis
• Successful companies spend up to 10 percent of
the project budget on a business analysis
3. Solid implementation plans
• A plan is needed to monitor the quality, objectives,
and timelines
4-5
Learning
Outcomes
4-45
Copyright © 2012 McGraw-Hill Ryerson Limited
ERP and SME Markets
• ERP is no longer the purview of large
organizations.
• In the hopes of expanding their client
base, many large-scale ERP vendors,
such as SAP and Oracle, are attempting
to enter the small to medium enterprise
(SME) market
4-5
Learning
Outcomes
BDT - Lecture Style Format Sample 16
4-46
Copyright © 2012 McGraw-Hill Ryerson Limited
OPENING CASE QUESTIONS
Shell Canada
5. How did ERP help improve business operations at Shell
Canada?
6. How important was training in helping roll out the system to
Shell Canada personnel?
7. How could extended ERP components help improve
business operations at Shell Canada?
8. What advice would you give Shell Canada?
9. How can integrating SCM, CRM, and ERP help improve
business operations at Shell Canada?
4-47
Copyright © 2012 McGraw-Hill Ryerson Limited
CLOSING CASE ONE
Confusing Carbon
1. How can companies help reduce carbon
emissions?
2. How can finding alternative energy sources
help reduce IT energy consumption?
3. How can labelling IT equipment green help
promote green initiatives?
4. Why do global organizations need to be
concerned with green or social
entrepreneurship initiatives?
5. What ethical issues are associated with green
technology?
4-48
Copyright © 2012 McGraw-Hill Ryerson Limited
CLOSING CASE TWO
Campus ERP
1. How could core ERP components help improve
business operations at your school?
2. How could extended ERP components help
improve business operations at your school?
3. How can integrating SCM, CRM, and ERP help
improve business operations at your school?
4. What lessons for dealing with the challenges of
implementing an ERP information system at your
school can be learned from this case?
BDT - Lecture Style Format Sample 17
4-49
Copyright © 2012 McGraw-Hill Ryerson Limited
CLOSING CASE THREE
Intuitive ERP
1. How well do the components of the Intuitive
ERP software product align with the ERP
components described in this chapter?
2. What advantages did Fibre Connections and
Westwinn Group Corp. realize with the
introduction of Intuitive ERP? How well do these
advantages resonate with the benefits of ERP
described in this chapter?
4-50
Copyright © 2012 McGraw-Hill Ryerson Limited
CLOSING CASE THREE
Intuitive ERP
3. The successful implementation of Intuitive ERP
described above does not speak of any negative
outcomes or drawbacks of introducing a new
enterprise-wide information system in an
organization.
• What challenges do you envision would occur in a
company that decides to introduce such large-scale
change? What drawbacks, if any, are there in
adopting a software solution from a single vendor that
serves such a critical and important role in an
organization? How could one mitigate or lessen these
drawbacks?

More Related Content

Similar to WRITING A CRITICAL REVIEW What is a critical review A .docx

Page 1 of 6 [377] COM7005D Info.docx
Page 1 of 6 [377] COM7005D    Info.docxPage 1 of 6 [377] COM7005D    Info.docx
Page 1 of 6 [377] COM7005D Info.docx
honey690131
 
TaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docxTaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docx
bradburgess22840
 
TaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docxTaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docx
deanmtaylor1545
 
Dissertation Structure GuidelinesIt will be important to set
Dissertation Structure GuidelinesIt will be important to setDissertation Structure GuidelinesIt will be important to set
Dissertation Structure GuidelinesIt will be important to set
DustiBuckner14
 
ITS 834 Emerging Threats and CountermeasuresTotal points - 100.docx
ITS 834 Emerging Threats and CountermeasuresTotal points - 100.docxITS 834 Emerging Threats and CountermeasuresTotal points - 100.docx
ITS 834 Emerging Threats and CountermeasuresTotal points - 100.docx
vrickens
 
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and worCase Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
ogglili
 
For this week’s Assignment you will be creating a hypothetical cas
For this week’s Assignment you will be creating a hypothetical casFor this week’s Assignment you will be creating a hypothetical cas
For this week’s Assignment you will be creating a hypothetical cas
ShainaBoling829
 
Page 1 of 6 [1514] COM7005 Information S.docx
Page 1 of 6 [1514] COM7005   Information S.docxPage 1 of 6 [1514] COM7005   Information S.docx
Page 1 of 6 [1514] COM7005 Information S.docx
karlhennesey
 
1 Assessment Brief Module Name- Module Code Level Credit Value M.docx
1     Assessment Brief  Module Name-  Module Code Level Credit Value M.docx1     Assessment Brief  Module Name-  Module Code Level Credit Value M.docx
1 Assessment Brief Module Name- Module Code Level Credit Value M.docx
christina345678
 
Annotated Bibliography Assignment SheetFor your upcoming literat.docx
Annotated Bibliography Assignment SheetFor your upcoming literat.docxAnnotated Bibliography Assignment SheetFor your upcoming literat.docx
Annotated Bibliography Assignment SheetFor your upcoming literat.docx
durantheseldine
 
NR360 Information Systems in Healthcare RUA We Can, Bu
 NR360 Information Systems in Healthcare RUA We Can, Bu NR360 Information Systems in Healthcare RUA We Can, Bu
NR360 Information Systems in Healthcare RUA We Can, Bu
MoseStaton39
 
IntroductionThis is an individual project. Each student must comp.docx
IntroductionThis is an individual project.  Each student must comp.docxIntroductionThis is an individual project.  Each student must comp.docx
IntroductionThis is an individual project. Each student must comp.docx
mariuse18nolet
 
BUSI 505Research Project – Draft InstructionsUsing your Annota
BUSI 505Research Project – Draft InstructionsUsing your AnnotaBUSI 505Research Project – Draft InstructionsUsing your Annota
BUSI 505Research Project – Draft InstructionsUsing your Annota
VannaSchrader3
 
School of Accounting Trimester 3A 2013 Information Sheet Tes.docx
School of Accounting Trimester 3A 2013 Information Sheet Tes.docxSchool of Accounting Trimester 3A 2013 Information Sheet Tes.docx
School of Accounting Trimester 3A 2013 Information Sheet Tes.docx
kenjordan97598
 

Similar to WRITING A CRITICAL REVIEW What is a critical review A .docx (20)

Get help with SWE4202 Computing Infrastructure Assignment
Get help with SWE4202 Computing Infrastructure AssignmentGet help with SWE4202 Computing Infrastructure Assignment
Get help with SWE4202 Computing Infrastructure Assignment
 
Page 1 of 6 [377] COM7005D Info.docx
Page 1 of 6 [377] COM7005D    Info.docxPage 1 of 6 [377] COM7005D    Info.docx
Page 1 of 6 [377] COM7005D Info.docx
 
TaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docxTaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docx
 
TaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docxTaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docx
 
Dissertation Structure GuidelinesIt will be important to set
Dissertation Structure GuidelinesIt will be important to setDissertation Structure GuidelinesIt will be important to set
Dissertation Structure GuidelinesIt will be important to set
 
ITS 834 Emerging Threats and CountermeasuresTotal points - 100.docx
ITS 834 Emerging Threats and CountermeasuresTotal points - 100.docxITS 834 Emerging Threats and CountermeasuresTotal points - 100.docx
ITS 834 Emerging Threats and CountermeasuresTotal points - 100.docx
 
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and worCase Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
 
Assignment02 question file s1 2017
Assignment02 question file s1 2017Assignment02 question file s1 2017
Assignment02 question file s1 2017
 
Nursing informatics
Nursing informaticsNursing informatics
Nursing informatics
 
For this week’s Assignment you will be creating a hypothetical cas
For this week’s Assignment you will be creating a hypothetical casFor this week’s Assignment you will be creating a hypothetical cas
For this week’s Assignment you will be creating a hypothetical cas
 
Page 1 of 6 [1514] COM7005 Information S.docx
Page 1 of 6 [1514] COM7005   Information S.docxPage 1 of 6 [1514] COM7005   Information S.docx
Page 1 of 6 [1514] COM7005 Information S.docx
 
1 Assessment Brief Module Name- Module Code Level Credit Value M.docx
1     Assessment Brief  Module Name-  Module Code Level Credit Value M.docx1     Assessment Brief  Module Name-  Module Code Level Credit Value M.docx
1 Assessment Brief Module Name- Module Code Level Credit Value M.docx
 
Annotated Bibliography Assignment SheetFor your upcoming literat.docx
Annotated Bibliography Assignment SheetFor your upcoming literat.docxAnnotated Bibliography Assignment SheetFor your upcoming literat.docx
Annotated Bibliography Assignment SheetFor your upcoming literat.docx
 
NR360 Information Systems in Healthcare RUA We Can, Bu
 NR360 Information Systems in Healthcare RUA We Can, Bu NR360 Information Systems in Healthcare RUA We Can, Bu
NR360 Information Systems in Healthcare RUA We Can, Bu
 
IntroductionThis is an individual project. Each student must comp.docx
IntroductionThis is an individual project.  Each student must comp.docxIntroductionThis is an individual project.  Each student must comp.docx
IntroductionThis is an individual project. Each student must comp.docx
 
IRJET- Re-Evaluating the Parameters for Finding Research Impact
IRJET- Re-Evaluating the Parameters for Finding Research ImpactIRJET- Re-Evaluating the Parameters for Finding Research Impact
IRJET- Re-Evaluating the Parameters for Finding Research Impact
 
IRJET- Re-Evaluating the Parameters for Finding Research Impact
IRJET- Re-Evaluating the Parameters for Finding Research ImpactIRJET- Re-Evaluating the Parameters for Finding Research Impact
IRJET- Re-Evaluating the Parameters for Finding Research Impact
 
BUSI 505Research Project – Draft InstructionsUsing your Annota
BUSI 505Research Project – Draft InstructionsUsing your AnnotaBUSI 505Research Project – Draft InstructionsUsing your Annota
BUSI 505Research Project – Draft InstructionsUsing your Annota
 
Sheet1695 grading rubric assignment 7 note all topics must be rel
Sheet1695 grading rubric assignment 7 note all topics must be relSheet1695 grading rubric assignment 7 note all topics must be rel
Sheet1695 grading rubric assignment 7 note all topics must be rel
 
School of Accounting Trimester 3A 2013 Information Sheet Tes.docx
School of Accounting Trimester 3A 2013 Information Sheet Tes.docxSchool of Accounting Trimester 3A 2013 Information Sheet Tes.docx
School of Accounting Trimester 3A 2013 Information Sheet Tes.docx
 

More from ericbrooks84875

Fundamentals of Risk and InsuranceEmmEtt J. Vaughan • .docx
Fundamentals of Risk and InsuranceEmmEtt J. Vaughan   •   .docxFundamentals of Risk and InsuranceEmmEtt J. Vaughan   •   .docx
Fundamentals of Risk and InsuranceEmmEtt J. Vaughan • .docx
ericbrooks84875
 
Fungi reproduce ___________________________ by fragmentation, buddin.docx
Fungi reproduce ___________________________ by fragmentation, buddin.docxFungi reproduce ___________________________ by fragmentation, buddin.docx
Fungi reproduce ___________________________ by fragmentation, buddin.docx
ericbrooks84875
 
Full-Circle LearningMyLab™ Learning Full Circle for Mar.docx
Full-Circle LearningMyLab™ Learning Full Circle for Mar.docxFull-Circle LearningMyLab™ Learning Full Circle for Mar.docx
Full-Circle LearningMyLab™ Learning Full Circle for Mar.docx
ericbrooks84875
 
Functional Behavior Assessment ExampleStudent NameInes SalazarD.docx
Functional Behavior Assessment ExampleStudent NameInes SalazarD.docxFunctional Behavior Assessment ExampleStudent NameInes SalazarD.docx
Functional Behavior Assessment ExampleStudent NameInes SalazarD.docx
ericbrooks84875
 
Functional Requirements Document TemplateVersionDescription .docx
Functional Requirements Document TemplateVersionDescription .docxFunctional Requirements Document TemplateVersionDescription .docx
Functional Requirements Document TemplateVersionDescription .docx
ericbrooks84875
 
FS-3FORD MOTOR COMPANY AND SUBSIDIARIESCONSOLIDATED INCO.docx
FS-3FORD MOTOR COMPANY AND SUBSIDIARIESCONSOLIDATED INCO.docxFS-3FORD MOTOR COMPANY AND SUBSIDIARIESCONSOLIDATED INCO.docx
FS-3FORD MOTOR COMPANY AND SUBSIDIARIESCONSOLIDATED INCO.docx
ericbrooks84875
 

More from ericbrooks84875 (20)

Fundamentals of Risk and InsuranceEmmEtt J. Vaughan • .docx
Fundamentals of Risk and InsuranceEmmEtt J. Vaughan   •   .docxFundamentals of Risk and InsuranceEmmEtt J. Vaughan   •   .docx
Fundamentals of Risk and InsuranceEmmEtt J. Vaughan • .docx
 
Fungi reproduce ___________________________ by fragmentation, buddin.docx
Fungi reproduce ___________________________ by fragmentation, buddin.docxFungi reproduce ___________________________ by fragmentation, buddin.docx
Fungi reproduce ___________________________ by fragmentation, buddin.docx
 
Full-Circle LearningMyLab™ Learning Full Circle for Mar.docx
Full-Circle LearningMyLab™ Learning Full Circle for Mar.docxFull-Circle LearningMyLab™ Learning Full Circle for Mar.docx
Full-Circle LearningMyLab™ Learning Full Circle for Mar.docx
 
Functional Behavior Assessment ExampleStudent NameInes SalazarD.docx
Functional Behavior Assessment ExampleStudent NameInes SalazarD.docxFunctional Behavior Assessment ExampleStudent NameInes SalazarD.docx
Functional Behavior Assessment ExampleStudent NameInes SalazarD.docx
 
Functional Requirements Document TemplateVersionDescription .docx
Functional Requirements Document TemplateVersionDescription .docxFunctional Requirements Document TemplateVersionDescription .docx
Functional Requirements Document TemplateVersionDescription .docx
 
Fully answer any ONE of the following essay questions1.  Is the.docx
Fully answer any ONE of the following essay questions1.  Is the.docxFully answer any ONE of the following essay questions1.  Is the.docx
Fully answer any ONE of the following essay questions1.  Is the.docx
 
Fully answer any ONE of the following essay questions1.  Is t.docx
Fully answer any ONE of the following essay questions1.  Is t.docxFully answer any ONE of the following essay questions1.  Is t.docx
Fully answer any ONE of the following essay questions1.  Is t.docx
 
From the weeks chapter reading, we learn from the authors that,.docx
From the weeks chapter reading, we learn from the authors that,.docxFrom the weeks chapter reading, we learn from the authors that,.docx
From the weeks chapter reading, we learn from the authors that,.docx
 
FTER watching the videos and reviewing the other materials in this.docx
FTER watching the videos and reviewing the other materials in this.docxFTER watching the videos and reviewing the other materials in this.docx
FTER watching the videos and reviewing the other materials in this.docx
 
fter completing the reading this week, we reflect on a few key conce.docx
fter completing the reading this week, we reflect on a few key conce.docxfter completing the reading this week, we reflect on a few key conce.docx
fter completing the reading this week, we reflect on a few key conce.docx
 
FS-3FORD MOTOR COMPANY AND SUBSIDIARIESCONSOLIDATED INCO.docx
FS-3FORD MOTOR COMPANY AND SUBSIDIARIESCONSOLIDATED INCO.docxFS-3FORD MOTOR COMPANY AND SUBSIDIARIESCONSOLIDATED INCO.docx
FS-3FORD MOTOR COMPANY AND SUBSIDIARIESCONSOLIDATED INCO.docx
 
Fromm’s concept of the syndrome of decay included three personality .docx
Fromm’s concept of the syndrome of decay included three personality .docxFromm’s concept of the syndrome of decay included three personality .docx
Fromm’s concept of the syndrome of decay included three personality .docx
 
From your readings in Chapter 4, choose one of the organizational sy.docx
From your readings in Chapter 4, choose one of the organizational sy.docxFrom your readings in Chapter 4, choose one of the organizational sy.docx
From your readings in Chapter 4, choose one of the organizational sy.docx
 
From your daily briefs, Kaiser Health News Morning Briefing or P.docx
From your daily briefs, Kaiser Health News Morning Briefing or P.docxFrom your daily briefs, Kaiser Health News Morning Briefing or P.docx
From your daily briefs, Kaiser Health News Morning Briefing or P.docx
 
From the perspective of the public safety field youre in, aspire to.docx
From the perspective of the public safety field youre in, aspire to.docxFrom the perspective of the public safety field youre in, aspire to.docx
From the perspective of the public safety field youre in, aspire to.docx
 
From the following terms Orthodox Judaism, Hassidic Judaism.  Brief.docx
From the following terms Orthodox Judaism, Hassidic Judaism.  Brief.docxFrom the following terms Orthodox Judaism, Hassidic Judaism.  Brief.docx
From the following terms Orthodox Judaism, Hassidic Judaism.  Brief.docx
 
From the end of Chapter 14, complete Discussion Question 3 What are.docx
From the end of Chapter 14, complete Discussion Question 3 What are.docxFrom the end of Chapter 14, complete Discussion Question 3 What are.docx
From the end of Chapter 14, complete Discussion Question 3 What are.docx
 
From the e-Activity, take a position on this statement People that .docx
From the e-Activity, take a position on this statement People that .docxFrom the e-Activity, take a position on this statement People that .docx
From the e-Activity, take a position on this statement People that .docx
 
From Chapter Seven How does horizontal growth differ from v.docx
From Chapter Seven How does horizontal growth differ from v.docxFrom Chapter Seven How does horizontal growth differ from v.docx
From Chapter Seven How does horizontal growth differ from v.docx
 
From the e-Activity, determine the fundamental differences between t.docx
From the e-Activity, determine the fundamental differences between t.docxFrom the e-Activity, determine the fundamental differences between t.docx
From the e-Activity, determine the fundamental differences between t.docx
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Recently uploaded (20)

On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 

WRITING A CRITICAL REVIEW What is a critical review A .docx

  • 1. WRITING A CRITICAL REVIEW What is a critical review? A critical review is much more than a simple summary; it is an analysis and evaluation of a book, article, or other medium. Writing a good critical review requires that you understand the material, and that you know how to analyze and evaluate that material using appropriate criteria. Steps to writing an effective critical review: Reading Skim the whole text to determine the overall thesis, structure and methodology. This will help you better understand how the different elements fit together once you begin reading carefully. Read critically. It is not enough to simply understand what the author is saying; it is essential to challenge it. Examine how the article is structured, the types of reasons or evidence used to support the conclusions, and whether the author is reliant on underlying assumptions or theoretical frameworks. Take copious notes that reflect what the text means AND what you think about it. Analyzing Examine all elements. All aspects of the text—the structure, the methods, the reasons and evidence, the conclusions, and, especially, the logical connections between all of these—should be considered.
  • 2. The types of questions asked will vary depending on the discipline in which you are writing, but the following samples will provide a good starting point: Structure What type of text is it? (For example: Is it a primary source or secondary source? Is it original research or a comment on original research?) What are the different sections and how do they fit together? Are any of the sections particularly effective (or ineffective)? Methodology Is the research quantitative or qualitative? Does the methodology have any weaknesses? How does the design of the study address the hypothesis? Reasons/Evidence What sources does the author use (interviews, peer-reviewed journals, government reports, journal entries, newspaper accounts, etc.)? What types of reasoning are employed (inductive, deductive, abductive)? What type of evidence is provided (empirical, statistical, logical, etc.)? Are there any gaps in the evidence (or reasoning)? Conclusions Does the data adequately support the conclusion drawn by the researcher(s)? Are other interpretations plausible? Are the conclusions dependent on a particular theoretical formulation? What does the work contribute to the field? Logic What assumptions does the author make? Does the author account for all of the data, or are portions left out? What alternative perspectives remain unconsidered?
  • 3. Are there any logical flaws in the construction of the argument? © Allyson Skene. The Writing Centre, University of Toronto at Scarborough. See terms and conditions for use at http://www.utsc.utoronto.ca/~tlsweb/TWC/webresources/terms. htm Writing Formulate a thesis based on your overall evaluation. A strong thesis will acknowledge both strengths and limitations. E.g. While the article reports significant research supporting the view that certain types of computer use can have a positive impact on a student’s GPA, the conclusion that game playing alone can improve student achievement is based on a misinterpretation of the evidence. Not: This article misinterprets key evidence to support the conclusion that game playing can improve GPA. Ensure that your thesis answers the assignment. If you are asked to write a review of a single text, with no outside sources, then your essay should focus strictly on the material in the text and your analysis and evaluation of it. If you are asked to write about more than one work, or to draw connections between an article or book and the course material, then your review should address these concerns. Choose a structure that will best allow you to support your thesis within the required page constraints.
  • 4. The first example below works well with shorter assignments, but the risk is that too much time will be spent developing the overview, and too little time on the evaluation. The second example works better for longer reviews because it provides the relevant description with the analysis and evaluation, allowing the reader to follow the argument easily. Two common structures used for critical reviews: Example 1 Example 2 Introduction Overview of the text Evaluation of the text � Point 1 � Point 2 � Point 3 � Point 4 …(continue as necessary) Conclusion Introduction (with thesis) Point 1: Explanation and evaluation Point 2: Explanation and evaluation Point 3: Explanation and evaluation (continue elaborating as many points as necessary)
  • 5. Conclusion Important: Avoid presenting your points in a laundry-list style. Synthesize the information as much as possible. “Laundry-List” Style of Presentation Synthesized Argument. The article cites several different studies in support of the argument that playing violent video games can have a positive impact on student achievement. These studies refer to educational games and other types of computer use. The argument is not logically well constructed. Educational games are not the same as violent video games. The article also ignores data indicating that people with the highest GPA are those that reported low computer use. Also, different types of computer use could include things like researching or word-processing, and these activities are very different from playing violent video games. The evidence cited in the article does not support the overall conclusion that playing violent games improves GPA. One study only examines educational games in relation to GPA, so it is questionable whether the same findings will hold true for other types of games. Another study does not distinguish between different types of computer use, making it difficult to assess whether it is game playing or activities such as research and writing that contributed to improvements in GPA. Further, the author disregards relevant data that indicates that students with the highest GPAs are those who report low computer use, which means that a direct correlation between game playing and GPA cannot be supported.
  • 6. 5/28/2015 1 McGraw-Hill-Ryerson ©2015 The McGraw-Hill Companies, All Rights Reserved Opening Case: The Ironman 6-2 Copyright © 2015 McGraw-Hill Ryerson Limited Chapter Six Overview • SECTION 6.1 – NETWORKS AND TELECOMMUNICATIONS – Introduction – Network Basics – Internet Providers – Networks Enable Data Sharing • SECTION 6.2 – MOBILE TECHNOLOGY – Business Drivers for Mobile Technologies – Using Cellular Technologies in Business – Using Satellite Technologies in Business – Using Wireless Technologies in Business – Challenges of Business Mobility – Mobile Business Trends
  • 7. 6-3 Copyright © 2015 McGraw-Hill Ryerson Limited Learning Outcomes 1. Explain network basics and how networks enable data sharing to occur. 2. Describe the use of networks and telecommunications in business (i.e., VoIP, networking businesses, increasing speed of business, and the challenges associated with securing business networks). 3. Describe the business drivers for using mobile technologies, and the advantages and disadvantages of using cellular technologies in business. 4. Describe how satellite technologies are used in business, and how LBS, GPS, and GIS help create business value. 5. Explain Wi-Fi, Wi-MAX, and RFID technologies, their use in business, as well as mobile business trends. 5/28/2015 2 McGraw-Hill-Ryerson ©2015 The McGraw-Hill Companies, All Rights Reserved NETWORKS AND TELECOMMUNICATIONS
  • 8. 6-5 Copyright © 2015 McGraw-Hill Ryerson Limited Learning Outcome • Telecommunication system – Enables the transmission of data over public or private networks • Network – A system created by linking two or more computers and establishing standards, or protocols, so that they can work together Introduction 6.1 6-6 Copyright © 2015 McGraw-Hill Ryerson Limited Learning Outcome • Three types of networks include: – Local Area Network • Operates within a geographically limited area usually a building or groups of buildings – Wide Area Network • Operates over a widely dispersed area, including around the world
  • 9. – Metropolitan Area Network • Large computer network spanning a city Network Basics 6.1 5/28/2015 3 6-7 Copyright © 2015 McGraw-Hill Ryerson Limited Learning Outcome • Internet Service Provider (ISP) – Provides access to the Internet and related services • Wireless Internet Service Provider (WISP) – Allows subscribers to connect using a wireless at specific “hotspots” • Online Service Provider (OSP) – Connects subscribers through its own web site offering a wide array of ancillary resources • Application Service Provider (ASP) – Offers Internet-based business services
  • 10. • Service Level Agreements (SLA) – Define the responsibilities of the service provider and the customer’s expectations Internet Service Providers 6.1 Learning Outcome Copyright © 2015 McGraw-Hill Ryerson Limited 6-8 Wireless Access Diagram Figure 6.1 6.1 6-9 Copyright © 2015 McGraw-Hill Ryerson Limited Learning Outcome Advantages • Uses existing networks and Internet infrastructure • Cheaper than traditional phone service • Visual connection as well as voice
  • 11. • Ability to send reports etc. through file transfer feature Disadvantages • Similar to other Internet communications problems – Dropped connections – Security threats Voice over IP (VoIP) 6.2 Uses TCP/IP technology to transmit voice and visuals over long-distance telephone lines 5/28/2015 4 Learning Outcome Copyright © 2015 McGraw-Hill Ryerson Limited 6-10 Voice over IP (VoIP)
  • 12. Figure 6.2 . Diagram of a VoIP Connection 6.2 6-11 Copyright © 2015 McGraw-Hill Ryerson Limited Learning Outcome Traditional networking systems include: Virtual Private Network (VPN) • Secure access through the Internet to an organization’s internal network Value-Added Network (VAN) • Private network for securely exchanging information through a high-capacity connection Disadvantages • Handle limited types of business data • Do not support real-time business process integration • Relatively expensive, complex and difficult to expand Networking Business 6.2
  • 13. Learning Outcome Copyright © 2015 McGraw-Hill Ryerson Limited 6-12 E-Business Network Characteristics Transparent exchange of data with suppliers, trading partners and customers. Reliable and secure exchange of information internally and externally via the Internet or other networks. End-to-end integration and message delivery across multiple systems, in particular databases, clients, and servers. Scalable processing power and networking capacity to meet high demands. Integrator and transactions framework for both digital businesses and traditional bricks-and-mortar businesses that want to leverage the Internet for any type of business. Figure 6.3 6.2
  • 14. 5/28/2015 5 Learning Outcome Copyright © 2015 McGraw-Hill Ryerson Limited 6-13 Virtual Private Network Overview Figure 6.4 6.2 6-14 Copyright © 2015 McGraw-Hill Ryerson Limited Learning Outcome Speed is measured by the volume of data that can be transmitted per unit of time. • Bandwidth measures the medium’s capacity • Hertz is cycles per second • Bits per second (bps) refers to the number of signals transmitted per second
  • 15. Increasing the Speed of Business 6.2 Figure 6.5 Telecommunications Transmission Speeds Learning Outcome Copyright © 2015 McGraw-Hill Ryerson Limited 6-15 Internet Function Average Download Time 6.2 Function Dial-Up (56 K) Satellite (512 K) DSL (1M) Cable (5M) Wireless (5M)
  • 16. An email 1 sec <1 sec A basic Web page 10 sec <1 sec One 5-minute Song (5M) 15 min 2 min 1 min 40 sec One 2-hour Movie (500M) 20 hours 4 h 2 h 70 min Figure 6.6 5/28/2015 6 Learning Outcome Copyright © 2015 McGraw-Hill Ryerson Limited 6-16 Advantages & Disadvantages of Broadband Technology 6.2 Technology Typical Download Speed
  • 17. (Mbps) Typical Upload Speed (Mbps) Advantages and Disadvantages DSL 0.5-3 0.25-1.0 -Uses existing telephone lines -Slower downloads than cheaper alternatives Cable 0.5-250 0.5-15 -Uses existing cable -Shared connections can overload system T1/T3 dedicated line 1.5-3 1.5-3 -Uses existing telephone wiring -Susceptible to crosstalk From Figure 6.7 Learning Outcome Copyright © 2015 McGraw-Hill Ryerson Limited 6-17
  • 18. Advantages & Disadvantages of Broadband Technology 6.2 Technology Typical Download Speed (Mbps) Typical Upload Speed (Mbps) Advantages and Disadvantages Fibre-to-the- home 5-300 1-15 -Fast data speeds, low power costs -Not widely available Fixed Wireless 0.5-12 0.5 -Inexpensive to install -Weather, topography etc. can cause interference Satellite 0.5-2 0.05 -Nearly universal coverage -Expensive service/equipment
  • 19. From Figure 6.7 6-18 Copyright © 2015 McGraw-Hill Ryerson Limited Learning Outcome Organizations must be concerned about proper identification and authorization of users for network access • Logon and Password – Employees must be trained to guard their passwords and used them properly • Data Encryption – Confidential information must be coded – “Keys” for decoding must be protected – Cost of encryption is related to strength of the codes • Digital certificates/Digital Cash – Methods of reducing credit card fraud Securing Business Networks 6.2 5/28/2015 7 6-19 Copyright © 2015 McGraw-Hill Ryerson Limited
  • 20. OPENING CASE QUESTIONS The Ironman 1. Why is having real-time data of an athlete’s progress in a race important to the Ironman championship? 2. How is WTC using telecommunications and networks to improve its competitive advantage in the professional sports broadcasting industry? 3. How could WTC employ VoIP to enhance the experience of family and friends watching the triathalon? 4. What disadvantages or challenges would WTC likely face implementing broadband technology? 5. What security issues does WTC likely need to address in its use of network technologies? McGraw-Hill-Ryerson ©2015 The McGraw-Hill Companies, All Rights Reserved Data Warehousing Learning Outcome Copyright © 2015 McGraw-Hill Ryerson Limited 6-21 Drivers of Wireless Growth Mobile refers to technologies that travel with the user.
  • 21. Wireless is any type of electronic operation that does not use a “hard wired” connection, physical plug in a physical outlet. 6.3 Universal access to data and applications People are mobile and can access more data than ever before but are not at the point of all data, anytime, anywhere, and anyplace. Automation of business processes Wireless technologies can centralize critical data and eliminate redundant processes. User convenience, timeliness, and accessibility People are no longer cut off from the world or from the office. Through wireless tools and mobile devices they can have real time data access and transmission. From Figure 6.8 5/28/2015 8
  • 22. Learning Outcome Copyright © 2015 McGraw-Hill Ryerson Limited 6-22 Mobile Devices Changing Business 6.3 Figure 6.9 6-23 Copyright © 2015 McGraw-Hill Ryerson Limited Learning Outcome • Mobile Applications can: – Help track materials and shipments from suppliers and distributors to customers – Manage inventory – Support Point of Sale – Collect data in an automated fashion – Provide immediate data analysis Mobile Strategy 6.3
  • 23. Learning Outcome Copyright © 2015 McGraw-Hill Ryerson Limited 6-24 Factors to Consider When Deploying Mobile Strategies 6.3 Step Defining Risk Define potential risk to the organization of a GO or NO GO decision. Knowing the Limits Of Technology Set realistic expectations regarding needed functionality, about the IT resources deploying it and the capabilities of ultimate users. Protecting Data From Loss Security must be a multi-faceted approach covering all areas of exposure. Compliance in the Mobile Enterprise More mobility, more devices, more potential for security breaches. Staying flexible &
  • 24. Embracing Change Once implemented, monitor and modify strategy on a regular basis. From Figure 6.10 5/28/2015 9 6-25 Copyright © 2015 McGraw-Hill Ryerson Limited Learning Outcome • 3G cellular networks are designed for high-speed transmission of multi-media data and voice. • 4G networks are set up to integrate radio and television transmission and to consolidate the world’s phone standards into one high-speed technology. • Convergence of voice, video, and data allow users to make calls, surf the Web, use touch controls, access music, audiobooks, videos, TV shows and movies on mobile devices. Cellular Technologies 6.3
  • 25. Learning Outcome Copyright © 2015 McGraw-Hill Ryerson Limited 6-26 Cellular Technology Overview Figure 6.11 6.3 Learning Outcome Copyright © 2015 McGraw-Hill Ryerson Limited 6-27 Cellular Technology Advantages & Disadvantages 6.3 Figure 6.12 5/28/2015 10 6-28 Copyright © 2015 McGraw-Hill Ryerson Limited Learning Outcome • Smartphone
  • 26. Make calls, surf the Web, email a photo and download an enormous variety of “apps” • Tablets Small, flat computer with a touch-screen and virtual keyboard. Mobile office applications have spurred rapid business adoption. • Bluetooth A telecommunications industry specification that allows mobile devices to use a short-range wireless connection. Cellular Technologies 6.3 Figure 6.13 The Bluetooth Virtual Keyboard 6-29 Copyright © 2015 McGraw-Hill Ryerson Limited Learning Outcome Communication Satellite • A large, expensive, microwave repeater in the sky
  • 27. • Cost-effective for transmitting large quantities of data Microwave Transmitter • Uses the atmosphere (or outer space) as a transmission medium to send signals to a microwave receiver • Communications satellites Facilitate data transmission Communication Satellite Technologies Figure 6.14 6.4 Satellite Microwave Link 6-30 Copyright © 2015 McGraw-Hill Ryerson Limited Learning Outcome Applications that use the geographic location of the device to provide location-specific data to the mobile user. Privacy Issues • Subject geographically targeted for promotions without prior consent • Customer’s knowledge of another’s location may lead to embarrassing situations • Location data can be used for harassment or attack
  • 28. • Service denial because a location for delivery is deemed unsafe • Legal restrictions Location-Based Services (LBS) 6.4 5/28/2015 11 Learning Outcome Copyright © 2015 McGraw-Hill Ryerson Limited 6-31 Mass Market LBS Market Segments 6.4 Market Emergency -Locate emergency call -Roadside Assistance Navigation -Directions to points of interest -E-tourism -Avoidance of traffic jams
  • 29. Tracking -Tracking of children or elderly -Find-a-friend Location Advertising -Located video push Gaming -N-Gage (allows multiple gamers to play against each other over Bluetooth or wireless phone network connections.) From Figure 6.15 Learning Outcome Copyright © 2015 McGraw-Hill Ryerson Limited 6-32 Professional Market LBS Market Segments 6.4 Market Workforce Organization -Field force management -Optimization of routes -Logistics -Enterprise Resource Planning Security -Field tracking -Worker protection From Figure 6.15 6-33 Copyright © 2015 McGraw-Hill Ryerson Limited Learning Outcome Global position systems (GPS)
  • 30. • A constellation of 24 well-spaced satellites that orbit the Earth and make it possible for people with ground receivers to pinpoint their geographical location. Global Positioning Systems 6.4 Global Positioning System Architecture Figure 6.16 5/28/2015 12 6-34 Copyright © 2015 McGraw-Hill Ryerson Limited Learning Outcome Geographic information system (GIS) • Consists of hardware, software, and data that provide location information for display on a multidimensional map. • Some Common Uses: – Locating businesses or points of interest in a specific area – Routing from departure to destination
  • 31. – Mapping population densities Geographic Information Systems 6.4 6-35 Copyright © 2015 McGraw-Hill Ryerson Limited Learning Outcome • Wireless LAN (WLAN) - A local area network that uses radio signals to transmit and receive data over distances of a few hundred feet • Wireless fidelity (Wi-Fi) - A means by which portable devices can connect without a cable to a local area network, using access points that send and receive data via radio waves Wireless Fidelity (Wi-Fi) 6.5 Learning Outcome Copyright © 2015 McGraw-Hill Ryerson Limited 6-36 Wi-Fi in the Sky Figure 6.17
  • 32. 6.5 5/28/2015 13 6-37 Copyright © 2015 McGraw-Hill Ryerson Limited Learning Outcome Worldwide Interoperability for Microwave Access • A communications technology aimed at providing high-speed wireless data over metropolitan area networks (MANs) • Requires a tower & a receiver • Wide range capability provides service to remote area • Line-of-site and non-line-of- site operability WiMAX Figure 6.18 6.5
  • 33. 6-38 Copyright © 2015 McGraw-Hill Ryerson Limited Learning Outcome • Radio frequency identification (RFID) – Uses active or passive tags that store information and relay it to electronic readers • RFID tag – Contains a microchip and an antenna, and typically works by transmitting an item’s numerical identifier via radio waves to a network for tracking purposes Radio Frequency Identification 6.5 RFID Architecture Figure 6.19 6-39 Copyright © 2015 McGraw-Hill Ryerson Limited Learning Outcome • RFID codes can be: – Linked to the purchase of a particular product by a specific customer
  • 34. • A loyalty promotion code identifies the customer and the purchase is saved towards a discount but also becomes data in the customer’s record – Read at greater distances than bar codes allowing surveillance • For example, reading what is in someone’s shopping bag in a mall can be done without the target being aware • There are proposals to require all RFID products to be labeled • RSA Blocker Tags are used to restrict reading of the tags to within the store’s premises RFID Privacy Issues 6.5 5/28/2015 14 Learning Outcome Copyright © 2015 McGraw-Hill Ryerson Limited 6-40 Challenges of Business Mobility 6.5
  • 35. Figure 6.21 6-41 Copyright © 2015 McGraw-Hill Ryerson Limited Learning Outcome Mobility creates a large number of remote access points into a network • Wi-Fi Protected Access (WPA) – A wireless security protocol to protect Wi-Fi networks • War chalking – The practice of tagging pavement with codes displaying where Wi-Fi access is available • War driving – Deliberately searching for Wi-Fi signals while driving by in a vehicle Protecting Wireless Connections 6.5 6-42 Copyright © 2015 McGraw-Hill Ryerson Limited Learning Outcome • Direct marketing only to contracted entities
  • 36. • Electronic messages identify senders • Solicitation only with target’s consent • LBS indicates to user how the data will be used • Opportunities provided for user to reject marketing initiatives Privacy Policies for Location-based services (LBS) 6.5 5/28/2015 15 6-43 Copyright © 2015 McGraw-Hill Ryerson Limited Learning Outcome • Social networking is pre-loaded on mobile devices. • Mobile TV, real-time video streaming and cost- effective content downloads are a reality with 4G devices. • Multi-function devices cheaper and more versatile.
  • 37. • Availability of increased bandwidth supports expansion of Location-based services. • Marketing and logistics applications are growing to take advantage of Location-based services. Mobile Business Trends 6.5 6-44 Copyright © 2015 McGraw-Hill Ryerson Limited OPENING CASE QUESTIONS The Ironman 6. How is WTC using mobile (cellular) technologies to improve its operations? 7. How is WTC using satellite technologies to improve its operations? 8. Explain how WTC is using WiMAX and RFID wireless technologies in its operations. To what extent do these technologies offer business value? 9. Identify the ethical and security dilemmas that WTC faces in using wireless technologies in its business operations. 6-45 Copyright © 2015 McGraw-Hill Ryerson Limited CLOSING CASE ONE:
  • 38. Wireless Bikes 1. What advantages does a wireless network provide Denver B-cycle? 2. What challenges does a wireless network create for Denver B-cycle? 3. What information not described in the case can Denver B-cycle use with RFID and LBS data? 4. How could Denver B-cycle use other wired or wireless network technologies to gain a competitive advantage? 5/28/2015 16 6-46 Copyright © 2015 McGraw-Hill Ryerson Limited CLOSING CASE TWO: Geoblogging for Chimpanzees and More 1. Now just imagine what you could do with Google Earth if you added GPS. What other types of research might be accomplished using GPS? 2. How could other nonprofits use geoblogs and GPS to help their cause?
  • 39. 3. How could a business use Google Earth and GPS to create a competitive advantage? 4. Are there any ethical or security concerns with this type of geoblog? 6-47 Copyright © 2015 McGraw-Hill Ryerson Limited CLOSING CASE THREE: Crash Pads 1. How else can wireless devices be used to prevent injury? 2. Should all football teams, including professional, academic, and recreational, use wireless sensors in helmets? 3. Should other sports such as hockey and cycling start using this technology? Why or why not? 4. How would you suggest that coaches and staff be trained so that they don’t become over-reliant on these devices as the primary indicator of a potential head injury? BDT - Lecture Style Format Sample 1 McGraw-Hill-Ryerson ©2012 The McGraw-Hill Companies, All Rights Reserved CHAPTER 7 Enterprise Computing
  • 40. Challenges and Enterprise Resource Planning Opening Case: Shell Canada Fuels Productivity with ERP 4-2 Copyright © 2012 McGraw-Hill Ryerson Limited Chapter 7 Overview • SECTION 7.1 - ENTERPRISE COMPUTING CHALLENGES – Innovation: Finding New – Social Entrepreneurship: Going Green – Social Networks: Who’s Who – Virtual Worlds: It’s a Whole New World 4-3 Copyright © 2012 McGraw-Hill Ryerson Limited Chapter 7 Overview
  • 41. • SECTION 7.2 – ENTERPRISE RESOURCE PLANNING – Enterprise Resource Planning – Core ERP Components – Extended ERP Components – Integrating SCM, CRM, and ERP – Measuring ERP Success – Choosing ERP Software – ERP and SME Markets BDT - Lecture Style Format Sample 2 4-4 Copyright © 2012 McGraw-Hill Ryerson Limited Learning Outcomes 1. Explain what enterprise computing challenges are happening in organizations today (e.g. innovation, going green, social networks, and virtual worlds). 2. Describe enterprise resource planning as a management approach and how information systems
  • 42. can help promote ERP. 3. Describe the components of ERP systems and the differences between them. 4-5 Copyright © 2012 McGraw-Hill Ryerson Limited Learning Outcomes 4. Explain the business value of integrating supply chain management, customer relationship management, and enterprise resource planning systems together. 5. Explain how an organization can measure ERP success, choose ERP software, choose ERP software, and use ERP in SME markets. McGraw-Hill-Ryerson ©2012 The McGraw-Hill Companies, All Rights Reserved SECTION 7.1 ENTERPRISE COMPUTING CHALLENGES
  • 43. BDT - Lecture Style Format Sample 3 4-7 Copyright © 2012 McGraw-Hill Ryerson Limited Warren Buffet • Buffett believes in focused investing and believes that all investors should look at five features: 1. The certainty with which the long-term economic characteristics of the business can be evaluated 2. The certainty with which management can be evaluated, both as to its ability to realize the full potential of the business and to wisely employ its cash flows 3. The certainty with which management can be counted on to channel the reward from the business to the shareholders rather than to itself 4. The purchase price of the business 5. The levels of taxation and inflation that will be experienced and that will
  • 44. determine the degree by which an investor’s purchasing-power return is reduced from his gross return • . 4-1 Learning Outcomes 4-8 Copyright © 2012 McGraw-Hill Ryerson Limited Social Entrepreneurship: Going Green • When left on continuously, a single desktop computer and monitor can consume at least 100 watts of power per hour. • To generate that much energy 24 hours a day for a year would require approximately 714 pounds of coal. • When that coal is burned, it releases on average 5 pounds of sulfur dioxide, 5 pounds of nitrogen oxides,
  • 45. and 1,852 pounds (that is almost a ton) of carbon dioxide. 4-1 Learning Outcomes 4-9 Copyright © 2012 McGraw-Hill Ryerson Limited Social Entrepreneurship: Going Green • Social Responsibility implies that an organization has a responsibility to society. • Corporate Policy reflects the position a company takes on social and political issues. • Sustainable or ―Green‖ describes systems that minimize damage to the environment.
  • 46. 4-1 Learning Outcomes BDT - Lecture Style Format Sample 4 4-10 Copyright © 2012 McGraw-Hill Ryerson Limited Energy Consumption • Computer servers in the United States account for about 1 percent of the total energy needs of the country. • Put in perspective, this is roughly equivalent to the energy consumption of Mississippi. • Computers consume energy even when they are not being used. 4-1 Learning
  • 47. Outcomes 4-11 Copyright © 2012 McGraw-Hill Ryerson Limited Energy Consumption Breakdown of Power Usage in The Typical Data Centre Figure 4.2 4-1 Learning Outcomes 4-12 Copyright © 2012 McGraw-Hill Ryerson Limited Energy Consumption Some initiatives to improve sustainability include: • Ontario offers energy rebate programs. • Hewlett-Packard introduced several programs to improve energy efficiency and recycling of computer components.
  • 48. • Sun Microsystems create servers that consume 30-80% less energy for the amount of work processed. 4-1 Learning Outcomes BDT - Lecture Style Format Sample 5 4-13 Copyright © 2012 McGraw-Hill Ryerson Limited E-waste • Ewaste - Refers to discarded, obsolete or broken electronic devices. • Ewaste includes CDs, DVDs, thumb drives, printer cartridges, cell phones, iPods, external hard drives, TVs, VCRs, DVD players, microwaves, and so on • Sustainable IT disposal - Refers to the safe disposal of MIS assets at the end of their life cycle
  • 49. • Electronic Product Stewardship Canada (EPSC) – an industry association that educates and encourages e-waste control • Recent International laws restrict the use of hazardous materials. 4-1 Learning Outcomes 4-14 Copyright © 2012 McGraw-Hill Ryerson Limited Greener IT Ways to Save Energy in a Data Centre Figure 4.4 4-1 Learning Outcomes 4-15 Copyright © 2012 McGraw-Hill Ryerson Limited
  • 50. Organizational Social Networking Passive Search—Finding people for new jobs who are happy and productive where they through business networking sites. Boomerangs—Former employees returning to old jobs. Marketing Networks— Using business networks for marketing and events. 4-1 Learning Outcomes BDT - Lecture Style Format Sample 6 4-16 Copyright © 2012 McGraw-Hill Ryerson Limited It’s a Whole New World! • Virtual World—An Internet
  • 51. resource which presents a 3D virtual community. • Virtual Organizations– interactive web presence for businesses and their customers. • Virtual Workforce—working from home…or anywhere via the Internet. Figure 4.5 4-1 Learning Outcomes 4-17 Copyright © 2012 McGraw-Hill Ryerson Limited Tools for the Virtual Workforce • Mobile commerce (m-commerce)—ability to purchase goods and services through a mobile device.
  • 52. • Telematics—The blending of wired and wireless technologies for efficient electronic communication. • Electronic tagging—the use of RFID (radio frequency identification) and other systems to identify and tracking digital assets. 4-1 Learning Outcomes 4-18 Copyright © 2012 McGraw-Hill Ryerson Limited Virtual World—Second Life • Most popular virtual world, logging just over 100 million user-hours per month. • Over 40 competitors with a wide variety of objectives: – Warner Bros. Records launching new artists. – Logo hosting Big Robots events in
  • 53. cyberspace. – Adidas market testing new gym shoes. – Major League Baseball simulcasting its homerun derby. 4-1 Learning Outcomes BDT - Lecture Style Format Sample 7 4-19 Copyright © 2012 McGraw-Hill Ryerson Limited OPENING CASE QUESTIONS Shell Canada Fuels Productivity with ERP 1. How can large organizations like Shell Canada use innovation to fuel productivity? 2. What advantages are there for Shell Canada to recycle its IT equipment? How could recycling IT
  • 54. equipment be potentially threatening to Shell Canada? 3. How could Shell Canada use social networking to boost productivity and increase profits? 4. How could Shell Canada use virtual worlds such as Second Life to make the company more successful? Give specific examples McGraw-Hill-Ryerson ©2012 The McGraw-Hill Companies, All Rights Reserved SECTION 7.2 ENTERPRISE RESOURCE PLANNING 4-21 Copyright © 2012 McGraw-Hill Ryerson Limited Enterprise Resource Planning • Enterprise resource planning – integrates all departments and functions throughout an organization into a single IT system (or integrated set of IT systems) so that employees can make enterprise-
  • 55. wide decisions by viewing enterprise-wide information on all business operations 4-2 Learning Outcomes BDT - Lecture Style Format Sample 8 4-22 Copyright © 2012 McGraw-Hill Ryerson Limited ERP—Powerful Organizational Tools ERP is: • Solution to incompatible applications.
  • 56. • Addresses the need for global information sharing. • Avoids the expense of fixing legacy systems. Legacy Systems—are older computer technology still in use. Functional Systems—serve single business departments or units. 4-2 Learning Outcomes 4-23 Copyright © 2012 McGraw-Hill Ryerson Limited Enterprise Resource Planning
  • 57. Enterprise Resource Planning System Figure 4.9 4-2 Learning Outcomes 4-24 Copyright © 2012 McGraw-Hill Ryerson Limited Enterprise Resource Planning ERP Integration Data Flow • At the heart of all ERP systems is a database; when a user enters or updates information in one
  • 58. module, it is immediately and automatically updated throughout the entire system Figure 4.10 4-2 Learning Outcomes BDT - Lecture Style Format Sample 9 4-25 Copyright © 2012 McGraw-Hill Ryerson Limited Enterprise Resource Planning
  • 59. ERP Process Flow Figure 4.11 4-2 Learning Outcomes 4-26 Copyright © 2012 McGraw-Hill Ryerson Limited Enterprise Resource Planning The organization before ERP Figure 4.12 4-2 Learning Outcomes
  • 60. 4-27 Copyright © 2012 McGraw-Hill Ryerson Limited Enterprise Resource Planning The organization after ERP Figure 4.13 4-2 Learning Outcomes BDT - Lecture Style Format Sample 10 4-28 Copyright © 2012 McGraw-Hill Ryerson Limited
  • 61. Core and Extended ERP Components The Evolution of ERP Figure 4.14 4-2 Learning Outcomes 4-29 Copyright © 2012 McGraw-Hill Ryerson Limited Core and Extended ERP Components Figure 4.15 4-2
  • 62. Learning Outcomes 4-30 Copyright © 2012 McGraw-Hill Ryerson Limited Core and Extended ERP Components 4-2 Learning Outcomes • City of Winnipeg had had problems with inconsistent data and poor communications, wasted purchasing power due to non-integrated procurement, lack of
  • 63. coordination in payroll, and functional areas that needed to interact but had few touch points. • It used ERP to streamline and integrate more than 100 diverse systems in its various departments • The new system aligned finance, HR, and information technology across the service departments saving the tax payer money and improving satisfaction levels in customers and employees. BDT - Lecture Style Format Sample 11
  • 64. 4-31 Copyright © 2012 McGraw-Hill Ryerson Limited Core and Extended ERP Components Core ERP component – traditional components included in most ERP systems and they primarily focus on internal operations Extended ERP component – extra components that meet the organizational needs not covered by the core components and primarily focus on external operations
  • 65. 4-2 Learning Outcomes 4-3 4-32 Copyright © 2012 McGraw-Hill Ryerson Limited Core ERP Components • Three most common core ERP components 1. Accounting and finance 2. Production and materials management 3. Human resource 4-3
  • 66. Learning Outcomes 4-33 Copyright © 2012 McGraw-Hill Ryerson Limited Accounting and Finance ERP Components • Accounting and finance ERP component – manages accounting data and financial processes within the enterprise with functions such as general ledger, accounts payable, accounts receivable, budgeting, and asset
  • 67. management 4-3 Learning Outcomes BDT - Lecture Style Format Sample 12 4-34 Copyright © 2012 McGraw-Hill Ryerson Limited Accounting and Finance ERP Components • Deeley Harley-Davidson Canada (DHDC), the exclusive Canadian distributor of Harley-Davidson motorcycles, has improved inventory, turnaround time, margins, and customer
  • 68. satisfaction—all with the implementation of a financial ERP system. • The system has opened up the power of information to the company and is helping it make strategic decisions when it still has the time to change things. • The ERP system provides the company with ways to manage inventory, turnaround time, and utilize warehouse space more effectively. • Credit-management feature set limits on how much a customer can owe at any time 4-3 Learning
  • 69. Outcomes 4-35 Copyright © 2012 McGraw-Hill Ryerson Limited Production and Materials Management ERP Components • Production and materials management ERP component – handles the various aspects of production planning and execution such as demand forecasting, production scheduling, job cost accounting, and quality control 4-3 Learning Outcomes 4-36
  • 70. Copyright © 2012 McGraw-Hill Ryerson Limited Production and Materials Management ERP Components • Grupo Farmanova Intermed, located in Costa Rica, is a pharmaceutical marketing and distribution company that markets nearly 2,500 products to approximately 500 customers in Central and South America. • The company identified a need for software that could unify product logistics management in a single country. • It decided to deploy PeopleSoft financial and distribution ERP components allowing the company to improve customer data management, increase confidence among internal and external users, and coordinate the logistics of inventory.
  • 71. • With the new PeopleSoft software the company enhanced its capabilities for handling, distributing, and marketing its pharmaceuticals. 4-3 Learning Outcomes BDT - Lecture Style Format Sample 13 4-37 Copyright © 2012 McGraw-Hill Ryerson Limited Production and Materials Management ERP Components
  • 72. Figure 4.16 4-3 Learning Outcomes 4-38 Copyright © 2012 McGraw-Hill Ryerson Limited Human Resource ERP Component • Human resource ERP component – tracks employee information including payroll, benefits, compensation, performance assessment, and assumes compliance with the legal requirements of multiple jurisdictions and tax
  • 73. authorities 4-3 Learning Outcomes 4-39 Copyright © 2012 McGraw-Hill Ryerson Limited Extended ERP Components • Extended ERP components include: – Business intelligence – describes information that people use to support their decision-making efforts – Customer relationship management – involves managing all aspects of a customer’s relationships with an organization to increase customer loyalty and retention and an organization's
  • 74. profitability – Supply chain management – involves the management of information flows between and among stages in a supply chain to maximize total supply chain effectiveness and profitability – E-business – means conducting business on the Internet, not only buying and selling, but also serving customers and collaborating with business partners 4-3 Learning Outcomes BDT - Lecture Style Format Sample 14
  • 75. 4-40 Copyright © 2012 McGraw-Hill Ryerson Limited E-Business Components • E-business components include e-logistics and e- procurement – E-logistics – manages the transportation and storage of goods – E-procurement – the business-to-business (B2B) purchase and sale of supplies and services over the Internet • Best Buy checks inventory levels at each of its 750 stores in North America as often as every half-hour with its SCM system, taking much of the guesswork out of
  • 76. inventory replenishment 4-3 Learning Outcomes 4-41 Copyright © 2012 McGraw-Hill Ryerson Limited Integrating SCM, CRM and ERP Primary Users and Business Benefits of Enterprise Applications Figure 4.17 4-3 Learning
  • 77. Outcomes 4-4 4-42 Copyright © 2012 McGraw-Hill Ryerson Limited Integration Tools • Middleware – Several different types of software that sit between and provide connectivity for two or more software applications • Enterprise application integration middleware – Takes a new approach to middleware by packaging commonly
  • 78. used applications together, reducing the time needed to integrate applications from multiple vendors 4-3 Learning Outcomes 4-4 BDT - Lecture Style Format Sample 15 4-43 Copyright © 2012 McGraw-Hill Ryerson Limited The Connected Corporation
  • 79. • SCM, CRM, and ERP are the backbone of e-business • Integration of these applications is the key to success for many companies • Integration allows the unlocking of information to make it available to any user, anywhere, anytime 4-2 Learning Outcomes 4-4 4-44 Copyright © 2012 McGraw-Hill Ryerson Limited
  • 80. Choosing ERP Software Successful ERP projects share 3 attributes 1. Overall fit • Off the rack • Off the rack and tailored to fit • Custom made 2. Proper business analysis • Successful companies spend up to 10 percent of the project budget on a business analysis 3. Solid implementation plans • A plan is needed to monitor the quality, objectives, and timelines 4-5
  • 81. Learning Outcomes 4-45 Copyright © 2012 McGraw-Hill Ryerson Limited ERP and SME Markets • ERP is no longer the purview of large organizations. • In the hopes of expanding their client base, many large-scale ERP vendors, such as SAP and Oracle, are attempting to enter the small to medium enterprise (SME) market
  • 82. 4-5 Learning Outcomes BDT - Lecture Style Format Sample 16 4-46 Copyright © 2012 McGraw-Hill Ryerson Limited OPENING CASE QUESTIONS Shell Canada 5. How did ERP help improve business operations at Shell Canada? 6. How important was training in helping roll out the system to
  • 83. Shell Canada personnel? 7. How could extended ERP components help improve business operations at Shell Canada? 8. What advice would you give Shell Canada? 9. How can integrating SCM, CRM, and ERP help improve business operations at Shell Canada? 4-47 Copyright © 2012 McGraw-Hill Ryerson Limited CLOSING CASE ONE Confusing Carbon 1. How can companies help reduce carbon
  • 84. emissions? 2. How can finding alternative energy sources help reduce IT energy consumption? 3. How can labelling IT equipment green help promote green initiatives? 4. Why do global organizations need to be concerned with green or social entrepreneurship initiatives? 5. What ethical issues are associated with green technology? 4-48 Copyright © 2012 McGraw-Hill Ryerson Limited
  • 85. CLOSING CASE TWO Campus ERP 1. How could core ERP components help improve business operations at your school? 2. How could extended ERP components help improve business operations at your school? 3. How can integrating SCM, CRM, and ERP help improve business operations at your school? 4. What lessons for dealing with the challenges of implementing an ERP information system at your school can be learned from this case? BDT - Lecture Style Format Sample 17
  • 86. 4-49 Copyright © 2012 McGraw-Hill Ryerson Limited CLOSING CASE THREE Intuitive ERP 1. How well do the components of the Intuitive ERP software product align with the ERP components described in this chapter? 2. What advantages did Fibre Connections and Westwinn Group Corp. realize with the introduction of Intuitive ERP? How well do these advantages resonate with the benefits of ERP described in this chapter? 4-50 Copyright © 2012 McGraw-Hill Ryerson Limited CLOSING CASE THREE
  • 87. Intuitive ERP 3. The successful implementation of Intuitive ERP described above does not speak of any negative outcomes or drawbacks of introducing a new enterprise-wide information system in an organization. • What challenges do you envision would occur in a company that decides to introduce such large-scale change? What drawbacks, if any, are there in adopting a software solution from a single vendor that serves such a critical and important role in an organization? How could one mitigate or lessen these drawbacks?