17. Tools
ERP is:
•
Solution
to incompatible applications.
• Addresses the need for global information
sharing.
• Avoids the expense of fixing legacy systems.
Legacy Systems—are older computer
technology still in use.
Functional Systems—serve single business
departments or units.
4-2
Learning
19. ERP Integration
Data Flow
• At the heart of all
ERP systems is a
database; when a
user enters or
updates
information in one
module, it is
immediately and
automatically
updated
throughout the
entire system
Figure 4.10
4-2
Learning
Outcomes
24. Outcomes
• City of Winnipeg had had problems with inconsistent
data and poor communications, wasted purchasing
power due to non-integrated procurement, lack of
coordination in payroll, and functional areas that
needed to interact but had few touch points.
• It used ERP to streamline and integrate more than
100 diverse systems in its various departments
• The new system aligned finance, HR, and
information technology across the service
departments saving the tax payer money and
improving satisfaction levels in customers and
29. Accounting and Finance ERP
Components
• Deeley Harley-Davidson Canada (DHDC), the exclusive
Canadian distributor of Harley-Davidson motorcycles, has
improved inventory, turnaround time, margins, and customer
satisfaction—all with the implementation of a financial ERP
system.
• The system has opened up the power of information to the
company and is helping it make strategic decisions when it
still has the time to change things.
• The ERP system provides the company with ways to
manage inventory, turnaround time, and utilize warehouse
space more effectively.
32. product logistics management in a single country.
• It decided to deploy PeopleSoft financial and distribution ERP
components allowing the company to improve customer data
management, increase confidence among internal and
external users, and coordinate the logistics of inventory.
• With the new PeopleSoft software the company enhanced its
capabilities for handling, distributing, and marketing its
pharmaceuticals.
4-3
Learning
Outcomes
35. to support their decision-making efforts
– Customer relationship management – involves managing all
aspects of a customer’s relationships with an organization to
increase customer loyalty and retention and an organization's
profitability
– Supply chain management – involves the management of
information flows between and among stages in a supply chain
to maximize total supply chain effectiveness and profitability
– E-business – means conducting business on the Internet, not
only buying and selling, but also serving customers and
collaborating with business partners
4-3
39. software applications
• Enterprise application integration
middleware – Takes a new approach
to middleware by packaging commonly
used applications together, reducing
the time needed to integrate
applications from multiple vendors
4-3
Learning
Outcomes
4-4
44. Shell Canada
5. How did ERP help improve business operations at Shell
Canada?
6. How important was training in helping roll out the system to
Shell Canada personnel?
7. How could extended ERP components help improve
business operations at Shell Canada?
8. What advice would you give Shell Canada?
9. How can integrating SCM, CRM, and ERP help improve
business operations at Shell Canada?
54. Outcome • Internet Service Provider (ISP)
– Provides access to the Internet and related services
• Wireless Internet Service Provider (WISP)
– Allows subscribers to connect using a wireless at specific
“hotspots”
• Online Service Provider (OSP)
– Connects subscribers through its own web site offering a
wide array
of ancillary resources
• Application Service Provider (ASP)
– Offers Internet-based business services
• Service Level Agreements (SLA)
– Define the responsibilities of the service provider and the
customer’s
expectations
Internet Service Providers
56. • Visual connection as well as voice
• Ability to send reports etc. through file transfer
feature
Disadvantages
• Similar to other Internet communications problems
– Dropped connections
– Security threats
Voice over IP (VoIP)
6.2
Uses TCP/IP technology to transmit voice and visuals over
long-distance telephone lines
58. Virtual Private Network (VPN)
• Secure access through the Internet to an organization’s
internal
network
Value-Added Network (VAN)
• Private network for securely exchanging information through a
high-capacity connection
Disadvantages
• Handle limited types of business data
• Do not support real-time business process integration
• Relatively expensive, complex and difficult to expand
Networking Business
6.2
63. DSL
(1M)
Cable
(5M)
Wireless
(5M)
An email 1 sec <1 sec
A basic Web
page 10 sec <1 sec
One 5-minute
Song (5M) 15 min 2 min 1 min 40 sec
One 2-hour
Movie (500M) 20 hours 4 h 2 h 70 min
Figure 6.6
5/28/2015
68. network access
• Logon and Password
– Employees must be trained to guard their
passwords and used them properly
• Data Encryption
– Confidential information must be coded
– “Keys” for decoding must be protected
– Cost of encryption is related to strength of the
codes
• Digital certificates/Digital Cash
– Methods of reducing credit card fraud
Securing Business Networks
6.2
5/28/2015
7
71. anywhere, and anyplace.
Automation of
business processes
Wireless technologies can centralize critical data
and eliminate redundant processes.
User convenience,
timeliness, and
accessibility
People are no longer cut off from the world or from
the office. Through wireless tools and mobile devices
they can have real time data access and transmission.
From Figure 6.8
5/28/2015
8
Learning
74. Knowing the Limits
Of Technology
Set realistic expectations regarding needed
functionality, about the IT resources deploying
it and the capabilities of ultimate users.
Protecting Data
From Loss
Security must be a multi-faceted approach
covering all areas of exposure.
Compliance in the
Mobile Enterprise
More mobility, more devices, more potential for
security breaches.
Staying flexible &
Embracing Change
Once implemented, monitor and modify
strategy on a regular basis.
80. Learning
Outcome Applications that use the geographic location of the
device
to provide location-specific data to the mobile user.
Privacy Issues
• Subject geographically targeted for promotions without prior
consent
• Customer’s knowledge of another’s location may lead to
embarrassing situations
• Location data can be used for harassment or attack
• Service denial because a location for delivery is deemed
unsafe
• Legal restrictions
Location-Based Services (LBS)
6.4
89. Outcome • RFID codes can be:
– Linked to the purchase of a particular product by a specific
customer
• A loyalty promotion code identifies the customer and the
purchase is saved towards a discount but also becomes data in
the
customer’s record
– Read at greater distances than bar codes allowing surveillance
• For example, reading what is in someone’s shopping bag in a
mall
can be done without the target being aware
• There are proposals to require all RFID products to be labeled
• RSA Blocker Tags are used to restrict reading of the tags to
within the store’s premises
RFID Privacy Issues
6.5
92. Outcome • Direct marketing only to
contracted entities
• Electronic messages identify
senders
• Solicitation only with target’s
consent
• LBS indicates to user how the
data will be used
• Opportunities provided for user
to reject marketing initiatives
Privacy Policies for Location-based services
(LBS)
6.5
5/28/2015
15
97. academic, and recreational, use wireless sensors in
helmets?
3. Should other sports such as hockey and cycling start using
this technology? Why or why not?
4. How would you suggest that coaches and staff be trained
so that they don’t become over-reliant on these devices as
the primary indicator of a potential head injury?
WRITING A CRITICAL REVIEW
What is a critical review?
A critical review is much more than a simple summary; it is an
analysis and evaluation of a book, article,
or other medium. Writing a good critical review requires that
you understand the material, and that you
know how to analyze and evaluate that material using
appropriate criteria.
Steps to writing an effective critical review:
Reading
98. Skim the whole text to determine the overall thesis, structure
and methodology. This will help you better
understand how the different elements fit together once you
begin reading carefully.
Read critically. It is not enough to simply understand what the
author is saying; it is essential to
challenge it. Examine how the article is structured, the types of
reasons or evidence used to support the
conclusions, and whether the author is reliant on underlying
assumptions or theoretical frameworks. Take
copious notes that reflect what the text means AND what you
think about it.
Analyzing
Examine all elements. All aspects of the text—the structure,
the methods, the reasons and evidence, the
conclusions, and, especially, the logical connections between all
of these—should be considered.
The types of questions asked will vary depending on the
discipline in which you are writing, but the
following samples will provide a good starting point:
99. Structure What type of text is it? (For example: Is it a primary
source or secondary
source? Is it original research or a comment on original
research?)
What are the different sections and how do they fit together?
Are any of the sections particularly effective (or ineffective)?
Methodology Is the research quantitative or qualitative?
Does the methodology have any weaknesses?
How does the design of the study address the hypothesis?
Reasons/Evidence What sources does the author use (interviews,
peer-reviewed journals,
government reports, journal entries, newspaper accounts, etc.)?
What types of reasoning are employed (inductive, deductive,
abductive)?
What type of evidence is provided (empirical, statistical,
logical, etc.)?
Are there any gaps in the evidence (or reasoning)?
Conclusions Does the data adequately support the conclusion
drawn by the researcher(s)?
Are other interpretations plausible?
Are the conclusions dependent on a particular theoretical
formulation?
101. conclusion that game playing alone can
improve student achievement is based on a misinterpretation of
the evidence.
Not: This article misinterprets key evidence to support the
conclusion that game playing can improve GPA.
Ensure that your thesis answers the assignment. If you are asked
to write a review of a single text, with
no outside sources, then your essay should focus strictly on the
material in the text and your analysis and
evaluation of it. If you are asked to write about more than one
work, or to draw connections between an
article or book and the course material, then your review should
address these concerns.
Choose a structure that will best allow you to support your
thesis within the required page constraints.
The first example below works well with shorter assignments,
but the risk is that too much time will be
spent developing the overview, and too little time on the
evaluation. The second example works better for
longer reviews because it provides the relevant description with
the analysis and evaluation, allowing the
reader to follow the argument easily.
102. Two common structures used for critical reviews:
Example 1 Example 2
Introduction
Overview of the text
Evaluation of the text
� Point 1
� Point 2
� Point 3
� Point 4 …(continue as necessary)
Conclusion
Introduction (with thesis)
Point 1: Explanation and evaluation
Point 2: Explanation and evaluation
Point 3: Explanation and evaluation
103. (continue elaborating as many points as
necessary)
Conclusion
Important: Avoid presenting your points in a laundry-list style.
Synthesize the information as much as
possible.
“Laundry-List” Style of Presentation Synthesized Argument.
The article cites several different studies in support
of the argument that playing violent video games can
have a positive impact on student achievement.
These studies refer to educational games and other
types of computer use. The argument is not logically
well constructed. Educational games are not the same
as violent video games. The article also ignores data
indicating that people with the highest GPA are those
that reported low computer use. Also, different types
of computer use could include things like researching
or word-processing, and these activities are very
different from playing violent video games.
104. The evidence cited in the article does not support the
overall conclusion that playing violent games improves
GPA. One study only examines educational games in
relation to GPA, so it is questionable whether the same
findings will hold true for other types of games. Another
study does not distinguish between different types of
computer use, making it difficult to assess whether it is
game playing or activities such as research and writing
that contributed to improvements in GPA. Further, the
author disregards relevant data that indicates that students
with the highest GPAs are those who report low
computer use, which means that a direct correlation
between game playing and GPA cannot be supported.