SlideShare a Scribd company logo
1
Using Information Technology
for Competitive Advantage
Lecture 4
Abdisalam Issa-Salwe
Department of Computer Science
Faculty of Information Science and Technology
East Africa University
2
Topic list
 Porter’s five forces model
 Value chain
 EDI
 Data warehousing
 Data mining
 Intelligent agents
 Value added networks
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
2
Strategic Advantage and IT
Important Managerial Questions:
 What is strategy?
 What is strategic advantage?
 Information Systems as a strategic
resource
 How do we use Information Systems to
achieve some form of strategic advantage
over competitors?
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
4
What is Strategy
Definition of strategy
 Early 1990s definition:
 “A well coordinated set of objectives, policies, and
plans aimed at securing a long-term competitive
advantage. A vision for the organization that is
implemented.”
 Webster’s Dictionary
 “a careful plan or method”
 “the art of devising or employing plans toward a goal”
 “the art and science of military command exercised to
meet the enemy in combat under advantageous
circumstances”
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
3
5
What is Strategy?
 Strategy
 Henry Mintzberg:
 Explicitly planned: “Intended Strategy”
 Realized: planned and succeed
 Unrealized: planned but fail
 Implicit, not explicitly planned yet executed:
“Emergent Strategy”
Planned
Strategy
Failed
Strategy
Emergent
Strategy
Executed
Strategy
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
Strategic Advantage and IT
Evolution of Strategy Concepts
 Competitive Strategy
Competitive Advantage
 Sustainable Competitive Advantage
 Temporary (Non-Sustainable)
Competitive Advantage
Strategic Advantage
 Temporary Strategic Advantage
Strategy
Speeding Up
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
4
7
Strategic Advantage and IT
Evolution of Strategy Concepts
 Three eras of approaches for achieving strategic advantage
 Portfolio of Business (1970s)
 performance a result of businesses you pick to be in
 motivated by economies of scale
 Portfolio of Capabilities (mid 1980s)
 performance a result of internal processes and routines,
which provide distinctive capabilities
 motivated by economies of scale and scope
 Portfolio of Relationships (mid 1990s)
 performance a result of building a wide array of relationships
with external companies that possess hard-to-imitate
capabilities
 motivated by economies of scale, scope, and expertise
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
Information Systems as a Strategic
Resource
 Inwardly Strategic
 focused on internal
processes
 lower costs
 increase employee
productivity
 improve teamwork
 enhance
communication
 Outwardly Strategic
 aimed at direct
competition
 beat competitors
 new services
 new “knowledge”
that leads to new
services
 Inwardly Strategic
 focused on internal
processes
 lower costs
 increase employee
productivity
 improve teamwork
 enhance
communication
 Outwardly Strategic
 aimed at direct
competition
 beat competitors
 new services
 new “knowledge”
that leads to new
services
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
5
IS as a Strategic Resource
 Hayes and Wheelwright (1985) - operations
effectiveness, applies equally well to ISD effectiveness
 Stage 1: Internally Neutral
 not seen as a source of process improvement
technology
 Minimize negative impact of functional area on
organization
 Top management “in control”; tells dept. what to
do
 Stage 2: Externally Neutral
 not seen as a source of external competitive
advantage
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
10
IS as a Strategic Resource (cont…)
Stage 3: Internally Supportive
 source of internally focused competitive
advantages
Stage 4: Externally Supportive
 viewed as competitive force in the
business
 function drives issues of top-
management strategy making
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
6
IS as a Strategic Resource
Inter-Firm
Strategic
Focus
“Alliance”
Competitive Marketplace
Company A
Internally
Strategic
Company B
Externally
Strategic
Inter-Firm
Strategic
Focus
“Alliance”
Competitive Marketplace
Company A
Internally
Strategic
Company B
Externally
Strategic
Competitive Marketplace
Company A
Internally
Strategic
Company B
Externally
Strategic
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
12
Porter’s five forces model
 Professor Michael Porter of Harvard
University maintained that in every
industry, competition depends on the
collective strength of five basic forces
 Interacting with these forces are the
generic corporate strategies.
 IT can be a powerful agent to change the
balance of power in and between these
forces.
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
7
13
Porter’s five forces model (cont…)
 Michael Porter has identified five forces
that are widely used to assess the
structure of any industry. Porter’s five
forces are the:
Bargaining power of suppliers,
Bargaining power of buyers,
Threat of new entrants,
Threat of substitutes, and
Rivalry among competitors.
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
14East Africa University, Faculty of Information Science and Technology, Department of Computer Science
8
15
Porter’s five forces model (cont…)
 All organisations operate in one or more
industries.
 By the nature of their participation in an
industry, they are affected by existing or
potential uses of information technology
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
16
Porter’s five forces model (cont…)
 New entrants can increase overall capacity in the industry,
thereby reducing prices and incumbents' cost advantages.
 Market is cornered with product, but success may inspire others
to enter the business and challenge position.
 The threat of new entrants is the possibility that new firms will
enter the industry.
 New entrants bring a desire to gain market share and often have
significant resources. Their presence may force prices down and
put pressure on profits.
 IT can help create or raise barriers to entry by increasing
mandatory investments in hardware and software, facilitating
control over databases, or locking in customers to existing
distribution channels.
 There are many types of barriers to entry:
 switching costs, economies of scale, high investment in IT,
economies of experience, access to distribution channels,
and government policy
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
9
17
Porter’s five forces model (cont…)
 Intensity of industry rivalry depends on
factors beyond the control of the individual
firm,
 such as degree of concentration, diversity, or
dependency; rate of industry growth; or switching
costs.
 It is critical to understand the strategies of one's
rivals in detail.
 For instance, Ford's strategy depends on the
strategies of Toyota, Nissan, GM, and
Volkswagen, and vice versa.
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
18
Porter’s five forces model (cont…)
 Threat of substitute products may arise from
products and services in other industries.
 Examples:
 The products of stock brokers and insurance
companies now compete against banks for the
investment dollar.
 The automobile eliminated the horse with
buggy, and the silicon chip eliminated
electromechanical adding machines. The life
cycle of products can be reduced through the
use of IT, such as Computer-Aided Design
(CAD). IT has also provided the basis for
creating new information-intensive products.
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
10
19
Porter’s five forces model (cont…)
Bargaining power of buyers
 The power of buyers describes the effect that your
customers have on the profitability of your business.
The transaction between the seller and the buyer
creates value for both parties.
 Buyers drives prices down and the quality of products
up.
 Buyer power depends on the level of switching costs,
the competitive position of the buyer in the industry
(size, volume), whether the buyer can purchase a
commodity product, or whether the buyer poses a
serious threat of backward integration (i.e., buying out
or merging with its suppliers).
 Installing computer terminals at the buyers' site is one
way to raise the buyers' cost of switching to other
suppliers.
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
20
Porter’s five forces model (cont…)
Bargaining power of suppliers
 Any business requires inputs—labor, parts, raw materials, and
services. The cost of your inputs can have a significant effect on
your company’s profitability. Whether
 It is in some ways the antithesis of buyer power.
 The threat of forward integration (i.e., buying out or merging with
its customers) is one determinant of supplier power.
 Influential suppliers drive prices up and reduce the quality and
quantity of products and services.
 Supplier power also depends on size, volume, and concentration
relative to other firms in the industry.
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
11
21
Porter’s five forces model (cont…)
 Together, the strength of the five forces determines
the profit potential in an industry by influencing the
prices, costs, and required investments of
businesses—the elements of return on investment.
 Stronger forces are associated with a more
challenging business environment.
 To identify the important structural features of your
industry via the five forces, you conduct an industry
analysis that answers the question,
 “What are the key factors for competitive success?”
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
22
Value Chain Analysis
 The value chain is a systematic approach to
examining the development of competitive
advantage.
 The 'margin' depicted in the diagram is the same
as added value.
 The organization is split into 'primary activities'
and 'support activities
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
12
23East Africa University, Faculty of Information Science and Technology, Department of Computer Science
24
Value Chain Analysis (cont…)
 The value chain begins with the data resource.
 Information is developed from the data resource
to support the knowledge environment of an
intelligent learning organisation.
Data is the raw material for information which
is the raw material for the knowledge
environment.
 Knowledge is the raw material for business
intelligence that supports business strategies.
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
13
25
Electronic Data Interchange (EDI)
 EDI was first developed by the automobile/transportation
industry in the 1970s.
 Today,
 it is widely used in a variety of industries, including
distribution, finance and accounting, health care,
manufacturing, purchasing, retail, tax form filing, and
shipping.
 Early,
 EDI packages used rather simple standard forms that
forced companies to convert data to fit the forms.
 Newer,
 EDI systems allow companies to create custom
systems using simple programming or authoring tools.
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
26
Electronic Data Interchange (EDI) (cont…)
 Electronic Data Interchange (EDI) is the electronic
exchange of routine business transactions.
 EDI defines the electronic exchange of structured business
data, such as purchase orders, invoices, and shipping
notices, typically between one organization and another.
 Typical transactions include such documents as
purchase orders, invoices, advance shipping
notification, payments, etc.
 Exchange of electronic data using inter-
organizational information systems
 Set of hardware, software, and standards that
accommodate the EDI process
 The relationship is usually between a vendor and
customer.
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
14
27
Electronic Data Interchange (EDI) (cont…)
 It is important to differentiate between EDI and
electronic commerce (e-commerce).
 Electronic commerce encompasses all aspects
of electronic business exchanges, including
person-to-person interaction (collaboration),
money transfers, data sharing and exchange,
Web site merchant systems, and so on.
 EDI as a subset of electronic commerce that
encompasses the exchange of business
information in a standardized electronic form.
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
28
Electronic Data Interchange (EDI) (cont…)
 EDI can reduce costs, workforce
requirements, and errors associated with
retyping orders, invoices, and other
documents.
 With EDI, computer data already entered
by one organization is made available to a
business partner.
 EDI is typically handled using store-and-
forward technologies similar to e-mail.
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
15
29
Electronic Data Interchange (EDI) (cont…)
 Two approaches in the implementation of
EDI.
 Many large organizations acquire or build their
own proprietary systems, often in association with
their business partners.
 To work with a value added network provider,
which provides EDI transaction services, security,
document interchange assistance, standard
message formats, communication protocols, and
communication parameters for EDI.
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
30East Africa University, Faculty of Information Science and Technology, Department of Computer Science
16
31
Value Added Network (VAN)
 A (VAN) Value Added Network is a third
party who stores the data to be
communicated.
 Serves as a middle person, so neither
party can access the other’s private
network.
 The main key to a VAN is that the other
partner does not touch your network, as
business partners initiate the sending or
retrieving of the data from the VAN.
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
32
Value Added Network (VAN) (cont…)
 With the data being sent to or received
from the VAN by the business partners
initiating the communication, business
partners are insuring a safe method of
data transportation.
 The different ways of communicating to
the VAN include dialup as well as FTP
protocols.
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
17
33East Africa University, Faculty of Information Science and Technology, Department of Computer Science
34
Business intelligent agents
 Business intelligence represent a popular trend in
many public and private sector organizations.
 Ideally, any manager or knowledge worker should be
able to compose information requests without
programmer assistance and achieve answers at the
speed of thought.
 Follow-up questions should be immediately asked and
answered in order to maintain continuity of thought on
a particular topic of importance.
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
18
35
Business intelligent agents (cont…)
 Intelligent Agents execute tasks on behalf of a
business process, computer application, or an
individual.
 For example, corporate use of monitoring software
based on agents can be a key component in
cutting support costs and increase computer
efficiency.
 Intelligent agents have been written to search
through e-mail messages for certain keywords or
simple concepts (phrases).
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
36
Business intelligent agents (cont..)
 Knowledge-based expert systems, or
simply expert systems, use human
knowledge to solve problems that normally
would require human intelligence.
 These expert systems represent the
expertise knowledge as data or rules
within the computer.
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
19
37
Data warehouse, data marts
 Data warehouses are computer based information
systems that are home for "secondhand" data that
originated from either another application or from an
external system or source.
 Warehouses optimize database query and reporting
tools because of their ability to analyze data, often from
disparate databases and in interesting ways.
 They are a way for managers and decision makers to
extract information quickly and easily in order to answer
questions about their business.
 In other words, data warehouses are read-only,
integrated databases designed to answer comparative
and "what if" questions.
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
38
Data warehouse, data marts (cont…)
 Data Marts:
 Data in a data warehouse should be reasonably
current, but not necessarily up to the minute,
although developments in the data warehouse
industry have made frequent and incremental data
dumps more feasible.
 Data marts are smaller than data warehouses and
generally contain information from a single
department of a business or organization. The
current trend in data warehousing is to develop a
data warehouse with several smaller related data
marts for specific kinds of queries and reports.
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
20
39
A Data Warehouse Architecture
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
40
Data mining
 Data mining is primarily used today by companies with
a strong consumer focus - retail, financial,
communication, and marketing organizations.
 It enables these companies to determine relationships
among "internal" factors such as price, product
positioning, or staff skills, and "external" factors such
as economic indicators, competition, and customer
demographics.
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
21
41
Data mining
 Data mining, or knowledge discovery, is the
computer-assisted process of digging through and
analyzing enormous sets of data and then extracting
the meaning of the data.
 Data mining tools predict behaviors and future
trends, allowing businesses to make proactive,
knowledge-driven decisions.
 Data mining tools can answer business questions
that traditionally were too time consuming to resolve.
 They scour databases for hidden patterns, finding
predictive information that experts may miss
because it lies outside their expectations.
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
42
Data mining (cont…)
 With data mining, a retailer could use
point-of-sale records of customer
purchases to send targeted promotions
based on an individual's purchase history.
 By mining demographic data from
comment or warranty cards, the retailer
could develop products and promotions to
appeal to specific customer segments
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
22
43
Data mining (cont…)
 Data mining consists of five major
elements:
 Extract, transform, and load transaction data onto
the data warehouse system.
 Store and manage the data in a multidimensional
database system.
 Provide data access to business analysts and
information technology professionals.
 Analyze the data by application software.
 Present the data in a useful format, such as a
graph or table.
East Africa University, Faculty of Information Science and Technology, Department of Computer Science
44East Africa University, Faculty of Information Science and Technology, Department of Computer Science
23
45
Reference
 Laudon, K. & Laudon, J. (2006): Management Information Systems:
Managing the Digital Firm, 9th ed. Prentice Hall
 Abdisalam Issa-Salwe, Lecture Notes, Thames Valley University,
2008.
 Lachlan M. MacKinnon, Information: Types of Information Systems,
http://www.macs.hw.ac.uk/~lachlan/dbislectures/lectures/types.ppt,
 Dave Chaffey, Paul Bocij, Andrew Greasley and Simon Hickies
(eds) (2003): Business Information Systems: Technology,
Development and Management, Pearson Education Limited,
London.
 BPP, Information Systems, Study Text, Paper 2.1, BPP Professional
Education, United Kingdom.
46
Group Discussion
 Group 1: Discuss using Information
Technology for Competitive
Advantage
 Group 2: Porter’s five forces model
 Group 3: Discuss the concept of
Value chain (looking at the
systematic approach to examining
the development of competitive
advantage).
East Africa University, Faculty of Information Science and Technology, Department of Computer Science

More Related Content

What's hot

INFORMATION TECHNOLOGY FOR BUSINESS
INFORMATION TECHNOLOGY FOR BUSINESSINFORMATION TECHNOLOGY FOR BUSINESS
INFORMATION TECHNOLOGY FOR BUSINESS
METHODIST COLLEGE OF ENGG & TECH
 
Information Technologies and its Impact on the Organisational Structure
Information Technologies and its Impact on the Organisational StructureInformation Technologies and its Impact on the Organisational Structure
Information Technologies and its Impact on the Organisational Structure
Association of Scientists, Developers and Faculties
 
Gr 12 Difference Between IT an Information Systems
Gr 12 Difference Between IT an Information SystemsGr 12 Difference Between IT an Information Systems
Gr 12 Difference Between IT an Information Systems
university of education,Lahore
 
The Impact of Information Technology on Business Transformation in the Operat...
The Impact of Information Technology on Business Transformation in the Operat...The Impact of Information Technology on Business Transformation in the Operat...
The Impact of Information Technology on Business Transformation in the Operat...
IJMIT JOURNAL
 
Implementation of enterprise resource planning systems in kenyan public unive...
Implementation of enterprise resource planning systems in kenyan public unive...Implementation of enterprise resource planning systems in kenyan public unive...
Implementation of enterprise resource planning systems in kenyan public unive...
Alexander Decker
 
Forecasting the impact of information and communication technology on gross d...
Forecasting the impact of information and communication technology on gross d...Forecasting the impact of information and communication technology on gross d...
Forecasting the impact of information and communication technology on gross d...
Alexander Decker
 
Impact of Information and Communication Technology on Cargo Industries A Stud...
Impact of Information and Communication Technology on Cargo Industries A Stud...Impact of Information and Communication Technology on Cargo Industries A Stud...
Impact of Information and Communication Technology on Cargo Industries A Stud...
ijtsrd
 
Need of information technology in this modern world
Need of information technology in this modern worldNeed of information technology in this modern world
Need of information technology in this modern world
InstantAssignmentHelpAustralia
 
Enterprise resource planning (erp) system in higher
Enterprise resource planning (erp) system in higherEnterprise resource planning (erp) system in higher
Enterprise resource planning (erp) system in higherprjpublications
 
An Empirical Study on the information systems in the Moroccan organizations: ...
An Empirical Study on the information systems in the Moroccan organizations: ...An Empirical Study on the information systems in the Moroccan organizations: ...
An Empirical Study on the information systems in the Moroccan organizations: ...
INFOGAIN PUBLICATION
 
3.4 ict strategy
3.4 ict strategy3.4 ict strategy
3.4 ict strategymrmwood
 
Information system in global business
Information system in global business  Information system in global business
Information system in global business
Unitedworld School Of Business
 
Ahlan, arshad, ajayi 2014 - it governance in a malaysian public institute o...
Ahlan, arshad, ajayi   2014 - it governance in a malaysian public institute o...Ahlan, arshad, ajayi   2014 - it governance in a malaysian public institute o...
Ahlan, arshad, ajayi 2014 - it governance in a malaysian public institute o...
Binyamin Ajayi
 
Operations Research and ICT A Keynote Address
Operations Research and ICT A Keynote AddressOperations Research and ICT A Keynote Address
Operations Research and ICT A Keynote Address
Elvis Muyanja
 
Report on strategic rules of Information System for changing the bases of com...
Report on strategic rules of Information System for changing the bases of com...Report on strategic rules of Information System for changing the bases of com...
Report on strategic rules of Information System for changing the bases of com...
Md. Khukan Miah
 
SEMS_Newman_accepted
SEMS_Newman_acceptedSEMS_Newman_accepted
SEMS_Newman_acceptedNo'am Newman
 
Information System and Information Technology
Information System and Information TechnologyInformation System and Information Technology
Information System and Information Technology
megat zainurul anuar
 
Introduction to information system
Introduction to information systemIntroduction to information system
Introduction to information system
PROF.JITENDRA PATEL
 
Ict maturity2009
Ict maturity2009Ict maturity2009
Ict maturity2009
Quoc Trung Pham
 

What's hot (20)

INFORMATION TECHNOLOGY FOR BUSINESS
INFORMATION TECHNOLOGY FOR BUSINESSINFORMATION TECHNOLOGY FOR BUSINESS
INFORMATION TECHNOLOGY FOR BUSINESS
 
Information Technologies and its Impact on the Organisational Structure
Information Technologies and its Impact on the Organisational StructureInformation Technologies and its Impact on the Organisational Structure
Information Technologies and its Impact on the Organisational Structure
 
Gr 12 Difference Between IT an Information Systems
Gr 12 Difference Between IT an Information SystemsGr 12 Difference Between IT an Information Systems
Gr 12 Difference Between IT an Information Systems
 
The Impact of Information Technology on Business Transformation in the Operat...
The Impact of Information Technology on Business Transformation in the Operat...The Impact of Information Technology on Business Transformation in the Operat...
The Impact of Information Technology on Business Transformation in the Operat...
 
Implementation of enterprise resource planning systems in kenyan public unive...
Implementation of enterprise resource planning systems in kenyan public unive...Implementation of enterprise resource planning systems in kenyan public unive...
Implementation of enterprise resource planning systems in kenyan public unive...
 
Forecasting the impact of information and communication technology on gross d...
Forecasting the impact of information and communication technology on gross d...Forecasting the impact of information and communication technology on gross d...
Forecasting the impact of information and communication technology on gross d...
 
Impact of Information and Communication Technology on Cargo Industries A Stud...
Impact of Information and Communication Technology on Cargo Industries A Stud...Impact of Information and Communication Technology on Cargo Industries A Stud...
Impact of Information and Communication Technology on Cargo Industries A Stud...
 
Need of information technology in this modern world
Need of information technology in this modern worldNeed of information technology in this modern world
Need of information technology in this modern world
 
Enterprise resource planning (erp) system in higher
Enterprise resource planning (erp) system in higherEnterprise resource planning (erp) system in higher
Enterprise resource planning (erp) system in higher
 
An Empirical Study on the information systems in the Moroccan organizations: ...
An Empirical Study on the information systems in the Moroccan organizations: ...An Empirical Study on the information systems in the Moroccan organizations: ...
An Empirical Study on the information systems in the Moroccan organizations: ...
 
3.4 ict strategy
3.4 ict strategy3.4 ict strategy
3.4 ict strategy
 
Information system in global business
Information system in global business  Information system in global business
Information system in global business
 
Ahlan, arshad, ajayi 2014 - it governance in a malaysian public institute o...
Ahlan, arshad, ajayi   2014 - it governance in a malaysian public institute o...Ahlan, arshad, ajayi   2014 - it governance in a malaysian public institute o...
Ahlan, arshad, ajayi 2014 - it governance in a malaysian public institute o...
 
Operations Research and ICT A Keynote Address
Operations Research and ICT A Keynote AddressOperations Research and ICT A Keynote Address
Operations Research and ICT A Keynote Address
 
Report on strategic rules of Information System for changing the bases of com...
Report on strategic rules of Information System for changing the bases of com...Report on strategic rules of Information System for changing the bases of com...
Report on strategic rules of Information System for changing the bases of com...
 
SEMS_Newman_accepted
SEMS_Newman_acceptedSEMS_Newman_accepted
SEMS_Newman_accepted
 
Information System and Information Technology
Information System and Information TechnologyInformation System and Information Technology
Information System and Information Technology
 
levels of system
levels of systemlevels of system
levels of system
 
Introduction to information system
Introduction to information systemIntroduction to information system
Introduction to information system
 
Ict maturity2009
Ict maturity2009Ict maturity2009
Ict maturity2009
 

Similar to Lecture 4 (using information technology for competitive advantage)

Building_a_Sustainable_Competitive_Advantage.pdf
Building_a_Sustainable_Competitive_Advantage.pdfBuilding_a_Sustainable_Competitive_Advantage.pdf
Building_a_Sustainable_Competitive_Advantage.pdf
MohamedMetwally496403
 
Building_a_Sustainable_Competitive_Advantage.pdf
Building_a_Sustainable_Competitive_Advantage.pdfBuilding_a_Sustainable_Competitive_Advantage.pdf
Building_a_Sustainable_Competitive_Advantage.pdf
hilman39
 
Quiz 7QUIZ strategic management concepts &cases 11th edition by Fred R. David...
Quiz 7QUIZ strategic management concepts &cases 11th edition by Fred R. David...Quiz 7QUIZ strategic management concepts &cases 11th edition by Fred R. David...
Quiz 7QUIZ strategic management concepts &cases 11th edition by Fred R. David...
حمد بوجرادة
 
Quiz 7QUIZ strategic management concepts &cases 11th edition by Fred
Quiz 7QUIZ strategic management concepts &cases 11th edition by Fred Quiz 7QUIZ strategic management concepts &cases 11th edition by Fred
Quiz 7QUIZ strategic management concepts &cases 11th edition by Fred
حمد بوجرادة
 
Jonathan ParsonsProf. Andrew Raleigh09102016External Env.docx
Jonathan ParsonsProf. Andrew Raleigh09102016External Env.docxJonathan ParsonsProf. Andrew Raleigh09102016External Env.docx
Jonathan ParsonsProf. Andrew Raleigh09102016External Env.docx
christiandean12115
 
Chapter 1 - Introduction to Strategic Management.pptx
Chapter 1 - Introduction to Strategic Management.pptxChapter 1 - Introduction to Strategic Management.pptx
Chapter 1 - Introduction to Strategic Management.pptx
FitrohAgungDimasTetu
 
Competitive intelligence-analysis-tools-for-economic-development
Competitive intelligence-analysis-tools-for-economic-developmentCompetitive intelligence-analysis-tools-for-economic-development
Competitive intelligence-analysis-tools-for-economic-development
Praxis Gnosis
 
Strategic Management lecture # 07
Strategic Management lecture # 07Strategic Management lecture # 07
Strategic Management lecture # 07
Hijratullah Tahir
 
Strategic Management lecture # 06
Strategic Management lecture # 06Strategic Management lecture # 06
Strategic Management lecture # 06
Hijratullah Tahir
 
MISO L006 IT Strategy
MISO L006 IT StrategyMISO L006 IT Strategy
MISO L006 IT StrategyJan Wong
 
Strategy - basic concepts
Strategy  - basic conceptsStrategy  - basic concepts
Strategy - basic concepts
Allied Consultants
 
7steps Presentation 2010
7steps Presentation 20107steps Presentation 2010
7steps Presentation 2010Castcsi
 
Anatomy of innovation strategy in technology business
Anatomy of innovation strategy in technology businessAnatomy of innovation strategy in technology business
Anatomy of innovation strategy in technology business
Vikas vardhan soni
 
Lecture 8 (information systems and strategy planning)
Lecture 8  (information systems and strategy planning)Lecture 8  (information systems and strategy planning)
Lecture 8 (information systems and strategy planning)
Taibah University, College of Computer Science & Engineering
 
THE JAPANESE TRANSFORMER INDUSTRY A CASE STUDY OF ITS COMPETITIVENESS
THE JAPANESE TRANSFORMER INDUSTRY A CASE STUDY OF ITS COMPETITIVENESSTHE JAPANESE TRANSFORMER INDUSTRY A CASE STUDY OF ITS COMPETITIVENESS
THE JAPANESE TRANSFORMER INDUSTRY A CASE STUDY OF ITS COMPETITIVENESS
ijcsit
 
Strategic management
Strategic management Strategic management
Strategic management
Mehak Vaswani
 
Lecture12 (is353-business strategy)
Lecture12 (is353-business strategy)Lecture12 (is353-business strategy)
Strategy Formulation.ppt
Strategy Formulation.pptStrategy Formulation.ppt
Strategy Formulation.ppt
UtkarshSingh600554
 

Similar to Lecture 4 (using information technology for competitive advantage) (20)

Building_a_Sustainable_Competitive_Advantage.pdf
Building_a_Sustainable_Competitive_Advantage.pdfBuilding_a_Sustainable_Competitive_Advantage.pdf
Building_a_Sustainable_Competitive_Advantage.pdf
 
Building_a_Sustainable_Competitive_Advantage.pdf
Building_a_Sustainable_Competitive_Advantage.pdfBuilding_a_Sustainable_Competitive_Advantage.pdf
Building_a_Sustainable_Competitive_Advantage.pdf
 
Quiz 7QUIZ strategic management concepts &cases 11th edition by Fred R. David...
Quiz 7QUIZ strategic management concepts &cases 11th edition by Fred R. David...Quiz 7QUIZ strategic management concepts &cases 11th edition by Fred R. David...
Quiz 7QUIZ strategic management concepts &cases 11th edition by Fred R. David...
 
Quiz 7QUIZ strategic management concepts &cases 11th edition by Fred
Quiz 7QUIZ strategic management concepts &cases 11th edition by Fred Quiz 7QUIZ strategic management concepts &cases 11th edition by Fred
Quiz 7QUIZ strategic management concepts &cases 11th edition by Fred
 
Jonathan ParsonsProf. Andrew Raleigh09102016External Env.docx
Jonathan ParsonsProf. Andrew Raleigh09102016External Env.docxJonathan ParsonsProf. Andrew Raleigh09102016External Env.docx
Jonathan ParsonsProf. Andrew Raleigh09102016External Env.docx
 
Chapter 1 - Introduction to Strategic Management.pptx
Chapter 1 - Introduction to Strategic Management.pptxChapter 1 - Introduction to Strategic Management.pptx
Chapter 1 - Introduction to Strategic Management.pptx
 
Competitive intelligence-analysis-tools-for-economic-development
Competitive intelligence-analysis-tools-for-economic-developmentCompetitive intelligence-analysis-tools-for-economic-development
Competitive intelligence-analysis-tools-for-economic-development
 
Strategic Management lecture # 07
Strategic Management lecture # 07Strategic Management lecture # 07
Strategic Management lecture # 07
 
Strategic Management lecture # 06
Strategic Management lecture # 06Strategic Management lecture # 06
Strategic Management lecture # 06
 
MISO L006 IT Strategy
MISO L006 IT StrategyMISO L006 IT Strategy
MISO L006 IT Strategy
 
Strategy - basic concepts
Strategy  - basic conceptsStrategy  - basic concepts
Strategy - basic concepts
 
Ijebea14 253
Ijebea14 253Ijebea14 253
Ijebea14 253
 
7steps Presentation 2010
7steps Presentation 20107steps Presentation 2010
7steps Presentation 2010
 
Anatomy of innovation strategy in technology business
Anatomy of innovation strategy in technology businessAnatomy of innovation strategy in technology business
Anatomy of innovation strategy in technology business
 
Lecture 8 (information systems and strategy planning)
Lecture 8  (information systems and strategy planning)Lecture 8  (information systems and strategy planning)
Lecture 8 (information systems and strategy planning)
 
THE JAPANESE TRANSFORMER INDUSTRY A CASE STUDY OF ITS COMPETITIVENESS
THE JAPANESE TRANSFORMER INDUSTRY A CASE STUDY OF ITS COMPETITIVENESSTHE JAPANESE TRANSFORMER INDUSTRY A CASE STUDY OF ITS COMPETITIVENESS
THE JAPANESE TRANSFORMER INDUSTRY A CASE STUDY OF ITS COMPETITIVENESS
 
Strategic management
Strategic management Strategic management
Strategic management
 
Lecture12 (is353-business strategy)
Lecture12 (is353-business strategy)Lecture12 (is353-business strategy)
Lecture12 (is353-business strategy)
 
Strategy Formulation.ppt
Strategy Formulation.pptStrategy Formulation.ppt
Strategy Formulation.ppt
 
Mis 012
Mis 012Mis 012
Mis 012
 

More from Taibah University, College of Computer Science & Engineering

Lecture 1- Computer Organization and Architecture.pdf
Lecture 1- Computer Organization and Architecture.pdfLecture 1- Computer Organization and Architecture.pdf
Lecture 1- Computer Organization and Architecture.pdf
Taibah University, College of Computer Science & Engineering
 
The paper the welfare state of the somali nation - a possible solution to t...
The paper   the welfare state of the somali nation - a possible solution to t...The paper   the welfare state of the somali nation - a possible solution to t...
The paper the welfare state of the somali nation - a possible solution to t...
Taibah University, College of Computer Science & Engineering
 
Colonial intrusion and_the_somali_resistance
Colonial intrusion and_the_somali_resistanceColonial intrusion and_the_somali_resistance
Colonial intrusion and_the_somali_resistance
Taibah University, College of Computer Science & Engineering
 
Practical session 1 (critical path analaysis)
Practical session 1 (critical path analaysis)Practical session 1 (critical path analaysis)
Practical session 1 (critical path analaysis)
Taibah University, College of Computer Science & Engineering
 
Chapter 2 modeling the process and life-cycle
Chapter 2  modeling the process and life-cycleChapter 2  modeling the process and life-cycle
Chapter 2 modeling the process and life-cycle
Taibah University, College of Computer Science & Engineering
 
Historical Perspective on the Challenge Facing the Somali Sacral Unity
Historical Perspective on the Challenge Facing the Somali Sacral UnityHistorical Perspective on the Challenge Facing the Somali Sacral Unity
Historical Perspective on the Challenge Facing the Somali Sacral Unity
Taibah University, College of Computer Science & Engineering
 
Colonial intrusion and the Somali Resistance
Colonial intrusion and the Somali ResistanceColonial intrusion and the Somali Resistance
Colonial intrusion and the Somali Resistance
Taibah University, College of Computer Science & Engineering
 
Lecture1 data structure(introduction)
Lecture1 data structure(introduction)Lecture1 data structure(introduction)
Lecture2 is331 data&infomanag(databaseenv)
Lecture2 is331 data&infomanag(databaseenv)Lecture2 is331 data&infomanag(databaseenv)
Lecture2 is331 data&infomanag(databaseenv)
Taibah University, College of Computer Science & Engineering
 
Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)
Taibah University, College of Computer Science & Engineering
 
Lecture6 is353(ea&data viewpoint )
Lecture6 is353(ea&data viewpoint )Lecture6 is353(ea&data viewpoint )
Lecture6 is353(ea&data viewpoint )
Taibah University, College of Computer Science & Engineering
 
Lecture4 is353-ea(fea)
Lecture4 is353-ea(fea)Lecture4 is353-ea(fea)
Lecture3 is353-ea(togaf)
Lecture3 is353-ea(togaf)Lecture3 is353-ea(togaf)
Lecture2 is353-ea(the zachma framework)
Lecture2 is353-ea(the zachma framework)Lecture2 is353-ea(the zachma framework)
Lecture2 is353-ea(the zachma framework)
Taibah University, College of Computer Science & Engineering
 
Lecture1 is353-enterprise architectureconcept)
Lecture1 is353-enterprise architectureconcept)Lecture1 is353-enterprise architectureconcept)
Lecture1 is353-enterprise architectureconcept)
Taibah University, College of Computer Science & Engineering
 
Lecture1 is313-(is-innovation&tech)
Lecture1 is313-(is-innovation&tech)Lecture1 is313-(is-innovation&tech)
Lecture1 is313-(is-innovation&tech)
Taibah University, College of Computer Science & Engineering
 
Lab 1 (cs351) (computer tech & c++)
Lab 1 (cs351) (computer tech & c++)Lab 1 (cs351) (computer tech & c++)
Lab 1 (cs351) (computer tech & c++)
Taibah University, College of Computer Science & Engineering
 
Lecture1 is441-(intro toe-commerce)
Lecture1 is441-(intro toe-commerce)Lecture1 is441-(intro toe-commerce)
Is421 lecture01(intro to knowledge management systems)
Is421 lecture01(intro to knowledge management systems)Is421 lecture01(intro to knowledge management systems)
Is421 lecture01(intro to knowledge management systems)
Taibah University, College of Computer Science & Engineering
 
Is 414 lecture 1 (inform centremanag)
Is 414 lecture 1 (inform centremanag)Is 414 lecture 1 (inform centremanag)

More from Taibah University, College of Computer Science & Engineering (20)

Lecture 1- Computer Organization and Architecture.pdf
Lecture 1- Computer Organization and Architecture.pdfLecture 1- Computer Organization and Architecture.pdf
Lecture 1- Computer Organization and Architecture.pdf
 
The paper the welfare state of the somali nation - a possible solution to t...
The paper   the welfare state of the somali nation - a possible solution to t...The paper   the welfare state of the somali nation - a possible solution to t...
The paper the welfare state of the somali nation - a possible solution to t...
 
Colonial intrusion and_the_somali_resistance
Colonial intrusion and_the_somali_resistanceColonial intrusion and_the_somali_resistance
Colonial intrusion and_the_somali_resistance
 
Practical session 1 (critical path analaysis)
Practical session 1 (critical path analaysis)Practical session 1 (critical path analaysis)
Practical session 1 (critical path analaysis)
 
Chapter 2 modeling the process and life-cycle
Chapter 2  modeling the process and life-cycleChapter 2  modeling the process and life-cycle
Chapter 2 modeling the process and life-cycle
 
Historical Perspective on the Challenge Facing the Somali Sacral Unity
Historical Perspective on the Challenge Facing the Somali Sacral UnityHistorical Perspective on the Challenge Facing the Somali Sacral Unity
Historical Perspective on the Challenge Facing the Somali Sacral Unity
 
Colonial intrusion and the Somali Resistance
Colonial intrusion and the Somali ResistanceColonial intrusion and the Somali Resistance
Colonial intrusion and the Somali Resistance
 
Lecture1 data structure(introduction)
Lecture1 data structure(introduction)Lecture1 data structure(introduction)
Lecture1 data structure(introduction)
 
Lecture2 is331 data&infomanag(databaseenv)
Lecture2 is331 data&infomanag(databaseenv)Lecture2 is331 data&infomanag(databaseenv)
Lecture2 is331 data&infomanag(databaseenv)
 
Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)
 
Lecture6 is353(ea&data viewpoint )
Lecture6 is353(ea&data viewpoint )Lecture6 is353(ea&data viewpoint )
Lecture6 is353(ea&data viewpoint )
 
Lecture4 is353-ea(fea)
Lecture4 is353-ea(fea)Lecture4 is353-ea(fea)
Lecture4 is353-ea(fea)
 
Lecture3 is353-ea(togaf)
Lecture3 is353-ea(togaf)Lecture3 is353-ea(togaf)
Lecture3 is353-ea(togaf)
 
Lecture2 is353-ea(the zachma framework)
Lecture2 is353-ea(the zachma framework)Lecture2 is353-ea(the zachma framework)
Lecture2 is353-ea(the zachma framework)
 
Lecture1 is353-enterprise architectureconcept)
Lecture1 is353-enterprise architectureconcept)Lecture1 is353-enterprise architectureconcept)
Lecture1 is353-enterprise architectureconcept)
 
Lecture1 is313-(is-innovation&tech)
Lecture1 is313-(is-innovation&tech)Lecture1 is313-(is-innovation&tech)
Lecture1 is313-(is-innovation&tech)
 
Lab 1 (cs351) (computer tech & c++)
Lab 1 (cs351) (computer tech & c++)Lab 1 (cs351) (computer tech & c++)
Lab 1 (cs351) (computer tech & c++)
 
Lecture1 is441-(intro toe-commerce)
Lecture1 is441-(intro toe-commerce)Lecture1 is441-(intro toe-commerce)
Lecture1 is441-(intro toe-commerce)
 
Is421 lecture01(intro to knowledge management systems)
Is421 lecture01(intro to knowledge management systems)Is421 lecture01(intro to knowledge management systems)
Is421 lecture01(intro to knowledge management systems)
 
Is 414 lecture 1 (inform centremanag)
Is 414 lecture 1 (inform centremanag)Is 414 lecture 1 (inform centremanag)
Is 414 lecture 1 (inform centremanag)
 

Recently uploaded

S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 

Recently uploaded (20)

S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 

Lecture 4 (using information technology for competitive advantage)

  • 1. 1 Using Information Technology for Competitive Advantage Lecture 4 Abdisalam Issa-Salwe Department of Computer Science Faculty of Information Science and Technology East Africa University 2 Topic list  Porter’s five forces model  Value chain  EDI  Data warehousing  Data mining  Intelligent agents  Value added networks East Africa University, Faculty of Information Science and Technology, Department of Computer Science
  • 2. 2 Strategic Advantage and IT Important Managerial Questions:  What is strategy?  What is strategic advantage?  Information Systems as a strategic resource  How do we use Information Systems to achieve some form of strategic advantage over competitors? East Africa University, Faculty of Information Science and Technology, Department of Computer Science 4 What is Strategy Definition of strategy  Early 1990s definition:  “A well coordinated set of objectives, policies, and plans aimed at securing a long-term competitive advantage. A vision for the organization that is implemented.”  Webster’s Dictionary  “a careful plan or method”  “the art of devising or employing plans toward a goal”  “the art and science of military command exercised to meet the enemy in combat under advantageous circumstances” East Africa University, Faculty of Information Science and Technology, Department of Computer Science
  • 3. 3 5 What is Strategy?  Strategy  Henry Mintzberg:  Explicitly planned: “Intended Strategy”  Realized: planned and succeed  Unrealized: planned but fail  Implicit, not explicitly planned yet executed: “Emergent Strategy” Planned Strategy Failed Strategy Emergent Strategy Executed Strategy East Africa University, Faculty of Information Science and Technology, Department of Computer Science Strategic Advantage and IT Evolution of Strategy Concepts  Competitive Strategy Competitive Advantage  Sustainable Competitive Advantage  Temporary (Non-Sustainable) Competitive Advantage Strategic Advantage  Temporary Strategic Advantage Strategy Speeding Up East Africa University, Faculty of Information Science and Technology, Department of Computer Science
  • 4. 4 7 Strategic Advantage and IT Evolution of Strategy Concepts  Three eras of approaches for achieving strategic advantage  Portfolio of Business (1970s)  performance a result of businesses you pick to be in  motivated by economies of scale  Portfolio of Capabilities (mid 1980s)  performance a result of internal processes and routines, which provide distinctive capabilities  motivated by economies of scale and scope  Portfolio of Relationships (mid 1990s)  performance a result of building a wide array of relationships with external companies that possess hard-to-imitate capabilities  motivated by economies of scale, scope, and expertise East Africa University, Faculty of Information Science and Technology, Department of Computer Science Information Systems as a Strategic Resource  Inwardly Strategic  focused on internal processes  lower costs  increase employee productivity  improve teamwork  enhance communication  Outwardly Strategic  aimed at direct competition  beat competitors  new services  new “knowledge” that leads to new services  Inwardly Strategic  focused on internal processes  lower costs  increase employee productivity  improve teamwork  enhance communication  Outwardly Strategic  aimed at direct competition  beat competitors  new services  new “knowledge” that leads to new services East Africa University, Faculty of Information Science and Technology, Department of Computer Science
  • 5. 5 IS as a Strategic Resource  Hayes and Wheelwright (1985) - operations effectiveness, applies equally well to ISD effectiveness  Stage 1: Internally Neutral  not seen as a source of process improvement technology  Minimize negative impact of functional area on organization  Top management “in control”; tells dept. what to do  Stage 2: Externally Neutral  not seen as a source of external competitive advantage East Africa University, Faculty of Information Science and Technology, Department of Computer Science 10 IS as a Strategic Resource (cont…) Stage 3: Internally Supportive  source of internally focused competitive advantages Stage 4: Externally Supportive  viewed as competitive force in the business  function drives issues of top- management strategy making East Africa University, Faculty of Information Science and Technology, Department of Computer Science
  • 6. 6 IS as a Strategic Resource Inter-Firm Strategic Focus “Alliance” Competitive Marketplace Company A Internally Strategic Company B Externally Strategic Inter-Firm Strategic Focus “Alliance” Competitive Marketplace Company A Internally Strategic Company B Externally Strategic Competitive Marketplace Company A Internally Strategic Company B Externally Strategic East Africa University, Faculty of Information Science and Technology, Department of Computer Science 12 Porter’s five forces model  Professor Michael Porter of Harvard University maintained that in every industry, competition depends on the collective strength of five basic forces  Interacting with these forces are the generic corporate strategies.  IT can be a powerful agent to change the balance of power in and between these forces. East Africa University, Faculty of Information Science and Technology, Department of Computer Science
  • 7. 7 13 Porter’s five forces model (cont…)  Michael Porter has identified five forces that are widely used to assess the structure of any industry. Porter’s five forces are the: Bargaining power of suppliers, Bargaining power of buyers, Threat of new entrants, Threat of substitutes, and Rivalry among competitors. East Africa University, Faculty of Information Science and Technology, Department of Computer Science 14East Africa University, Faculty of Information Science and Technology, Department of Computer Science
  • 8. 8 15 Porter’s five forces model (cont…)  All organisations operate in one or more industries.  By the nature of their participation in an industry, they are affected by existing or potential uses of information technology East Africa University, Faculty of Information Science and Technology, Department of Computer Science 16 Porter’s five forces model (cont…)  New entrants can increase overall capacity in the industry, thereby reducing prices and incumbents' cost advantages.  Market is cornered with product, but success may inspire others to enter the business and challenge position.  The threat of new entrants is the possibility that new firms will enter the industry.  New entrants bring a desire to gain market share and often have significant resources. Their presence may force prices down and put pressure on profits.  IT can help create or raise barriers to entry by increasing mandatory investments in hardware and software, facilitating control over databases, or locking in customers to existing distribution channels.  There are many types of barriers to entry:  switching costs, economies of scale, high investment in IT, economies of experience, access to distribution channels, and government policy East Africa University, Faculty of Information Science and Technology, Department of Computer Science
  • 9. 9 17 Porter’s five forces model (cont…)  Intensity of industry rivalry depends on factors beyond the control of the individual firm,  such as degree of concentration, diversity, or dependency; rate of industry growth; or switching costs.  It is critical to understand the strategies of one's rivals in detail.  For instance, Ford's strategy depends on the strategies of Toyota, Nissan, GM, and Volkswagen, and vice versa. East Africa University, Faculty of Information Science and Technology, Department of Computer Science 18 Porter’s five forces model (cont…)  Threat of substitute products may arise from products and services in other industries.  Examples:  The products of stock brokers and insurance companies now compete against banks for the investment dollar.  The automobile eliminated the horse with buggy, and the silicon chip eliminated electromechanical adding machines. The life cycle of products can be reduced through the use of IT, such as Computer-Aided Design (CAD). IT has also provided the basis for creating new information-intensive products. East Africa University, Faculty of Information Science and Technology, Department of Computer Science
  • 10. 10 19 Porter’s five forces model (cont…) Bargaining power of buyers  The power of buyers describes the effect that your customers have on the profitability of your business. The transaction between the seller and the buyer creates value for both parties.  Buyers drives prices down and the quality of products up.  Buyer power depends on the level of switching costs, the competitive position of the buyer in the industry (size, volume), whether the buyer can purchase a commodity product, or whether the buyer poses a serious threat of backward integration (i.e., buying out or merging with its suppliers).  Installing computer terminals at the buyers' site is one way to raise the buyers' cost of switching to other suppliers. East Africa University, Faculty of Information Science and Technology, Department of Computer Science 20 Porter’s five forces model (cont…) Bargaining power of suppliers  Any business requires inputs—labor, parts, raw materials, and services. The cost of your inputs can have a significant effect on your company’s profitability. Whether  It is in some ways the antithesis of buyer power.  The threat of forward integration (i.e., buying out or merging with its customers) is one determinant of supplier power.  Influential suppliers drive prices up and reduce the quality and quantity of products and services.  Supplier power also depends on size, volume, and concentration relative to other firms in the industry. East Africa University, Faculty of Information Science and Technology, Department of Computer Science
  • 11. 11 21 Porter’s five forces model (cont…)  Together, the strength of the five forces determines the profit potential in an industry by influencing the prices, costs, and required investments of businesses—the elements of return on investment.  Stronger forces are associated with a more challenging business environment.  To identify the important structural features of your industry via the five forces, you conduct an industry analysis that answers the question,  “What are the key factors for competitive success?” East Africa University, Faculty of Information Science and Technology, Department of Computer Science 22 Value Chain Analysis  The value chain is a systematic approach to examining the development of competitive advantage.  The 'margin' depicted in the diagram is the same as added value.  The organization is split into 'primary activities' and 'support activities East Africa University, Faculty of Information Science and Technology, Department of Computer Science
  • 12. 12 23East Africa University, Faculty of Information Science and Technology, Department of Computer Science 24 Value Chain Analysis (cont…)  The value chain begins with the data resource.  Information is developed from the data resource to support the knowledge environment of an intelligent learning organisation. Data is the raw material for information which is the raw material for the knowledge environment.  Knowledge is the raw material for business intelligence that supports business strategies. East Africa University, Faculty of Information Science and Technology, Department of Computer Science
  • 13. 13 25 Electronic Data Interchange (EDI)  EDI was first developed by the automobile/transportation industry in the 1970s.  Today,  it is widely used in a variety of industries, including distribution, finance and accounting, health care, manufacturing, purchasing, retail, tax form filing, and shipping.  Early,  EDI packages used rather simple standard forms that forced companies to convert data to fit the forms.  Newer,  EDI systems allow companies to create custom systems using simple programming or authoring tools. East Africa University, Faculty of Information Science and Technology, Department of Computer Science 26 Electronic Data Interchange (EDI) (cont…)  Electronic Data Interchange (EDI) is the electronic exchange of routine business transactions.  EDI defines the electronic exchange of structured business data, such as purchase orders, invoices, and shipping notices, typically between one organization and another.  Typical transactions include such documents as purchase orders, invoices, advance shipping notification, payments, etc.  Exchange of electronic data using inter- organizational information systems  Set of hardware, software, and standards that accommodate the EDI process  The relationship is usually between a vendor and customer. East Africa University, Faculty of Information Science and Technology, Department of Computer Science
  • 14. 14 27 Electronic Data Interchange (EDI) (cont…)  It is important to differentiate between EDI and electronic commerce (e-commerce).  Electronic commerce encompasses all aspects of electronic business exchanges, including person-to-person interaction (collaboration), money transfers, data sharing and exchange, Web site merchant systems, and so on.  EDI as a subset of electronic commerce that encompasses the exchange of business information in a standardized electronic form. East Africa University, Faculty of Information Science and Technology, Department of Computer Science 28 Electronic Data Interchange (EDI) (cont…)  EDI can reduce costs, workforce requirements, and errors associated with retyping orders, invoices, and other documents.  With EDI, computer data already entered by one organization is made available to a business partner.  EDI is typically handled using store-and- forward technologies similar to e-mail. East Africa University, Faculty of Information Science and Technology, Department of Computer Science
  • 15. 15 29 Electronic Data Interchange (EDI) (cont…)  Two approaches in the implementation of EDI.  Many large organizations acquire or build their own proprietary systems, often in association with their business partners.  To work with a value added network provider, which provides EDI transaction services, security, document interchange assistance, standard message formats, communication protocols, and communication parameters for EDI. East Africa University, Faculty of Information Science and Technology, Department of Computer Science 30East Africa University, Faculty of Information Science and Technology, Department of Computer Science
  • 16. 16 31 Value Added Network (VAN)  A (VAN) Value Added Network is a third party who stores the data to be communicated.  Serves as a middle person, so neither party can access the other’s private network.  The main key to a VAN is that the other partner does not touch your network, as business partners initiate the sending or retrieving of the data from the VAN. East Africa University, Faculty of Information Science and Technology, Department of Computer Science 32 Value Added Network (VAN) (cont…)  With the data being sent to or received from the VAN by the business partners initiating the communication, business partners are insuring a safe method of data transportation.  The different ways of communicating to the VAN include dialup as well as FTP protocols. East Africa University, Faculty of Information Science and Technology, Department of Computer Science
  • 17. 17 33East Africa University, Faculty of Information Science and Technology, Department of Computer Science 34 Business intelligent agents  Business intelligence represent a popular trend in many public and private sector organizations.  Ideally, any manager or knowledge worker should be able to compose information requests without programmer assistance and achieve answers at the speed of thought.  Follow-up questions should be immediately asked and answered in order to maintain continuity of thought on a particular topic of importance. East Africa University, Faculty of Information Science and Technology, Department of Computer Science
  • 18. 18 35 Business intelligent agents (cont…)  Intelligent Agents execute tasks on behalf of a business process, computer application, or an individual.  For example, corporate use of monitoring software based on agents can be a key component in cutting support costs and increase computer efficiency.  Intelligent agents have been written to search through e-mail messages for certain keywords or simple concepts (phrases). East Africa University, Faculty of Information Science and Technology, Department of Computer Science 36 Business intelligent agents (cont..)  Knowledge-based expert systems, or simply expert systems, use human knowledge to solve problems that normally would require human intelligence.  These expert systems represent the expertise knowledge as data or rules within the computer. East Africa University, Faculty of Information Science and Technology, Department of Computer Science
  • 19. 19 37 Data warehouse, data marts  Data warehouses are computer based information systems that are home for "secondhand" data that originated from either another application or from an external system or source.  Warehouses optimize database query and reporting tools because of their ability to analyze data, often from disparate databases and in interesting ways.  They are a way for managers and decision makers to extract information quickly and easily in order to answer questions about their business.  In other words, data warehouses are read-only, integrated databases designed to answer comparative and "what if" questions. East Africa University, Faculty of Information Science and Technology, Department of Computer Science 38 Data warehouse, data marts (cont…)  Data Marts:  Data in a data warehouse should be reasonably current, but not necessarily up to the minute, although developments in the data warehouse industry have made frequent and incremental data dumps more feasible.  Data marts are smaller than data warehouses and generally contain information from a single department of a business or organization. The current trend in data warehousing is to develop a data warehouse with several smaller related data marts for specific kinds of queries and reports. East Africa University, Faculty of Information Science and Technology, Department of Computer Science
  • 20. 20 39 A Data Warehouse Architecture East Africa University, Faculty of Information Science and Technology, Department of Computer Science 40 Data mining  Data mining is primarily used today by companies with a strong consumer focus - retail, financial, communication, and marketing organizations.  It enables these companies to determine relationships among "internal" factors such as price, product positioning, or staff skills, and "external" factors such as economic indicators, competition, and customer demographics. East Africa University, Faculty of Information Science and Technology, Department of Computer Science
  • 21. 21 41 Data mining  Data mining, or knowledge discovery, is the computer-assisted process of digging through and analyzing enormous sets of data and then extracting the meaning of the data.  Data mining tools predict behaviors and future trends, allowing businesses to make proactive, knowledge-driven decisions.  Data mining tools can answer business questions that traditionally were too time consuming to resolve.  They scour databases for hidden patterns, finding predictive information that experts may miss because it lies outside their expectations. East Africa University, Faculty of Information Science and Technology, Department of Computer Science 42 Data mining (cont…)  With data mining, a retailer could use point-of-sale records of customer purchases to send targeted promotions based on an individual's purchase history.  By mining demographic data from comment or warranty cards, the retailer could develop products and promotions to appeal to specific customer segments East Africa University, Faculty of Information Science and Technology, Department of Computer Science
  • 22. 22 43 Data mining (cont…)  Data mining consists of five major elements:  Extract, transform, and load transaction data onto the data warehouse system.  Store and manage the data in a multidimensional database system.  Provide data access to business analysts and information technology professionals.  Analyze the data by application software.  Present the data in a useful format, such as a graph or table. East Africa University, Faculty of Information Science and Technology, Department of Computer Science 44East Africa University, Faculty of Information Science and Technology, Department of Computer Science
  • 23. 23 45 Reference  Laudon, K. & Laudon, J. (2006): Management Information Systems: Managing the Digital Firm, 9th ed. Prentice Hall  Abdisalam Issa-Salwe, Lecture Notes, Thames Valley University, 2008.  Lachlan M. MacKinnon, Information: Types of Information Systems, http://www.macs.hw.ac.uk/~lachlan/dbislectures/lectures/types.ppt,  Dave Chaffey, Paul Bocij, Andrew Greasley and Simon Hickies (eds) (2003): Business Information Systems: Technology, Development and Management, Pearson Education Limited, London.  BPP, Information Systems, Study Text, Paper 2.1, BPP Professional Education, United Kingdom. 46 Group Discussion  Group 1: Discuss using Information Technology for Competitive Advantage  Group 2: Porter’s five forces model  Group 3: Discuss the concept of Value chain (looking at the systematic approach to examining the development of competitive advantage). East Africa University, Faculty of Information Science and Technology, Department of Computer Science