Progress Reporting 3 (Week 5)
Greetings everyone,
Thank you for supplying your progress reports on the status of the project for Week 5. As the weeks progress there can be seen (and displayed this week in the screenshot below) that there is a continuing progression, and movement across the requirements of the project, towards its submission.
It can be seen that the analysis and writing up of the report may present challenges. When using tools or frameworks for the analysis detail as per the criteria (of the tool/framework) to tie back to the research questions/direction and then produce findings. With regard to using PEST as an analysis tool (for those considering this) please address all aspects of PEST as relevant to your investigation. Ideally this will cover Political, Economic, Social and Technological elements appropriate to your data analysis and the methodology of your research project. If using PESTLE this will, in addition to those mentioned above, include Legal, and Environmental.
In the event that you are encountering a word limit issue when it comes to the analysis please consider making use of the Appendix/Appendices which can cater for the increase in information. This can then be referred to in-text as (Appendix ... ).
Please remember if you are still to complete the requisite elements, or may even be yet to commence on certain sections, review relevant topic areas in the subject and also review the class forum as there may be relevant and pertinent queries with responses. Post any questions you may have to the forum which has the added benefit of supplying information through response to the class.
Remember also it is possible to build upon the collection of data after commencing analysis, as it becomes evident to the researcher that additional data is needed. This may occur and can be the benefit of this process, draw in requisite data as required if you discover more is necessary. Locate the required data from reliable academic or industry sources, and if there are any deficits re-source as appropriate.
Engagement in the report, and its elements is a developing process, and will be accelerated as you are emerged in the research and formation of the report towards final submission.
Thank you again for supplying the progress reports and for all your contributions to the subject.
Kind regards,
Gerard
Dr Gerard Reed
Global Information Tectinology
Applications of
Global Information
Technology:
Key Issues for
Management
By: Blake Ives
Cox School of Business
Southern Methodist University
Daiias, Texas 75275-0333
Sirkka L. Jarvenpaa
Graduate School of Business
University of Texas at Austin
Austin, Texas 78712-1175
Abstract
Carefully crafted investments in giobai informa-
tion technology offer firms an opportunity to in-
crease control and enhance coordination, whiie
opening access to new global markets and
businesses. But engineering such giobai systems
presents numerous challenges to management.
In this article, we rel ...
We have published a document, "A Global Data Infrastructure for Data Sharing Between Businesses".
This document introduces the current trends toward the implementation of digital management tools that support cross border data sharing between businesses, which will be indispensable for future business transformations and pandemic responses. Today we find ourselves at the confluence of multiple evolving global trends. These include the emergence of new data driven business models, the expansion of B2B platform business, the accelerating pace of digital transformation, the growing expectations for the fulfillment of Sustainable Development Goals (SDGs) and other social needs, the rise of New Glocalism, the growth of stakeholder capitalism, and the Great Reset. In this article, we discuss the challenges of establishing a global data infrastructure for data sharing between businesses as a key ICT infrastructure for the construction of a next generation society, and the efforts that are being made to address these challenges.
Report on strategic rules of Information System for changing the bases of com...Md. Khukan Miah
Achieving advantages requires broad IS management and user dialogue plus imagination. The process is complicated by the fact that many IS products are strategic though the potential benefits are very subjective and not easily verified. Often a strict ROI focus by senior management may turn attention toward narrow, well-defined targets as opposed to broader strategic opportunities that are harder to analyze.
The effect of technology-organization-environment on adoption decision of bi...IJECEIAES
Big data technology (BDT) is being actively adopted by world-leading organizations due to its expected benefits. However, most of the organizations in Thailand are still in the decision or planning stage to adopt BDT. Many challenges exist in encouraging the BDT diffusion in businesses. Thus, this study develops a research model that investigates the determinants of BDT adoption in the Thai context based on the technology-organizationenvironment (TOE) framework and diffusion of innovation (DOI) theory. Data were collected through an online questionnaire. Three hundred IT employees in different organizations in Thailand were used as a sample group. Structural equation modeling (SEM) was conducted to test the hypotheses. The result indicated that the research model was fitted with the empirical data with the statistics: Normed Chi-Square=1.651, GFI=0.895, AFGI=0.863, NFI=0.930, TLI=0.964, CFI=0.971, SRMR=0.0392, and RMSEA=0.046. The research model could, at 52%, explain decision to adopt BDT. Relative advantage, top management support, competitive pressure, and trading partner pressure show significant positive relation with BDT adoption, while security negatively influences BDT adoption.
The document discusses several key points about global e-business and information technology:
1) The internet, intranets, and extranets allow companies to offer goods and services globally, but also present cultural, political, and economic challenges.
2) A company's business drivers, such as global customers or operations, will require capabilities like online transactions and telecommunications to coordinate on a global scale.
3) To compete effectively in global markets, companies must develop IT strategies that align with their business strategy and account for the technical and non-technical challenges of operating internationally.
A Data-driven Maturity Model for Modernized, Automated, and Transformed ITbalejandre
This document presents a research-based maturity model for measuring organizations' progress in IT transformation. The model segments organizations into four levels of maturity based on surveys of 1,000 IT executives about their infrastructure, processes, and relationships. Only a small percentage have achieved the highest levels of modernized infrastructure, automated processes, and business-IT alignment needed for digital transformation. Higher maturity is correlated with improved agility, efficiency, innovation funding, and business outcomes. Adopting modern data center technologies, automated processes, and DevOps practices can help organizations progress to more mature states.
- The Internet and IT have disrupted many companies, forcing some out of business and others to change and innovate to survive. The New York Times is one of these companies.
- To survive, The New York Times chose to deploy their innovation support group as a shared service across business units, partnering with Netflix. IT will help them deploy this shared service solution.
- Boston Scientific chose to tear down barriers preventing product developers from accessing past research, to create new products faster. However, they had to balance openness with security and restricting access to sensitive information.
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docxstilliegeorgiana
Project 3 – Hollywood and IT
· Find 10 incidents of Hollywood portraying IT security incorrectly
· You can use movies or TV episodes
· Write 2-5 paragraphs for each incident. Use supporting citations for each part.
· What has Hollywood portrayed wrong? Describe the scene and what is being shown. Make sure to state whether it is partially wrong or totally fictitious.
· How would you protect/secure against what they show (answers might include install firewall, load Antivirus etc.)
· Use APA formatting for your sources on everything.
· Make sure to put your name on assignment.
Big Data and Social Media
Colgate Palmolive
Agenda Of socail media use
Buisness intellegence and Social media concenpts
Intellegent organization
Data Anaylysis and Data trustworthiness
Conclusion
Buisness intellegence and Social media concenpts
No-Hassle Documentation
Gain Trusted Followers
Spy on Competition
Learn Customer Demographics
Research and Analyze Events
Advertise More Accurately
Intellegent organization
They consistently use (big) data proactively
They know exactly where they want to go: all-round vision
They continuously discuss business matters: alignment
They talk to each other regarding positive and negative performance
They know their customers through and through
They think and work in an agile way
Data Anaylysis and Data trustworthiness
Data completeness and accuracy
Data credibility
Data consistency
Data processing and algorithms
Data Validity
Conclusion
How Colgate benefit from Big Data and Social Media
Social media increases sales and customers
Big data shows popular trends and popular companies
All around they are both beneficial
Big Data can find trends that can benefit you greatly
Criteria
Title Page:
Name, Contact info, title of Presentation
Slide 1
Adenda : Topic you going to cover in order
Slide 2
Discuss how big data, social media concepts and knowledge to successfully create business intellegence (Support your bullets points with data, analysis, charts)
Slide 3
Describe how big data can be used to build an intelligent organization
Slide 4
Discuss the importance of data source trustworthiness and data analysis
Slide 5
Conclusion
Slide 6
Big Data And Business Intelligence
Business Value With Big Data
For business to survive in a competitive environment, organizational change requires improved governance, sponsorship, processes, and controls, in addition to new skill sets and technology all work in harmony to deliver the benefits of big data. See Fig. 13.2
Data science has taken the business world by storm. Every field of study and area of business has been affected as companies realize the value of the incredible quantities of data being generated. But to extract value from those data, one needs to be trained in the proper data science skills. The R programming language has become the de fac to programming language for data science. Its flexibility, power, sophistication, and expressiveness have ma ...
We have published a document, "A Global Data Infrastructure for Data Sharing Between Businesses".
This document introduces the current trends toward the implementation of digital management tools that support cross border data sharing between businesses, which will be indispensable for future business transformations and pandemic responses. Today we find ourselves at the confluence of multiple evolving global trends. These include the emergence of new data driven business models, the expansion of B2B platform business, the accelerating pace of digital transformation, the growing expectations for the fulfillment of Sustainable Development Goals (SDGs) and other social needs, the rise of New Glocalism, the growth of stakeholder capitalism, and the Great Reset. In this article, we discuss the challenges of establishing a global data infrastructure for data sharing between businesses as a key ICT infrastructure for the construction of a next generation society, and the efforts that are being made to address these challenges.
Report on strategic rules of Information System for changing the bases of com...Md. Khukan Miah
Achieving advantages requires broad IS management and user dialogue plus imagination. The process is complicated by the fact that many IS products are strategic though the potential benefits are very subjective and not easily verified. Often a strict ROI focus by senior management may turn attention toward narrow, well-defined targets as opposed to broader strategic opportunities that are harder to analyze.
The effect of technology-organization-environment on adoption decision of bi...IJECEIAES
Big data technology (BDT) is being actively adopted by world-leading organizations due to its expected benefits. However, most of the organizations in Thailand are still in the decision or planning stage to adopt BDT. Many challenges exist in encouraging the BDT diffusion in businesses. Thus, this study develops a research model that investigates the determinants of BDT adoption in the Thai context based on the technology-organizationenvironment (TOE) framework and diffusion of innovation (DOI) theory. Data were collected through an online questionnaire. Three hundred IT employees in different organizations in Thailand were used as a sample group. Structural equation modeling (SEM) was conducted to test the hypotheses. The result indicated that the research model was fitted with the empirical data with the statistics: Normed Chi-Square=1.651, GFI=0.895, AFGI=0.863, NFI=0.930, TLI=0.964, CFI=0.971, SRMR=0.0392, and RMSEA=0.046. The research model could, at 52%, explain decision to adopt BDT. Relative advantage, top management support, competitive pressure, and trading partner pressure show significant positive relation with BDT adoption, while security negatively influences BDT adoption.
The document discusses several key points about global e-business and information technology:
1) The internet, intranets, and extranets allow companies to offer goods and services globally, but also present cultural, political, and economic challenges.
2) A company's business drivers, such as global customers or operations, will require capabilities like online transactions and telecommunications to coordinate on a global scale.
3) To compete effectively in global markets, companies must develop IT strategies that align with their business strategy and account for the technical and non-technical challenges of operating internationally.
A Data-driven Maturity Model for Modernized, Automated, and Transformed ITbalejandre
This document presents a research-based maturity model for measuring organizations' progress in IT transformation. The model segments organizations into four levels of maturity based on surveys of 1,000 IT executives about their infrastructure, processes, and relationships. Only a small percentage have achieved the highest levels of modernized infrastructure, automated processes, and business-IT alignment needed for digital transformation. Higher maturity is correlated with improved agility, efficiency, innovation funding, and business outcomes. Adopting modern data center technologies, automated processes, and DevOps practices can help organizations progress to more mature states.
- The Internet and IT have disrupted many companies, forcing some out of business and others to change and innovate to survive. The New York Times is one of these companies.
- To survive, The New York Times chose to deploy their innovation support group as a shared service across business units, partnering with Netflix. IT will help them deploy this shared service solution.
- Boston Scientific chose to tear down barriers preventing product developers from accessing past research, to create new products faster. However, they had to balance openness with security and restricting access to sensitive information.
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docxstilliegeorgiana
Project 3 – Hollywood and IT
· Find 10 incidents of Hollywood portraying IT security incorrectly
· You can use movies or TV episodes
· Write 2-5 paragraphs for each incident. Use supporting citations for each part.
· What has Hollywood portrayed wrong? Describe the scene and what is being shown. Make sure to state whether it is partially wrong or totally fictitious.
· How would you protect/secure against what they show (answers might include install firewall, load Antivirus etc.)
· Use APA formatting for your sources on everything.
· Make sure to put your name on assignment.
Big Data and Social Media
Colgate Palmolive
Agenda Of socail media use
Buisness intellegence and Social media concenpts
Intellegent organization
Data Anaylysis and Data trustworthiness
Conclusion
Buisness intellegence and Social media concenpts
No-Hassle Documentation
Gain Trusted Followers
Spy on Competition
Learn Customer Demographics
Research and Analyze Events
Advertise More Accurately
Intellegent organization
They consistently use (big) data proactively
They know exactly where they want to go: all-round vision
They continuously discuss business matters: alignment
They talk to each other regarding positive and negative performance
They know their customers through and through
They think and work in an agile way
Data Anaylysis and Data trustworthiness
Data completeness and accuracy
Data credibility
Data consistency
Data processing and algorithms
Data Validity
Conclusion
How Colgate benefit from Big Data and Social Media
Social media increases sales and customers
Big data shows popular trends and popular companies
All around they are both beneficial
Big Data can find trends that can benefit you greatly
Criteria
Title Page:
Name, Contact info, title of Presentation
Slide 1
Adenda : Topic you going to cover in order
Slide 2
Discuss how big data, social media concepts and knowledge to successfully create business intellegence (Support your bullets points with data, analysis, charts)
Slide 3
Describe how big data can be used to build an intelligent organization
Slide 4
Discuss the importance of data source trustworthiness and data analysis
Slide 5
Conclusion
Slide 6
Big Data And Business Intelligence
Business Value With Big Data
For business to survive in a competitive environment, organizational change requires improved governance, sponsorship, processes, and controls, in addition to new skill sets and technology all work in harmony to deliver the benefits of big data. See Fig. 13.2
Data science has taken the business world by storm. Every field of study and area of business has been affected as companies realize the value of the incredible quantities of data being generated. But to extract value from those data, one needs to be trained in the proper data science skills. The R programming language has become the de fac to programming language for data science. Its flexibility, power, sophistication, and expressiveness have ma ...
This report summarizes interviews with 28 business leaders about challenges and opportunities of big data. Key findings include: 1) While there is potential for profits from big data, caution is needed as data does not automatically lead to profits. 2) Different business models exist including data users, suppliers, and facilitators. 3) Practical obstacles like poor data quality and political issues around data sharing must be addressed. 4) To succeed, businesses need a clear business model making data central and a plan to generate value from data.
1) The document examines the implementation of an Enterprise Resource Planning (ERP) system at Rolls-Royce, a large UK manufacturing organization.
2) It provides background on ERP systems and their benefits in integrating business processes and supply chains. ERP implementation requires managing organizational change as well as software installation.
3) The case study analyzes the business, technical, and cultural issues involved in Rolls-Royce's ERP implementation, including timescales and tangible/intangible benefits achieved.
1Running head BIG DATA6BIG DATAMIT 681 MSIT.docxaulasnilda
This document discusses dividend policy and factors that may favor lower dividend payout ratios. It provides an example showing that under certain assumptions, the timing of dividend payouts does not affect stock price. Lower payout ratios may be preferable to avoid immediate tax liability on dividends, reduce new share issuance costs, and comply with debt covenant restrictions on dividends.
1. Information technology plays an important role in supporting organizational strategy and transformation by aligning business and IT strategies. A strategic information system (SIS) helps organizations achieve long-term goals by providing insights into their current situation and future environment.
2. Applications of IT-supported SIS include supporting innovation, improving responsiveness to market changes, increasing collaboration, enhancing customer insights, introducing new business models, and providing competitive advantages such as innovative applications, competitive weapons, cost reductions, and new products.
3. Key strategic issues in implementing SIS are the risks associated with large investments in new technologies, planning challenges, and sustaining competitive advantages as systems are duplicated by competitors.
The document discusses an ICT strategy and the importance of aligning it with business goals and objectives. It provides examples of internal and external factors an organization should consider when developing its ICT strategy, such as legacy systems, information assets, location, technology changes and compliance with regulations. The role of the CIO is also outlined as responsible for writing the ICT strategy and ensuring compliance with relevant legislation.
Technology and innovation are important factors for business competitiveness and future development. Firms must assess their innovative capabilities by evaluating how innovative their products/services and production systems have been, how well their innovation capabilities fit their business strategies, and what innovation capabilities are needed to support long-term strategies. Five factors influence business innovation strategies: resources for innovation, understanding competitors' strategies, understanding relevant technologies, organizational culture supporting entrepreneurship, and strategic management of innovation initiatives. Integrating technology and strategy is dynamic and requires understanding how technologies affect a firm's value chain and competitive advantage.
Here are the key points regarding avoiding the alignment trap in information technology:
- Many IT projects fail due to poor alignment between business and IT strategies and objectives. Alignment refers to the degree to which IT understands and supports the business priorities.
- There are four alignment quadrants companies can fall into:
1) Strategy execution - High alignment and high efficiency where IT is tightly linked to business strategy.
2) Order taker - High alignment but low efficiency. IT simply fulfills requests but lacks strategic perspective.
3) Technology leader - Low alignment but high efficiency. IT drives innovation without business input.
4) Disconnected - Low alignment and low efficiency. IT operates independently with little business value.
Information technology plays a key role in organizational behavior by enabling information capture, storage, manipulation, and distribution. It affects organizational culture, structures, management processes, work, and the workplace. Specifically, IT allows for more open information sharing, flatter structures, improved decision making, changing work nature, and flexible work arrangements. Its impact depends on factors like new products/services, costs, adoption timelines, risks, demand expectations, and technical limitations. Overall, IT improves quality, differentiation, efficiency, and global operations while reducing costs through automation. It provides a competitive advantage and is increasingly important due to competition, globalization, organizational changes, and advancing technology.
The document discusses IT best practices for mergers and acquisitions (M&A) in the communications services provider (CSP) industry. It recommends involving IT early in the M&A decision process to better estimate integration costs and timelines. It also suggests assessing cultural fit between merging IT departments. During planning, companies should make an inventory of merging technologies, processes, and people, and document existing IT systems. For execution, the document advises following an M&A roadmap in phases and avoiding incomplete decommissioning of redundant assets.
IRJET - Big Data Analysis its ChallengesIRJET Journal
This document discusses big data analysis and its challenges. It begins by defining big data and business analytics, noting that large amounts of data are now being generated daily that require new techniques to analyze. It describes some of the key challenges in handling big data, including issues around storage, analysis, and reporting on large, complex datasets. The document then discusses the four Vs of big data - volume, variety, velocity, and veracity. It concludes by noting limitations in current research and opportunities for future work to better understand the impacts of big data and business analytics on competitive advantages.
The document summarizes the findings of a study on why two-thirds of enterprise architecture projects fail. It found that while organizations understand the strategic importance of EA, many projects fail due to a lack of clear objectives, governance, and business involvement. Specifically, few projects fully integrate EA with business strategy and processes or comply with governance agreements. The study provides recommendations for ensuring EA success, including setting clear enterprise-wide objectives, establishing governance and compliance, and involving business stakeholders in tool selection and planning.
This document discusses strategic information systems planning (SISP). It reviews several common SISP methodologies: value chain analysis, critical success factor analysis, and business systems planning. These methodologies are aimed at aligning information systems with business goals or identifying new uses of technology. However, the document notes that existing approaches treat planning as separate from development and management, and do not directly connect systems to enterprise resources. An integrated approach linking planning, development, and management through shared enterprise resources is proposed to improve SISP effectiveness.
The document provides an overview of Enterprise Resource Planning (ERP) systems and their implementation. Some key points:
1) ERP systems aim to integrate core business functions like finance, manufacturing, supply chain management into a single system. This provides benefits like centralized data and streamlined processes but also challenges integrating different modules.
2) Major ERP vendors include SAP, Oracle, and Microsoft. Implementation can be expensive and time-consuming due to customization needs but provides standardized processes.
3) Benefits of ERP include reduced costs, automated processes, and remote access. Risks include difficulty customizing systems, loss of competitive advantages from process changes, and security risks from a single centralized database.
The document discusses big data challenges faced by organizations. It identifies several key challenges: heterogeneity and incompleteness of data, issues of scale as data volumes increase, timeliness in processing large datasets, privacy concerns, and the need for human collaboration in analyzing data. The document describes surveying various organizations in Pakistan, including educational institutions, telecommunications companies, hospitals, and electrical utilities, to understand the big data problems they face. Common challenges included data errors, missing or incomplete data, lack of data management tools, and issues integrating different data sources. The survey found that while some organizations used big data tools, many educational institutions in particular did not, limiting their ability to effectively manage and analyze their large and growing datasets.
This document discusses the importance of having a robust technical support strategy to mitigate the risks and costs of downtime. It begins by outlining how downtime can negatively impact organizations through a "ripple effect" as business processes have become increasingly dependent on integrated IT systems. It then presents IBM's framework for a comprehensive technical support strategy covering people, processes, and technology. The document advocates conducting an assessment of an organization's current support maturity level and developing a roadmap to prioritize improvements. Finally, it argues that a managed support solution through a third party can help optimize support more cost-effectively across an organization's entire IT environment.
This document discusses the importance of having a robust IT technical support strategy. As businesses become more reliant on integrated IT systems, downtime can have far-reaching impacts across an organization. The costs of downtime have increased significantly in recent years. The document recommends taking a holistic view of technical support using a framework that considers people, processes, and technology. It also advises conducting an assessment of the current support structure to identify areas for improvement and prioritization. The overall message is that proactively managing technical support can help businesses optimize costs and mitigate risks from downtime in today's complex IT environments.
EMC Isilon: A Scalable Storage Platform for Big DataEMC
This white paper provides insights into EMC Isilon's shared storage approach, covering a wide range of desired characteristics including increased efficiency and reduced total cost.
Diffusion of Big Data and Analytics in Developing Countriestheijes
This document provides an overview of big data and analytics in developing countries. It discusses the increasing volume, velocity, and variety of digital data being produced globally each year, including in developing nations. The document then examines the potential for big data innovation diffusion in developing countries using Rogers' diffusion of innovations theory framework. Some key challenges to big data adoption in developing countries include lack of infrastructure, skills, and resources. However, the theory suggests concepts like communication channels and the innovation-decision process can help increase adoption rates over time within social systems. The study aims to inform policymakers on maximizing big data potential in developing nations.
Information systems involve organizational, management, and technology dimensions. Computer specialists understand technology but may lack business knowledge, so they should work as part of an interdisciplinary team. Information systems are essential in business today due to trends like globalization, the rise of knowledge economies, the transformation of business models, and the emergence of digital firms. An information system includes interrelated components for collecting, processing, storing, and sharing information to support decision making. It differs from a computer or program, which are technological components of an information system. Data becomes useful information after being processed into meaningful form.
1. The Incident Command System (ICS) is a tool forA. Co.docxstilliegeorgiana
1. The Incident Command System (ICS) is a tool for:
A. Command, control, and coordination at an incident
B. Interagency responses only
C. Multi-jurisdictional responses only
D. Responses involving first-response personnel only
2. ICS can be used to manage all types of incidents.
A. True
B. False
3. Federal law requires that ICS be used for all natural disasters.
A. True
B. False
4.The ICS General Staff includes:
A. Branch, Division, Group, and Unit managers
B. All managers of operational resources.
C. Planning, Operations, Logistics, and Finance/Administration Section Chiefs
D. Incident Commander and the Information, Safety, and Liaison Officers
5. All incidents, regardless of size, will have an Incident Commander.
A. True
B. False
6. In an ICS environment, the optimum span of control is:
A. Two (2) resources
B. Five (5) resources
C. Eight (8) resources
D. Ten (10) resources
7. Which section is responsible for providing incident facilities?
A. Planning
B. Operations
C. Logistics
D. Finance/Administration
8. Which section is responsible for documenting the status of resources, incident response, and developing the IAP?
A. Planning
B. Operations
C. Logistics
D. Finance/Administration
9. The Incident Commander is responsible for all the following EXCEPT:
A. Protecting life and property
B. Controlling resources assigned to the incident
C. Maintaining accountability
D. Coordinating the community-wide response
10. Given what you know about your agency, your job and you capabilities, where would you most likely be assigned in an ICS structure? To whom would you report? Be sure to include what your job is or would be during an event.
.
1. The Thirteenth Amendment effectively brought an end to slaver.docxstilliegeorgiana
1. The Thirteenth Amendment effectively brought an end to slavery in the United States. Lincoln had issued the Emancipation Proclamation over 3 years earlier. Why, then, was the Thirteenth Amendment issued? Was it necessary? How come?
2. The Fourteenth Amendment settled the question of who is a citizen of the United States. (anyone naturalized or born here). Why are Indians excluded?
3. Persons who are citizens may not be denied the right to vote according to the Fifteenth Amendment. The Civil Rights crises of the 1960s, and the work of Martin Luther King (and many others) sought, among other things, to assure that the right to vote was available to all. Why? The Fifteenth Amendment had been passed almost a hundred years earlier. How could persons be denied the ballot?
4. How could Andrew Johnson, Lincoln's successor, veto the Civil Rights Bill in 1866 when the 13th Amendment had already been passed in 1865? What issues did he cite to justify his veto? (Hint: look at the Johnson primary source)
5. The 14th Amendment. How does Foner explain the relationship between the Federal and the State as a result of the 14th Amendment?
https://util.wwnorton.com/jwplayer?type=video&msrc=/wwnorton.college.public/history/give/reconstruction-johnson.mp4&csrc=/wwnorton.college.public/history/give/reconstruction-johnson.vtt&cp=1
https://util.wwnorton.com/jwplayer?type=video&msrc=/wwnorton.college.public/history/give/14th-amendment.mp4&csrc=/wwnorton.college.public/history/give/14th-amendment.vtt&cp=1
https://util.wwnorton.com/jwplayer?type=video&msrc=/wwnorton.college.public/history/give/reconstruction-amendments-2.mp4&csrc=/wwnorton.college.public/history/give/reconstruction-amendments-2.vtt&cp=1
.
More Related Content
Similar to Progress Reporting 3 (Week 5)Greetings everyone,Thank you fo.docx
This report summarizes interviews with 28 business leaders about challenges and opportunities of big data. Key findings include: 1) While there is potential for profits from big data, caution is needed as data does not automatically lead to profits. 2) Different business models exist including data users, suppliers, and facilitators. 3) Practical obstacles like poor data quality and political issues around data sharing must be addressed. 4) To succeed, businesses need a clear business model making data central and a plan to generate value from data.
1) The document examines the implementation of an Enterprise Resource Planning (ERP) system at Rolls-Royce, a large UK manufacturing organization.
2) It provides background on ERP systems and their benefits in integrating business processes and supply chains. ERP implementation requires managing organizational change as well as software installation.
3) The case study analyzes the business, technical, and cultural issues involved in Rolls-Royce's ERP implementation, including timescales and tangible/intangible benefits achieved.
1Running head BIG DATA6BIG DATAMIT 681 MSIT.docxaulasnilda
This document discusses dividend policy and factors that may favor lower dividend payout ratios. It provides an example showing that under certain assumptions, the timing of dividend payouts does not affect stock price. Lower payout ratios may be preferable to avoid immediate tax liability on dividends, reduce new share issuance costs, and comply with debt covenant restrictions on dividends.
1. Information technology plays an important role in supporting organizational strategy and transformation by aligning business and IT strategies. A strategic information system (SIS) helps organizations achieve long-term goals by providing insights into their current situation and future environment.
2. Applications of IT-supported SIS include supporting innovation, improving responsiveness to market changes, increasing collaboration, enhancing customer insights, introducing new business models, and providing competitive advantages such as innovative applications, competitive weapons, cost reductions, and new products.
3. Key strategic issues in implementing SIS are the risks associated with large investments in new technologies, planning challenges, and sustaining competitive advantages as systems are duplicated by competitors.
The document discusses an ICT strategy and the importance of aligning it with business goals and objectives. It provides examples of internal and external factors an organization should consider when developing its ICT strategy, such as legacy systems, information assets, location, technology changes and compliance with regulations. The role of the CIO is also outlined as responsible for writing the ICT strategy and ensuring compliance with relevant legislation.
Technology and innovation are important factors for business competitiveness and future development. Firms must assess their innovative capabilities by evaluating how innovative their products/services and production systems have been, how well their innovation capabilities fit their business strategies, and what innovation capabilities are needed to support long-term strategies. Five factors influence business innovation strategies: resources for innovation, understanding competitors' strategies, understanding relevant technologies, organizational culture supporting entrepreneurship, and strategic management of innovation initiatives. Integrating technology and strategy is dynamic and requires understanding how technologies affect a firm's value chain and competitive advantage.
Here are the key points regarding avoiding the alignment trap in information technology:
- Many IT projects fail due to poor alignment between business and IT strategies and objectives. Alignment refers to the degree to which IT understands and supports the business priorities.
- There are four alignment quadrants companies can fall into:
1) Strategy execution - High alignment and high efficiency where IT is tightly linked to business strategy.
2) Order taker - High alignment but low efficiency. IT simply fulfills requests but lacks strategic perspective.
3) Technology leader - Low alignment but high efficiency. IT drives innovation without business input.
4) Disconnected - Low alignment and low efficiency. IT operates independently with little business value.
Information technology plays a key role in organizational behavior by enabling information capture, storage, manipulation, and distribution. It affects organizational culture, structures, management processes, work, and the workplace. Specifically, IT allows for more open information sharing, flatter structures, improved decision making, changing work nature, and flexible work arrangements. Its impact depends on factors like new products/services, costs, adoption timelines, risks, demand expectations, and technical limitations. Overall, IT improves quality, differentiation, efficiency, and global operations while reducing costs through automation. It provides a competitive advantage and is increasingly important due to competition, globalization, organizational changes, and advancing technology.
The document discusses IT best practices for mergers and acquisitions (M&A) in the communications services provider (CSP) industry. It recommends involving IT early in the M&A decision process to better estimate integration costs and timelines. It also suggests assessing cultural fit between merging IT departments. During planning, companies should make an inventory of merging technologies, processes, and people, and document existing IT systems. For execution, the document advises following an M&A roadmap in phases and avoiding incomplete decommissioning of redundant assets.
IRJET - Big Data Analysis its ChallengesIRJET Journal
This document discusses big data analysis and its challenges. It begins by defining big data and business analytics, noting that large amounts of data are now being generated daily that require new techniques to analyze. It describes some of the key challenges in handling big data, including issues around storage, analysis, and reporting on large, complex datasets. The document then discusses the four Vs of big data - volume, variety, velocity, and veracity. It concludes by noting limitations in current research and opportunities for future work to better understand the impacts of big data and business analytics on competitive advantages.
The document summarizes the findings of a study on why two-thirds of enterprise architecture projects fail. It found that while organizations understand the strategic importance of EA, many projects fail due to a lack of clear objectives, governance, and business involvement. Specifically, few projects fully integrate EA with business strategy and processes or comply with governance agreements. The study provides recommendations for ensuring EA success, including setting clear enterprise-wide objectives, establishing governance and compliance, and involving business stakeholders in tool selection and planning.
This document discusses strategic information systems planning (SISP). It reviews several common SISP methodologies: value chain analysis, critical success factor analysis, and business systems planning. These methodologies are aimed at aligning information systems with business goals or identifying new uses of technology. However, the document notes that existing approaches treat planning as separate from development and management, and do not directly connect systems to enterprise resources. An integrated approach linking planning, development, and management through shared enterprise resources is proposed to improve SISP effectiveness.
The document provides an overview of Enterprise Resource Planning (ERP) systems and their implementation. Some key points:
1) ERP systems aim to integrate core business functions like finance, manufacturing, supply chain management into a single system. This provides benefits like centralized data and streamlined processes but also challenges integrating different modules.
2) Major ERP vendors include SAP, Oracle, and Microsoft. Implementation can be expensive and time-consuming due to customization needs but provides standardized processes.
3) Benefits of ERP include reduced costs, automated processes, and remote access. Risks include difficulty customizing systems, loss of competitive advantages from process changes, and security risks from a single centralized database.
The document discusses big data challenges faced by organizations. It identifies several key challenges: heterogeneity and incompleteness of data, issues of scale as data volumes increase, timeliness in processing large datasets, privacy concerns, and the need for human collaboration in analyzing data. The document describes surveying various organizations in Pakistan, including educational institutions, telecommunications companies, hospitals, and electrical utilities, to understand the big data problems they face. Common challenges included data errors, missing or incomplete data, lack of data management tools, and issues integrating different data sources. The survey found that while some organizations used big data tools, many educational institutions in particular did not, limiting their ability to effectively manage and analyze their large and growing datasets.
This document discusses the importance of having a robust technical support strategy to mitigate the risks and costs of downtime. It begins by outlining how downtime can negatively impact organizations through a "ripple effect" as business processes have become increasingly dependent on integrated IT systems. It then presents IBM's framework for a comprehensive technical support strategy covering people, processes, and technology. The document advocates conducting an assessment of an organization's current support maturity level and developing a roadmap to prioritize improvements. Finally, it argues that a managed support solution through a third party can help optimize support more cost-effectively across an organization's entire IT environment.
This document discusses the importance of having a robust IT technical support strategy. As businesses become more reliant on integrated IT systems, downtime can have far-reaching impacts across an organization. The costs of downtime have increased significantly in recent years. The document recommends taking a holistic view of technical support using a framework that considers people, processes, and technology. It also advises conducting an assessment of the current support structure to identify areas for improvement and prioritization. The overall message is that proactively managing technical support can help businesses optimize costs and mitigate risks from downtime in today's complex IT environments.
EMC Isilon: A Scalable Storage Platform for Big DataEMC
This white paper provides insights into EMC Isilon's shared storage approach, covering a wide range of desired characteristics including increased efficiency and reduced total cost.
Diffusion of Big Data and Analytics in Developing Countriestheijes
This document provides an overview of big data and analytics in developing countries. It discusses the increasing volume, velocity, and variety of digital data being produced globally each year, including in developing nations. The document then examines the potential for big data innovation diffusion in developing countries using Rogers' diffusion of innovations theory framework. Some key challenges to big data adoption in developing countries include lack of infrastructure, skills, and resources. However, the theory suggests concepts like communication channels and the innovation-decision process can help increase adoption rates over time within social systems. The study aims to inform policymakers on maximizing big data potential in developing nations.
Information systems involve organizational, management, and technology dimensions. Computer specialists understand technology but may lack business knowledge, so they should work as part of an interdisciplinary team. Information systems are essential in business today due to trends like globalization, the rise of knowledge economies, the transformation of business models, and the emergence of digital firms. An information system includes interrelated components for collecting, processing, storing, and sharing information to support decision making. It differs from a computer or program, which are technological components of an information system. Data becomes useful information after being processed into meaningful form.
Similar to Progress Reporting 3 (Week 5)Greetings everyone,Thank you fo.docx (20)
1. The Incident Command System (ICS) is a tool forA. Co.docxstilliegeorgiana
1. The Incident Command System (ICS) is a tool for:
A. Command, control, and coordination at an incident
B. Interagency responses only
C. Multi-jurisdictional responses only
D. Responses involving first-response personnel only
2. ICS can be used to manage all types of incidents.
A. True
B. False
3. Federal law requires that ICS be used for all natural disasters.
A. True
B. False
4.The ICS General Staff includes:
A. Branch, Division, Group, and Unit managers
B. All managers of operational resources.
C. Planning, Operations, Logistics, and Finance/Administration Section Chiefs
D. Incident Commander and the Information, Safety, and Liaison Officers
5. All incidents, regardless of size, will have an Incident Commander.
A. True
B. False
6. In an ICS environment, the optimum span of control is:
A. Two (2) resources
B. Five (5) resources
C. Eight (8) resources
D. Ten (10) resources
7. Which section is responsible for providing incident facilities?
A. Planning
B. Operations
C. Logistics
D. Finance/Administration
8. Which section is responsible for documenting the status of resources, incident response, and developing the IAP?
A. Planning
B. Operations
C. Logistics
D. Finance/Administration
9. The Incident Commander is responsible for all the following EXCEPT:
A. Protecting life and property
B. Controlling resources assigned to the incident
C. Maintaining accountability
D. Coordinating the community-wide response
10. Given what you know about your agency, your job and you capabilities, where would you most likely be assigned in an ICS structure? To whom would you report? Be sure to include what your job is or would be during an event.
.
1. The Thirteenth Amendment effectively brought an end to slaver.docxstilliegeorgiana
1. The Thirteenth Amendment effectively brought an end to slavery in the United States. Lincoln had issued the Emancipation Proclamation over 3 years earlier. Why, then, was the Thirteenth Amendment issued? Was it necessary? How come?
2. The Fourteenth Amendment settled the question of who is a citizen of the United States. (anyone naturalized or born here). Why are Indians excluded?
3. Persons who are citizens may not be denied the right to vote according to the Fifteenth Amendment. The Civil Rights crises of the 1960s, and the work of Martin Luther King (and many others) sought, among other things, to assure that the right to vote was available to all. Why? The Fifteenth Amendment had been passed almost a hundred years earlier. How could persons be denied the ballot?
4. How could Andrew Johnson, Lincoln's successor, veto the Civil Rights Bill in 1866 when the 13th Amendment had already been passed in 1865? What issues did he cite to justify his veto? (Hint: look at the Johnson primary source)
5. The 14th Amendment. How does Foner explain the relationship between the Federal and the State as a result of the 14th Amendment?
https://util.wwnorton.com/jwplayer?type=video&msrc=/wwnorton.college.public/history/give/reconstruction-johnson.mp4&csrc=/wwnorton.college.public/history/give/reconstruction-johnson.vtt&cp=1
https://util.wwnorton.com/jwplayer?type=video&msrc=/wwnorton.college.public/history/give/14th-amendment.mp4&csrc=/wwnorton.college.public/history/give/14th-amendment.vtt&cp=1
https://util.wwnorton.com/jwplayer?type=video&msrc=/wwnorton.college.public/history/give/reconstruction-amendments-2.mp4&csrc=/wwnorton.college.public/history/give/reconstruction-amendments-2.vtt&cp=1
.
1. The Thirteenth Amendment effectively brought an end to slavery in.docxstilliegeorgiana
1. The Thirteenth Amendment effectively brought an end to slavery in the United States. Lincoln had issued the Emancipation Proclamation over 3 years earlier. Why, then, was the Thirteenth Amendment issued? Was it necessary? How come?
2. The Fourteenth Amendment settled the question of who is a citizen of the United States. (anyone naturalized or born here). Why are Indians excluded?
3. Persons who are citizens may not be denied the right to vote according to the Fifteenth Amendment. The Civil Rights crises of the 1960s, and the work of Martin Luther King (and many others) sought, among other things, to assure that the right to vote was available to all. Why? The Fifteenth Amendment had been passed almost a hundred years earlier. How could persons be denied the ballot?
4. How could Andrew Johnson, Lincoln's successor, veto the Civil Rights Bill in 1866 when the 13th Amendment had already been passed in 1865? What issues did he cite to justify his veto? (Hint: look at the Johnson primary source)
5. The 14th Amendment. How does Foner explain the relationship between the Federal and the State as a result of the 14th Amendment?
https://util.wwnorton.com/jwplayer?type=video&msrc=/wwnorton.college.public/history/give/reconstruction-johnson.mp4&csrc=/wwnorton.college.public/history/give/reconstruction-johnson.vtt&cp=1
https://util.wwnorton.com/jwplayer?type=video&msrc=/wwnorton.college.public/history/give/14th-amendment.mp4&csrc=/wwnorton.college.public/history/give/14th-amendment.vtt&cp=1
https://util.wwnorton.com/jwplayer?type=video&msrc=/wwnorton.college.public/history/give/reconstruction-amendments-2.mp4&csrc=/wwnorton.college.public/history/give/reconstruction-amendments-2.vtt&cp=1
.
1. The Fight for a True Democracyhttpswww.nytimes.com201.docxstilliegeorgiana
1. The Fight for a True Democracy
https://www.nytimes.com/2019/08/23/podcasts/1619-slavery-anniversary.html
(Follow the link to the podcast)
Directions:
Students will listen to this podcast and write 3 paragraphs about it. One paragraph should summarize the podcast episode, the second paragraph should discuss its significance in U.S. History, and the last paragraph should explain what the student thought about the podcast.
.
1. The article for week 8 described hip hop as a weapon. This weeks.docxstilliegeorgiana
1. The article for week 8 described hip hop as a weapon. This week's reading makes several references to hip hop and spirituality? Can hip hop be described as a spiritual movement? Why or why not?
2. In the movie, "I Love Hip Hop in Morocco" on of the rappers repeatedly used the "N" word. Do you agree with his use of the "N" word for Moroccans? How did he justify its use?
.
1. The Hatch Act defines prohibited activities of public employees. .docxstilliegeorgiana
1. The Hatch Act defines prohibited activities of public employees. Analyze the significance of these prohibitions with regard to an individual’s political actions. Provide a rationale for your response.
2. Analyze the key ethical challenges of privatization. Take a position on whether the private sector should be responsible for program outcomes of a public program or service. Provide a rationale for your response
.
1. The Case for Reparations” by Ta-Nehisi Coates (604-19) in Rere.docxstilliegeorgiana
1. “The Case for Reparations” by Ta-Nehisi Coates (604-19) in Rereading America
2. “Choosing a School for My Daughter in a Segregated City” (152) by Nikole Hannah-Jones3. “From Social Class and the Hidden Curriculum of Work” (136) by Jean Anyon
4. John Taylor Gatto's "Against School" (114) in Rereading America
How to Do Extra Credit: 1. 5 Paged Essay-Must Be Singled Spaced.
For 100 points do extra credit where you review a film, video, music video, or lecture or book that reflects the discussions in class. Write a paper on themes presented in the class reflected in one of those mediums. Consider the ideas about culture. Observe how culture and condition were presented. Think about what values were being preserved or dismantled. Then, write in third person, what was learned. The essay is in third person; don’t write you, we, our us, or me. It is not considered academic.
Question: What are the themes in the event that link to the course, and how do those themes represent social problems or ways to resolve those problems?
1st Paragraph 100 POINTS FOR ESSAY
Introduction: Write summary of the event, lecture, music video, or song. (5 sentences)
Thesis: Answer the questions above. (1-2 sentences)
2nd Paragraph
Point: Write what is the importance of the theme. (1-2 sentences)
Illustration A. Summary (3 sentences)
Illustration B. Quotation (1-2 lines)
Explanation:
A. Explain the importance of the quote (2 sentences)
B. Explain how the importance is linked to Anzaldua (2 sentences)
3rd Paragraph
Point: Write what is the importance of the theme. (1-2 sentences)
Illustration A. Summary (3 sentences)
Illustration B. Quotation (1-2 lines)
Explanation:
A. Explain the importance of the quote (2 sentences)
B. Explain how the importance is linked Anzaldua (2 sentences)
4th Paragraph
Point: Write what is the importance of the theme. (1-2 sentences)
Illustration A. Summary (3 sentences)
Illustration B. Quotation (1-2 lines)
Explanation:
A. Explain the importance of the quote (2 sentences)
B. Explain how the importance is linked to Anzaldua (2 sentences)
5th Conclusion: Write 3 sentences on what you learned you didn't know before. Write in third person.
.
1. Some people say that chatbots are inferior for chatting.Others di.docxstilliegeorgiana
This document contains 6 prompts for short essays on topics related to chatbots. The prompts cover debates about chatbot capabilities, financial benefits of chatbots, IBM Watson's goal of reaching 1 billion people by 2018, comparing chatbots on Facebook and WeChat, researching the role of chatbots in helping dementia patients, and how the Singapore government is working with Microsoft to develop chatbots for e-government services. Responses should be in APA format with 2 references and be 2 pages long.
1. Some people say that chatbots are inferior for chatting.Other.docxstilliegeorgiana
1. Some people say that chatbots are inferior for chatting.Others disagree. Discuss.
2. Discuss the financial benefits of chatbots.
3. Discuss how IBM Watson will reach 1 billion people by 2018 and what the implications of that are.
4. Compare the chatbots of Facebook and WeChat. Which has more functionalities?
5. Research the role of chatbots in helping patients with dementia
6. Microsoft partners with the government of Singapore to develop chatbots for e-services. Find out how this is done.
APA format with 2 references.
2 pages
.
1. Some people say that chatbots are inferior for chatting. Others d.docxstilliegeorgiana
1. Some people say that chatbots are inferior for chatting. Others disagree. Discuss.
2. Discuss the financial benefits of chatbots.
3. Discuss how IBM Watson will reach 1 billion people by 2018 and what the implications of that are.
4. Compare the chatbots of Facebook and WeChat. Which has more functionalities?
5. Research the role of chatbots in helping patients with dementia.
6.Microsoft partners with the government of Singapore to develop chatbots for e-services. Find out how this is done.
Note: Each question must be answered in 6-7 ines and refernces must be APA cited
.
1. Tell us about yourself and your personal journey that has to .docxstilliegeorgiana
1. Tell us about yourself and your personal journey that has to lead you to the University of the ABC. (Currently, I’m pursuing my masters in IT and next applying for Ph.D. In IT) in same ABC university
2. What are your research interests in the area of information technology? How did you become interested in this area of research?
3. What unique qualities do you think you have that will help you in being successful in this program? (Ph.D. IT Program)
4. How can obtaining a doctorate impact your contribution to the practices of information technology? Where do you see yourself after obtaining a doctorate from ABC?
.
1. Tell us what characteristics of Loma Linda University are particu.docxstilliegeorgiana
1. Tell us what characteristics of Loma Linda University are particularly attractive and meaningful to you and why you have chosen to apply for advanced education.
(500 words)
2.
LLU believes deeply in integrating spiritual values into the educational experience. As a result, religion courses and chapel attendance are part of the curriculum. Tell us why you believe such a faith-based education would be of special benefit to you. (500 words)
3.
Tell us the desirable qualities that you see in yourself that you believe would aid us in considering your application. (1000 words)
4. Discuss how your spiritual origins, development, and experience have influenced and been integrated into your daily life. (1000 words)
.
1. Tell us about yourself and your personal journey that has lea.docxstilliegeorgiana
1. Tell us about yourself and your personal journey that has lead you to University of the Cumberlands.
2. What are your research interests in the area of information technology? How did you become interested in this area of research?
3. What is your current job/career and how will this program impact your career growth?
4. What unique qualities do you think you have that will help you in being successful in this program?
5. How can obtaining a doctorate impact your contribution to the practices of information technology? Where do you see yourself after obtaining a doctorate from UC?
.
1. The Research paper will come in five parts. The instructions are.docxstilliegeorgiana
1. The Research paper will come in five parts. The instructions are:
RESEARCH PAPER TOPIC
Impact of Women in Missions History
o
Part 2:
Refined topic, edited abstract, outline, and ten sources - Students will incorporate any changes to topic, outline the paper, write questions to be answered by the research, and submit ten sources. Submit Part 2 by 11:59 p.m. (ET) on Sunday of Module/Week 3.
Note:
Some will need to limit their topic. Others will need to expand their topic. This process should begin this week and continue until the final project is submitted.
DUE SUNDAY, MAY 31ST
o
Part 3:
Introduction and first five pages - Students will submit the introduction and first five pages of the research paper. Submit Part 3 by 11:59 p.m. (ET) on Sunday of Module/Week 4.
DUE FRIDAY, JUNE 5TH
o
Part 4:
Introduction and first ten pages - Students will submit introduction and first ten pages, incorporating changes made to initial submission. Submit Part 4 by 11:59 p.m. (ET) on Sunday of Module/Week 5.
DUE FRIDAY, JUNE 12TH
o
Part 5:
Complete research paper - Students will submit the complete research paper. The paper will be 5000-6000 words in the body of the paper, with a minimum of ten academic resources cited. Submit Part 5 by 11:59 p.m. (ET) on Sunday of Module/Week 7
DUE FRIDAY, JUNE 19TH
.
1. The minutiae points located on a fingerprint will help determine .docxstilliegeorgiana
1. The minutiae points located on a fingerprint will help determine the _________________ of a fingerprint since it has been empirically demonstrated that no two fingerprints are alike.
2. A fingerprint will remain ______________ during an individual's lifetime.
3. The epidermis is the outer layer of the skin, while the ___________ is the inner layer of the skin.
4. The ____________ is formed by ridges entering from one side of the print, rising and falling, and exiting on the opposite side (like a wave).
5. Level 2 includes locating and comparing _________________
.
1. The initial post is to be posted first and have 300-500 words.docxstilliegeorgiana
1. The initial post is to be posted first and have 300-500 words
· The original post is substantive, showing depth of knowledge on the topic and requires 2 references. References are from LDRS 300 course text or readings.
· Substantive replies occur under two or more different threads, other than that belonging to you.
· Response posts to peers' original postings are respectful, show clear synthesis and evaluation of the content read, and provides depth, breath, or new insight to the topic.
· Be clearly written and contain no APA/spelling/grammatical errors
Use
APA Citations for all your sources and include an APA References list. (No Title Page, or other APA formatting is required)
Spelling and Grammar is important.
Discussion Question: Servant Leadership in a movie, book, or drama film you have enjoyed.
Based on our readings from
Lead Like Jesus
(Blanchard, Hodges, & Hendry, 2016),
Jesus on Leadership (Wilkes, 1998)
and thus far in the lectures of LDRS 300;
A Servant Leader models Jesus by having the following leadership traits
:
1. Followership.
2. Greatness in Service.
3. Takes Risks.
4. Shares Responsibility and Authority.
5. Practices
one of
the Being Habits or Doing Habits.
6. Embodies the Vision, Mission, and Values of the group.
7. Is a Performance Coach.
8. Displays Lessons Learned from The Work of a Carpenter.
Choose a character from a movie and discuss the following two questions.
1.
How did the character display TWO (2) traits of a Servant Leader like Jesus from the list above?
1.
Give
2 examples from the movie to support your position.
2. H
ow would you describe the EGO of this character in terms of the two ways EGO is discussed in this class? (
Edging God Out
Verses
Exalting God Only
)
1.
Give at least 2 examples from the movie to support your position.
.
1. The key elements of supplier measurement are quality, delivery, a.docxstilliegeorgiana
1. The key elements of supplier measurement are quality, delivery, and price. On the surface this appears to be a simple matter, but what are the complicating factors?
2. David Atkinson, the founder and Managing Director of Four Pillars, a management consulting and training company, states that “supplier relationship management is . . . process-focused. It’s a lot more about how the organization systematically plans, than it is about an ’interpersonal’ skill set of the procurement person or relationship manager.” Do you agree or disagree with this statement?
3. Supplier performance measurement is an essential lever for successful supplier management that encompasses both pre- and post-contract management. From this vantage point, how would you distinguish the focuses of supplier performance measurement undertaken pre-contract stage versus post-contract stage?
.
1. Search the Internet and locate an article that relates to the top.docxstilliegeorgiana
1. Search the Internet and locate an article that relates to the topic of HACKING and summarize the reading in your own words. Your summary should be 2-3 paragraphs in length and uploaded as a TEXT DOCUMENT.
2. Do you feel the benefits of cloud computing are worth the threats and vulnerabilities? Have we arrived at a point where we can trust external agencies to secure our most precious data? Please explain your answer.
3. In a few short paragraphs, explain which cloud services you use (Google, Amazon, iCloud, Verizon, Microsoft One, Dropbox, etc) and what type of information you store (docs, photos, music, other files?). How much space do you have and what does this cost per month?
.
1. Text mining – Text mining or text data mining is a process to e.docxstilliegeorgiana
1. Text mining – Text mining or text data mining is a process to extract high-quality information from the text. It is done through patterns and trends devised using statistical pattern learning. Firstly, the input data is structured. After structuring, patterns are derived from this structured data and finally, the output is evaluated and interpreted. The main applications of text mining include competitive intelligence, E-Discovery, National Security, and social media monitoring. It is a trending topic for the thesis in data mining.
Some research needs
Problem definition – In the first phase problem definition is listed i.e. business aims and objectives are determined taking into consideration certain factors like the current background and future prospective.
Data exploration – Required data is collected and explored using various statistical methods along with identification of underlying problems.
Data preparation – The data is prepared for modeling by cleansing and formatting the raw data in the desired way. The meaning of data is not changed while preparing.
Modeling – In this phase the data model is created by applying certain mathematical functions and modeling techniques. After the model is created it goes through validation and verification.
Evaluation – After the model is created, it is evaluated by a team of experts to check whether it satisfies business objectives or not.
Deployment – After evaluation, the model is deployed and further plans are made for its maintenance. A properly organized report is prepared with the summary of the work done.
Research paper Policy
· APA format
. https://apastyle.apa.org/
. https://owl.purdue.edu/owl/research_and_citation/apa_style/apa_formatting_and_style_guide/general_format.html
· Min number of pages are 15 pages
· Must have
. Contents with page numbers
. Abstract
. Introduction
. The problem
4. Are there any sub-problems?
4. Is there any issue need to be present concerning the problem?
. The solutions
5. Steps of the solutions
. Compare the solution to other solution
. Any suggestion to improve the solution
. Conclusion
. References
· Missing one of the above will result -5/30 of the research paper
· Paper does not stick to the APA will result in 0 in the research paper
Spring 2020 Name: ______________________________
MATH 175 – Test 2 (Show Your Work )
7. Given
5
cos2
18
q
=-
and
180270
q
<<
oo
, find values of
sin
q
and
cos
q
.
8. Verify that each of the following is a trigonometric identity.
22
1sin
sec2sectantan
1sin
q
qqqq
q
-
=-+
+
9. Give the exact value of
4
cos2arctan
3
æö
ç÷
èø
without using a calculator.
10. Solve
2cos2cos2
qq
=
for all exact solutions in degrees.
PAGE
1
_1234567891.unknown
_1234567893.unknown
_1234567895.unknown
_1234567896.unknown
_1234567894.unknown
_1234567892.unknown
_1234567890.unknown
Information Systems for Business and Beyond (2019)
Information System.
1. Students need to review 3 different social media platforms that a.docxstilliegeorgiana
1. Students need to review 3 different social media platforms that are not mainstream.
a. TikTok
b. Lasso
c. Vero
d. Steemit
e. Caffeine
f. Houseparty
g. Amazon Spark
h. Anchor
i. Facebook for Creators
j. Foursquare Swarm
k. Facecast
l. Google My Business
m. Reddit
2. Provide background of how the platform started, who owns them and how big of a following they have?
3. What are the platforms demographics?
4. Strategies and Tools/Platforms – Strengths, Opportunities for Improvement, and recommendation for each platform.
5. Monitoring and Measuring what to measure? What analytics? What tools to use?
6. What companies are currently posting on this platform?
7. Develop 2 case examples of how companies are using this platform to engage with their customers? Include images of posts.
.
How to Setup Default Value for a Field in Odoo 17Celine George
In Odoo, we can set a default value for a field during the creation of a record for a model. We have many methods in odoo for setting a default value to the field.
This document provides an overview of wound healing, its functions, stages, mechanisms, factors affecting it, and complications.
A wound is a break in the integrity of the skin or tissues, which may be associated with disruption of the structure and function.
Healing is the body’s response to injury in an attempt to restore normal structure and functions.
Healing can occur in two ways: Regeneration and Repair
There are 4 phases of wound healing: hemostasis, inflammation, proliferation, and remodeling. This document also describes the mechanism of wound healing. Factors that affect healing include infection, uncontrolled diabetes, poor nutrition, age, anemia, the presence of foreign bodies, etc.
Complications of wound healing like infection, hyperpigmentation of scar, contractures, and keloid formation.
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...TechSoup
Whether you're new to SEO or looking to refine your existing strategies, this webinar will provide you with actionable insights and practical tips to elevate your nonprofit's online presence.
Temple of Asclepius in Thrace. Excavation resultsKrassimira Luka
The temple and the sanctuary around were dedicated to Asklepios Zmidrenus. This name has been known since 1875 when an inscription dedicated to him was discovered in Rome. The inscription is dated in 227 AD and was left by soldiers originating from the city of Philippopolis (modern Plovdiv).
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...EduSkills OECD
Andreas Schleicher, Director of Education and Skills at the OECD presents at the launch of PISA 2022 Volume III - Creative Minds, Creative Schools on 18 June 2024.
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptxCapitolTechU
Slides from a Capitol Technology University webinar held June 20, 2024. The webinar featured Dr. Donovan Wright, presenting on the Department of Defense Digital Transformation.
A Free 200-Page eBook ~ Brain and Mind Exercise.pptxOH TEIK BIN
(A Free eBook comprising 3 Sets of Presentation of a selection of Puzzles, Brain Teasers and Thinking Problems to exercise both the mind and the Right and Left Brain. To help keep the mind and brain fit and healthy. Good for both the young and old alike.
Answers are given for all the puzzles and problems.)
With Metta,
Bro. Oh Teik Bin 🙏🤓🤔🥰
Progress Reporting 3 (Week 5)Greetings everyone,Thank you fo.docx
1. Progress Reporting 3 (Week 5)
Greetings everyone,
Thank you for supplying your progress reports on the status of
the project for Week 5. As the weeks progress there can be seen
(and displayed this week in the screenshot below) that there is a
continuing progression, and movement across the requirements
of the project, towards its submission.
It can be seen that the analysis and writing up of the report may
present challenges. When using tools or frameworks for the
analysis detail as per the criteria (of the tool/framework) to tie
back to the research questions/direction and then produce
findings. With regard to using PEST as an analysis tool (for
those considering this) please address all aspects of PEST as
relevant to your investigation. Ideally this will cover Political,
Economic, Social and Technological elements appropriate to
your data analysis and the methodology of your research
project. If using PESTLE this will, in addition to those
mentioned above, include Legal, and Environmental.
In the event that you are encountering a word limit issue when
it comes to the analysis please consider making use of the
Appendix/Appendices which can cater for the increase in
information. This can then be referred to in-text as (Appendix
... ).
Please remember if you are still to complete the requisite
elements, or may even be yet to commence on certain sections,
review relevant topic areas in the subject and also review the
class forum as there may be relevant and pertinent queries with
responses. Post any questions you may have to the forum which
has the added benefit of supplying information through response
to the class.
Remember also it is possible to build upon the collection of data
after commencing analysis, as it becomes evident to the
researcher that additional data is needed. This may occur and
2. can be the benefit of this process, draw in requisite data as
required if you discover more is necessary. Locate the required
data from reliable academic or industry sources, and if there are
any deficits re-source as appropriate.
Engagement in the report, and its elements is a developing
process, and will be accelerated as you are emerged in the
research and formation of the report towards final submission.
Thank you again for supplying the progress reports and for all
your contributions to the subject.
Kind regards,
Gerard
Dr Gerard Reed
Global Information Tectinology
Applications of
Global Information
Technology:
Key Issues for
Management
By: Blake Ives
Cox School of Business
Southern Methodist University
Daiias, Texas 75275-0333
Sirkka L. Jarvenpaa
Graduate School of Business
University of Texas at Austin
Austin, Texas 78712-1175
3. Abstract
Carefully crafted investments in giobai informa-
tion technology offer firms an opportunity to in-
crease control and enhance coordination, whiie
opening access to new global markets and
businesses. But engineering such giobai systems
presents numerous challenges to management.
In this article, we relate these challenges as they
were described to us by 25 senior managers from
Fortune 500 firms responsible for implementing
and managing global applicaitons of information
technoiogy. Among the findings ofthe interviews
are four common approaches for managing
global information technology.
Keywords: IS management, worldwide MIS,
strategic information systems, global
information systems, key MIS issues,
international business, multinational
company
ACM Categories: H.4.0, K.3.2, K.6.0, K.6.4
Introduction
Globalization reveals an imposing future for the
managers of many firms. In numerous industries,
globalization has already produced dramatic
changes in key markets, major competitors, and
products. Many of North American's biggest firms
have become relatively sniall players in the new
global markets (i.e., "the Global 1000"), with in-
dustry leaders increasingly headquartered in Asia
or Western Europe {Business Week, 1989). Firms
operating in these new world markets will in-
creasingly be at a serious strategic disadvantage
if they are unable to firmly control their worldwide
4. operations and manage them in a globally co-
ordinated manner (Bartlett and Ghoshal, 1989).
Exciting opportunities
Investments in information technology (IT) can
give firms a basis for increased coordination and
control or can provide direct competitive advan-
tage in world markets. For example, a large
computer vendor uses its worldwide network to
ensure that products designed in the U.S. are
appropriate for customers throughout the world.
Lawyers for a large oil firm use the firm's
worldwide office system to prepare international
contracts in a fraction of the time previously
required. In a large merchant bank, a global
integrated trading system helps the dealers
manager their currency risk and calculate profits,
while it also permits the firm to operate in a virtual
24-hour currency market. Moreover, traders con-
ducting business through the Australian or
Japanese subsidiaries, which are located across
the international date line from the U.S., enjoy
a full extra business day before they must settle
with North American and European trading
partners.
As these examples demonstrate, information
technology on a global scale compresses time
and space and permits the duplication and
sharing of scarce corporate expertise. Such
capabilities provide firms with an opportunity to
leverage advantages in both market size and
geographical scope while they simultaneously
provide the means to respond rapidly to the
unique requirements of national markets.
5. MiS Quarteriy/March 1991 33
Global Information Technology
. . . but difficult challenges
Misalignment of information technology with
global business strategy can severely hamper a
firm's efforts to seek global pre-eminence. For
instance, a decentralized financial services firm
catering to globetrotting customers found it very
difficult to enlist the support of its foreign sub-
sidiaries in a worldwide customer database. Sub-
sidiary managers were reluctant to endorse an
integrated corporate solution for fear that in the
short-run it would adversely impact their earnings
and in the long-run reduce their autonomy.
Similarly, a manufacturing firm sought to ration-
alize production across plants in different coun-
tries, but found that systems incompatibilities
severly restricted the range of products that could
be moved from one factory to another.
Harnessing IT on a global scale presents
management with problems that are far more
challenging than those encountered in sharing
systems across domestic divisions. In fact, it is
likely that insights gained in studying IT on an
internationai level will provide solutions ap-
plicable to large, domestic-distributed IT opera-
tions. Unfortunately, progress in the other
direction—the exportation of domestic systems
solutions—often proves to be less rewarding.
Cash, et al. (1988) note problems related to
language, currency, culture, national infra-
6. structure, availability of IT staff, data export
control, and trade unions. Hardware, software,
and communications costs and availability also
pose major challenges—challenges for w^ich
domestic solutions are often inappropriate. For
instance, a centralized hardware solution may
provide the best economics in the U.S. where
communications costs are low. Elsewhere in the
world, however, the high costs of telecommunica-
tions may favor a decentralized or distributed
solution.
Information technology vendors are often poorly
prepared to support global information require-
ments across national boundaries. For instance,
a multinational decentralized petroleum company
chose to install a worldwide electronic mail
system to better leverage its personnel in 45
countries. Management was disheartened to
learn that they would require 14 different versions
of the hardware vendors' office productivity
system, each tailored to a particular language
and each varying in functionality. Regional data
centers were required to support multiple ver-
sions of the software, and for some Asian coun-
tries, there was no appropriate language version
available.
Key issues for management
This article identifies the key issues that a
manager charged with managing global IT ap-
plications for U.S. multinational is likely to f a c t -
issues that must be mastered if the firm is to use
IT successfully in the new global markets. The
primary objective of this article is to provide a rich
7. description fo global IT applications and some
tentative generalizations.
The foiiowing definition for an application of
global information technology serves as the
framework for our discussion of the key issues:
A global Information technology application
• contributes to achieving a firm's global
business strategy
• by using Information technology platforms
• to store, transmit, and manipulate data
• across cultural environments.
Hence, in this article we identify key issues for
the following four elements of global IT: (1) the
linkage of global IT to global business strategy,
(2) information technology platforms, (3) inter-
national data sharing, and (4) cultural environ-
ments. Previous work pertaining to applications
to global IT and to each element of global IT is
first reviewed.
Global Information
Technology in the
Literature
The rapid globalization of business and the in-
creased role of IT in shaping corporate strategy
indicate that global IT is a topic of considerable
importance to information systems practitioners.
Our review of previous work suggests that the
information systems research community has
8. generally neglected this important area. Cash, et
al. (1988) call international IT " a major, largely
unreported, unstudied IT story" (p. 212). Feeny,
et al. (1990) argue that the role of information
34 MIS Quarterly/March 1991
Giobai hformatiort Technoiogy
technology in supporting and enabiing the giobai-
ization of business has been "understated and
certainly under-explored" (p. 36). When inter-
nationai topics have been addressed by the in-
formation systems research community, it has
often been as a replication of American research
in a different country. This type of work has
focused on countries or cuitures as the primary
unit of anaiysis. By contrast, the focus of this
article is applications of information technology
that transcend national boundaries.
A few case studies consider global IT applica-
tions. These include the development and im-
plementation of a worldwide sales management
information system at Du Pont's Polymer
Products Department (Kneitei, 1980), the
strategic use of iT at a paper company with 100
woridwide saies offices, agents, and distribution
centers and headquartered in Finiand (Reponen
and Copeiand, 1986), and two case studies
(Selig, 1982) iiiustrating strategic planning ap-
proaches for information resources in a multi-
national organization. Keen, et al. (1982) discuss
the implementation hurdles of an integrated bank
9. transaction processing system in 40 worldwide
locations.
The literature, however, offers little guidance for
choosing between local versus common applica-
tions. Keen, et al. (1982) argue that the more
standardized the business process across home
and foreign iocations, the larger the fraction of
the system will consist of the "common core."
The larger the core, and therefore, the smaller
the need for local taiioring, the more sense a
common global application makes. But, Keen, et
al. (1982) warn that relatively minor differences
in iocal markets can mean major requirements
for local tailoring. Viewing the issue from a higher
ievel. Reck (1989) concludes that a firm should
structure its information systems function to
operate in a "mixed mode." Reck recognizes that
different suites of applications will support dif-
ferent business strategies and wiii therefore
require varying degrees of commonality across
borders.
Global business strategy
Some business strategies are more dependent
than others on timely, accurate, and complete in-
formation on overseas operations (Egelhoff,
1982). For instance, in the past, home offices
typically conceded considerabie autonomy to
their foreign businesses (Bartlett, 1986).
Worldwide reporting and information require-
ments were minimal under these "country-
specific" strategies. As information technology
advanced into foreign facilities, it was primariiy
used to serve local information needs. It is not
10. surprising then that in 1985, Freeman (1985)
found that IT activities were relativeiy de-
centralized to company units for most U.S.
multinationals.
More recently, firms have begun to adopt globally
integrative stratgies in response to increasingly
competitive global markets. Among these
pressures are the search for global economies
of scale and scope, the development of global
products, and the increasing requirement to
satisfy the needs of woridwide customers. The
consequent increased need for global coordina-
tion and control has placed greater demands on
information and communication between head-
quarters and subsidiaries (Carlyle, 1988). In
search of global efficiencies, many firms have
started to move away from a geographic focus
and toward a business operations orientation.
Carlyle (1988) suggests that these changes in
corporate strategy and structure may be
precipitating more centralized global IT activities:
one common telecommunications network,
shared databases, and standardized reporting
and planning systems. But, writing in 1987, Keen
was unenthusiastic about the pace of the transi-
tion to global information systems. He concluded
that, "It is absurd that so many international firms
have global business strategies but no corres-
ponding strategy for managing information
technology internationally" (p.1). Others fear that
a poorly crafted IT strategy will limit organiza-
tional options. Thompson and Taylor (1988),
discussing the organizationai repositioning that
will be required when Europe unifies in 1992,
warn that, "inflexible minds presiding over in-
11. stalled bases of unconnected applications soft-
ware and incomparable data wiii retard the
organization's ability to redraw its map of
Europe" (p. 6).
IT can propagate new business strategies, but
a more common goal is to effectively harness IT
to an existing global business strategy. Such
alignment requires a shared understanding of the
firm's overall global strategy. Various authors
MIS Quarteriy/March 1991 35
Global Information Technology
have presented models of global business
strategy (e.g., Levitt, 1983; Perlmutter, 1969;
Rowe, et al., 1986), but usually with little or no
attention to information processing requirements.
For example. Porter (1986) positions a firm's
global business strategy along a spectrum
ranging from multidomestics, whose off-shore
operations independently set strategy and handle
production, marketing, and administrative func-
tions, to global multinationals, who integrate their
activities on a worldwide basis to capture the
linkages between countries, while still maintain-
ing some single-country perspective. Shanks (in
Freeman, 1985), Carlyle (1990), and Runyan
(1989) all agree that some amount of centralized
IS is critical for global multinationals.
The global business strategy models of Bartlett
and Ghoshal (1989) are among the most de-
12. veloped because they tie business strategy to a
set of organizational forces faced by the firm.
Bartlett and Ghoshal indentify four broad
strategies that a multinational firm may pursue.
The firm following a multinational strategy
operates Its foreign subsidiaries nearly
autonomously or in a loose federation so as to
quickly sense and respond to diverse local needs
and national opportuntities. The requirement for
local reponsiveness is the driving organizational
force. The firm following a global strategy closely
coordinates worldwide activities through central
control from headquarters so as to capitalize on
the economies associated with a standardized
product design, global scale-manufacturing, and
centralized control of worldwide operations. In
this strategy, the firm is organized around a
requirement for gloval efficiencies. The firm
following an international strategy exploits parent
company knowledge through worldwide diffusion
and adaptation. Rapid deployment of innovation
is the prime operating principle. The firm follow-
ing a transnational strategy seeks to retain local
flexibility while simultaneously achieving global
integration and efficiencies as well as worldwide
diffusion of innovations. According to Bartlett
and Ghoshal (1989, p. 69), "Dynamic inter-
dependence is the basis of a transnational
company—one that can think globally and act
locally."
The transnational model appears to be similar to
the global multinational model of Porter (1986)
and also resembles the global model of Ohmae
(1989). According to Ohmae, the global model
13. prevails today because customer "needs have
globalized and the fixed costs of meeting them
have soared" (p. 161). Ohmae (1989) cautions
that this does not mean that firms should
necessarily pursue universal products. He argues
that the businesses that are most likely to suc-
ceed in global markets are those that can devise
a short list of iead-country models—a product
tailored to the dominant and distinct markets—
and can adapt these lead-country models to local
preferences at low cost. Ohmae's lead-country
models have implications for IT. The common
global systems need to be designed to efficient-
ly accommodate local add-ons for local respon-
siveness. The add-ons might reflect differences
in underlying product or marketing and distribu-
tion strategies (e.g., sold direct or through shared
or exclusive channels), local resource or legal re-
quirements, or the strategic importance of sub-
sidiaries to headquarters.
Information technology platforms
Keen (1987) contends that " . . . the telecom-
munications architecture is generally the strategic
driver for evolving a truly international capabili-
ty" (p. 9). He suggests that management fund
the backbone global communications network as
" a corporate business asset, rather than allow-
ing local case-by-case, cost-based decisions
about communications facilties" (p. 2). But he
warns that the builder of a global communication
system must tread carefully when designing the
infrastructure or seeking out international stan-
dards for IT. For example, Japan, Germany,
Brazil, and France have used information policy
to protect their national computer and telecom-
14. munciations concerns (Lerner, 1984). To operate
in such countries, Wiggin (1987) suggests that
senior management "finds friends in the PTTs"—
the state-owned post office and telecommunica-
tions operators that closely regulate the telecom-
munications industry. Buss (1984) suggests that
corporate contacts with the PTT "show a cor-
porate concern for the issues and a willingness
to comply with both the letter and the spirit of the
law" (p. 118).
Worldwide variations in hardware and software
features, i.e., availability and quality, force firms
to use different vendor products in different parts
of the world. This causes major obstacles in in-
tegrating communication networks, hardware.
36 MIS Quarterly/March 1991
Global Information Technology
and disparate systems software for global ap-
plications. Vendors' protectionist policies for their
products are cited as the major barrier for agree-
ments on standards such Open Systems Inter-
connection (OSi) (Cash, et ai., 1988). Keen (1987)
argues that "the fastest way that standards
emerge is through the power of key market
players" (p.5). Although vendors are usually con-
sidered as key market piayers (Quinn, 1987),
there have been other suggestions that ap-
propriate iT standards wili only deveiop if the user
organizations coordinate their demands and play
an active roie in "internationai pressure groups"
15. {Datamation, 1988). in the area of eiectronic data
interchange (EDI), standards have been
developed jointiy by the United Nations and
ANSi. Harrington (1988) projects that 400,000
companies wiii have implemented internationai
EDi standards (EDiFACT) by 1995.
strengthened to the point where it may hamper
or even compietely staii a company's important
operations" (p. 111). A study conducted in 1985
involving 370 service companies reported that 63
percent considered T D F regulations to be a
serious potentiai problem, although only 31 per-
cent reported problems at the time (Kane and
Ricks, 1988).
Globai appiications present other data manage-
ment challenges. Because users of global ap-
plications often access the same worldwide
database or because data from different foreign
iocations are intended to be shared and con-
solidated, global systems require well-defined
and standard data definitions. In fact. Keen, et
ai. (1982) argue persuasively that commonality
in global systems should be established primarily
through standardization of data rather than stan-
dardization of programs.
International data sharing
The international flow of data has received atten-
tion both in the iiterature and from various
legislative bodies. Much of this has been focused
on the issues of data privacy and transborder
data flows (TDF). TDFs have been defined as
"movements of machine-readable data for pro-
cessing, storage, or retrieval across nationai
16. boundaries" (Chandran, et al., 1987, p. 75), and
have been ciassified by Lerner (1984) into four
types: (1) operationai data inciuding orders,
accounting statements and records, or manage-
ment directives, (2) personally identifiabie data
that pertain to credit records, travel reservations,
or employment records, (3) eiectronic transfers
of money, and (4) technical and scientific data
that inciude instructions for operating machinery
in a plant. T D F iaws usually concern the second
category, aithough many countries aiso restrict
transfer of technical and scientific data (Smith
and Heaiy, 1987).
T D F laws originated in the 1970s from concerns
about the integrity and confidentiality of personai
data. Since then, severai countries have ex-
tended privacy laws to protect "legai persons"
such as associations and corporations. As of
1988, 24 nations had privacy legislation on
transborder data flows (McCrohan and Lowe,
1988). The impact of these laws was predicted
to be devastating for U;S. multinationals. Buss
(1984) argued that "legislation is now being
Cultural environment
Finaiiy, giobal applications of information
technology must be developed for and operate
in a heterogeneous cuitural environment. Levitt
(1983) proposes that consumers have become
alike in aii parts of the world through the
homogenization of needs and desires. This
homogenization has resuited from the "pro-
ietarianization of communication and travel" (p.
83). It suggests that cuiturai differences across
internationai user communities may, to some
17. extent at least, be converging.
Nonetheless, cross-cultural IT research has
found major cultural disparities that warrant
attention in developing global IT applications.
Dagweil and Weber (1983) conclude that
Australian and Swedish systems designers favor
a Theory Y orientation in assessing user needs,
whereas U.S. and U.K. designers iean instead
toward a Theory X view of users. Kumar and
Bj0rn-Andersen (1990) found similiar differences
in values across Canadian and Danish systems
designers. Couger and Motiwalla (1985) found
major demographic differences between U.S.
and Singaporean iS professionals; Singaporean
IS professionais were younger, less experienced,
and better educated than their U.S. counterparts.
Research on group decision support systems has
also detected that the assumptions underlying
specific information technology features are
culture sensitive (Ho, et al., 1989).
MIS Quarterly/March 1991 37
Global Information Technology
Global Information
Technology in Practice
Our exploratory study sought to identify the key
problems and opportuntities facing managers
responsbile for developing global applications of
information technology. These were assessed in
terms of (1) the linkage to business strategy, (2)
Information technology platforms, (3) international
18. data sharing, and (4) cultural environments. We
interviewed 25 senior managers responsbile for
the implementation of global applications of in-
formation technology in Fortune 500 industrial
and service firms. The managers were drawn
from 19 organizations that represented a variety
of industries including petroleum, computers and
electronics, chemicals, motor vehicles, financial
services, and management consulting services
(see Table 1). The firms in the sample were not
randomly chosen. Selections were based on our
ability to gain access to a firm's senior manage-
ment; many of the firms were associated either
with the information systems programs at the
University of Texas or Southern Methodist
University.
The typical interviewee was either a project spon-
sor from the user organization or the individual
responsible for project delivery. In seven cases,
he or she was either the head of information
systems or responsible for a particular suite of
applications—e.g., director of worldwide
manufacturing systems. Other typicai titles in-
cluded: vice-president for systems deveiopment,
senior partner (of a large consulting firm),
manager of corporate office automation and in-
formation services, coordinator of telecom-
munications planning, and so on.
The applications discussed ranged from the
worldwide spare parts network of a computer
vendor, a global risk management system of a
financial services firm, a reservation system of
an airline, a worldwide manufacturing planning
19. and control system implemented by a manufac-
turer, to the corporate-wide general ledger
systems of a petroleum firm and a computer com-
pany. Most applications had been completed
within the previous two years, though some were
still being implemented. All involved at least two
countries in addition to corporate headquarters—
many spanned several continents including a
petroleum application implemented in over 50
countries. Among the applications, some were
running on a mainframe at headquarters, some
were duplicated for use at multipie regional data
Company
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
22. —
Countries Operating in
(plants or sales offices)
> 5 0
11.25
>50
>50
> 5 0
26-50
11-25
11-25
26-50
11-25
150 offices worldwide
< 1 0
26-50
11-25
11-25
11-25
< 1 0
11-25
26-50
38 MIS Quarterly/March 1991
Global Information Technology
centers, and some standalone systems were
housed on local PCs or mainframes. Others were
23. housed on different-sized hardware, ranging from
PCs to mainframes, depending on the business
need within the foreign subisidiary. There were
applications developed outside the U.S. and
subsequently implemented in the U.S. Others
had been exported from the U.S., then severely
modified by foreign subsidiaries, in this ex-
ploratory study, we sought variety in the applica-
tion set, industry, and international settings to
ensure that we were thoroughly exposed to the
phenomenon of global information technoiogy.
Key Issues for Global IT
Management
In this section the interview resuits for the four
elements of global IT applications are reported.
The key issues detailed at the end of each
subsection summarize the main management
concerns expressed in the interviews.
Linking global applications to
corporate strategy
The search for systems economies was the intitial
driving force for global IT applications in many
firms. One interviewee recalled being told by the
CEO, "We have invested so damn much money
in these home office systems—iet's get some
additional use out of them." Based on their hard
won experience, however, the interviewees were
nearly unanimous in endorsing the need for a
compelling business reason to coordinate and
standardize information technology. Many inter-
viewees agreed that they had initially eri-ed by
assuming application requirements were similar,
when the underlying business processes were
later revealed to be different in sometimes subtle
24. but significant ways. For instance, an engineering
firm wished to use a common engineering data-
base to share project work between its U.S. and
European offices. In addition to anticipated
variations in engineering codes and the relative
costs of materials, management soon discovered
that the European project requirements de-
manded far more detailed specifications for con-
tractors than had traditionally been required of
their U.S. counterparts.
Our interviewees offered a range of business
drivers for their global applications. Some of
these drivers were strongly linked to the needs
of the marketplace—e.g., a global customer or
a constrained resource—whereas others were
driven by regulatory requirements. Many still
mentioned the search for system economies as
a driver for global applications. Table 2 sum-
marizes the global business drivers for the ap-
plications discussed.
Except for the economies of scale for systems,
similar drivers were often mentioned by
respondents in the same industry. Hence, it ap-
peared that at least some of the business drivers
for global IT are related to an industry in which
the firm competes, although others vary by a firm,
or even by a strategic business unit.
Aithough the interviewees were typically able to
readily identify the business drivers, particuiarly
the industry-based drivers, for the giobai applica-
tion under discussion, few were able to state the
firm's overall approach or strategy for managing
global information technology. Consequently,
25. from the discussions on applications of IT and
from the interviewees' comments on their firm's
global business strategy, we attempted to infer
the emerging patterns of managing IT in the
respondent fimis. Four generic patterns emerged
that seemed to be aligned with the four business
strategies proposed by Bartlett and Ghoshal
(1989). These four strategies, discussed
previously, were multinational, global, interna-
tional, and transnational.
Approaches for managing
global IT
Independent Global IT Operations
For a few firms in our sampie, subsidiaries con-
tinued to pursue independent system initiatives,
often mirroring a relatively independent multi-
national strategy. Common systems were few
and iargely exceptions in these firms. Technology
choices reflected the infiuence of iocal hardware
and software vendors as weli as the prevaiiing
national communication standards and offerings.
For these firms, headquarter's systems per-
sonnel rarely traveled abroad on business and
had little knowledge or interest in their sub-
sidiaries' system initiatives. Locai profit and loss
responsibiiity, coupled with reiiance on local
MIS Quarterly/March 1991 39
Global Information Technology
Tabie 2. Business Drivers for Globai iT
26. 1. Globai consumer/
customer
2. Giobai product
3. Rationaiized
operations
4. Flexible operations
5. Joint resource
6. Duplicate
facilities
7. Scarce resources
8. Risi( reduction
9. Legai
requirements
10. Economies of
scaie for systems
Firms that serve traveling customers—airlines, hotels, rental
car, and
credit card companies—find it necessary to have worldwide
customer
databases. A similar requirement is increasingly being imposed
by
corporate customers with global operations that more and more
are
demanding integrated worldwide services.
27. The product is either the same throughout the worid (e.g.. Coca
Cola)
or is assembied from subsidiaries throughout the worid (e.g.,
security,
currency exchange, or real estate). Information systems can
provide
the abiiity to manage woridwide marketing programs.
Different subsidiaries buiid different parts of the same product
based
on availability of skills, raw materials, or favorable business
climate.
For exampie, a computer manufacturer might buiid software in
the
U.K., monitors in South Korea, and circuit boards on the West
Coast
of the U.S. IT is used to coordinate the operations.
Operations are moved from a piant in one country to a plant in
another.
For instance, a computer vendor moves production of personai
computers between plants in response to labor strife or raw
materiai
shortages. Common systems exist across plants, which
facilitates the
move.
National subsidiaries may share certain facilities or people. For
in-
stance, the European subsidiaries for a petroleum company
jointly
own tankers or storage tanks. A material resource system is
implemented to track the location of joint resource.
A chemicai company uses nearly identicai piants to produce
gases
28. in different countries. Software supporting that production
facility can
be readily shared.
A chemicai firm requires that high-cost gas compressors be
available
in case of breakdowns in its identical worldwide plants. High
costs
prohibit storing them at each faciiity. A parts logistics system
coordinates the compressor's use and distribution.
Risks associated with currency conversions, multiple global
markets,
and multiple traders are alleviated. For instance, a petroleum
com-
pany develops a global system for bidding on crude oil
contracts, or
a multinational bank implements a global risk management
system
for currency trading.
information requirements mandated by laws in one or more
countries
are consolidated. For instance, financiai or environmental
regulations
imposed on a subsidiary may necessitate corporate-wide
information
requirements if the subsidiary intends to sell or use products
manufac-
tured elsewhere.
One corporate-wide system is used to reduce data center
require-
ments, duplicate deveiopment activities, and maintenance
resources.
29. 40 MIS Quarterly/March 1991
Global Information Technology
information systems departments and local
technology, resulted in non-integrated technology
platforms, databases, and applications. This lack
of integration appeared at times to severely
impede efforts to implement global business
strategies. For instance, a computer vendor who
had neither a global ordering or billing system
had a difficuit time meeting the needs of a
headquarters-based client who sought to design
a worldwide system in New York for subsequent
implementation in 50 country facilities, with
payments to be made from regional offices
iocated in London, Tokyo, Rio, and New York.
The independent giobai iT operations best sup-
ports the multinationai strategy of Bartlett and
Ghoshal. The focus is ciearly on local respon-
siveness, and the applications portfolio is strongly
oriented toward iocai requirements.
Headquarters-Driven Global IT
A number of firms have imposed corporate-wide
iT solutions on subsidiaries, at least for some
applications. For many firms the headquarters-
driven approach was not oniy desirable but
required. These are Bartiett and Ghoshal's (1989)
global firms that strive for woridwide efficiencies,
usuaiiy in support of global products. Here the
compelling business need and the opportunity to
harvest worldwide economies of scaie force the
30. firm toward a giobal systems solution. For in-
stance, large semiconductor manufacturers with
giobal customers and products, rationalized pro-
duction, and stiff international competition have
little choice but to seek globai efficiencies. Cen-
tralized IT may provide some efficiencies of its
own, but, more importantiy, it provides the coor-
dination and controi necessary for efficient opera-
tions throughout the firm.
Headquarters-driven global IT appeared to run
into problems without a strong global business
need. Efforts resulted in overt or covert resistance
to the "ugly American" who suddenly appeared
at the subsidiary's data center. This was often
a frustrating period for a U.S. systems manager
assigned overseas. One interviewee assigned to
the U.K. confessed to us that "after a year I had
finaiiy iearned enough to be useful and not to be
bluffed—then I was recalled to the States." For
some firms, appiications brought over from the
U.S. were successfuiiy impiemented, but many
died later from neglect or unmaintainability after
the U.S. emissary departed. In other firms, this
approach had ended with a recognition that "their
business really is different from ours," foiiowed
by a hasty retreat to independent giobal IT opera-
tions. For these firms, the only benefit was
unplanned—organizationai learning emerging
from face-to-face contacts between the sub-
sidiaries' and headquarters' systems people and
their major users.
Intellectual Cooperation in Global IT
31. For some of the firms in our sample, strong links
existed between the home office and foreign sub-
sidiaries, but the linkages were those of coop-
eration and mutual assistance rather than
management fiat, in these organizations, head-
quarters personnel attempted to influence rather
than control the information technoiogy choices
of their foreign subsidiaries. Personnei were ex-
changed regularly, and joint appiication develop-
ment efforts were initiated. If headquarters had
already developed an application that the sub-
sidiary now required, the subsidiary might ask for
a copy to modify. Alternatively, they might choose
to send a group to the U.S. to study the applica-
tion thoroughly before developing their own
version. One interviewee described the objective
that he and his European IT director shared as
an attempt to develop "inteiiectual synergy" be-
tween their two groups. This approach to manag-
ing iT seems to fit well with Bartlett and Ghoshal's
(1989) international siraXegy. The objective in this
case is to rapidly disseminate corporate innova-
tion while continuing to provide the flexibility re-
quired to be responsive to local business entitites.
Integrated Global IT
Barttett and Ghoshal (1989) have proposed that
a transnational strategy will supersede the
muitinational, internationai, and global strategies
currently pursued by different firms. According
to Bartlett and Ghoshal, firms wiii seek this
transnational status to permit them to
simultaneously be globally efficient, provide iocal
responsiveness, and quickly diffuse organiza-
tionai innovation. The companies in the study had
32. yet to reach the truiy transnational status. Feeny,
et al. (1990) have proposed that firms pursuing
a transnational strategy wiii require appiications
of information technoiogy that reach across
national borders to meet the firm's diverse ob-
jectives. Here systems soiutions would be in-
tegrated using international standards and a
MIS Quarterly/March 1991 41
Global Information Technology
planned common architecture that will meet the
needs of various-sized organizational units
operating in diverse environments. Muitinational
development teams would ensure that organiza-
tion-wide IT solutions also meet the needs of local
business units with applications moduies divided
into common and locally taiiored code. Global
database design teams would ascertain the data
entities that wouid be shared across the
woridwide organization and deveiop universal
data dictionaries and appropriate databases. In-
novation in this case would be a two-way street,
with headquarters benefiting from the knowledge
of subsidiaries. Several of the firms we talked
with, who had previousiy based their IT strategy
on intellectual cooperation or headquarters-
driven global IT, had recently recognized the
necessity of moving toward the cooperative
development of globally integrated appiications.
Table 3 lists the key issues resuiting from the
interviews reiated to the iinkage between IT
33. strategy and business strategy. If no deliberate
global IT strategy is deemed necessary or viabie
at present, management may wish to assess how
important such a linkage might become in
the future and how to best prepare for that
eventuality.
Table 3. Liniclng IT and Business Strategy:
Key Issues
• Understand each business unit's global
business strategy.
• Determine the appropriate giobal IT
management approach or IT strategy to
align with the global business strategy.
• Identify the fundamentai objective or
objectives driving the giobal IT strategy
and global IT appiications.
• Classify and prioritize applications based
on their contributions to giobai business
strategy.
• Assign responsibiiity for deveioping and
implementing the global IT strategy.
• Assist senior management to under-
stand the potential impacts of global IT
on corporate strategy.
Information technology
platforms
Data center consolidation, location operations,
34. vendor relations, and software availability were
commonly mentioned concerns related to IT in-
frastructure. The interviewees infrequentiy
discussed data networks and telecommunica-
tions as either barriers, if they had faiien behind
their competitors, or competitive advantages, if
they perceived themseives as leaders.
In many firms, additional data centers were
located outside the U.S. These centers were
used to meet nationai or regional needs and
sometimes to baiance international workloads via
sateilite communications. According to our inter-
viewees, establishing locations for internationai
data centers presents several challenges:
overlapping working hours; local computing and
iabor regulations; potentiai theft; sabotage and
terrorism; unreliable power sources; avaiiability
of completeiy redundant network backup
capabiiity; and the iike.
Our interviewees complained that equipping a
local data center can be problematic because of
high prices for iocai hardware, the iack of local
service for products, the absence of an author-
ized distributor, and iong lead times in acquiring
both equipment and spare parts. Interviewees
complained that in Japan, for instance, iocai
distributors hold monopoly positions and charge
rates nearly double the price of comparable
products purchased in the U.S. Economic and
technical barriers set by national governments in-
ciude higher prices for computing equipment and
communication lines, restrictions on the impor-
tation of equipment and services, and rigid hard-
ware and software standards. Severe import
35. limitations on assembled hardware in countries
such as Brazii forced one firm to enter the com-
puter assembly business to outfit their foreign
subsidiaries. Even in countries with open trade
poiicies, new hardware modeis or software ver-
sions may take a year or two to be released to
the market because the vendor may not have the
resources available to quickly adapt the product,
documentation, and support to local conditions.
To support languages such as Japanese requires
that a single character from the language be
stored in two, rather than the customary one,
bytes of computer storage, often necessitating
42 MIS Quarterly/March 1991
Global Information Technology
vendors to make costly and time-consuming
modifications to software packages.
According to our interviewees, purchased soft-
ware packages present unique problems in an
international setting. Packages designed to run
in Europe may be incompatible with their
American or Asian counterparts, even when
purchased from the hardware vendor. Packages
from software houses are even less universally
available than those from hardware vendors—
no matter how well known in the U.S. Software
houses often rely on licensing agreements with
local personnel to handle the sales, distribution,
and support of their product. In some countries,
local disregard of copyright restrictions has
36. caused vendors to completely ignore or retreat
from a particular market. As a consequence,
severai firms have restricted package choices to
those provided and supported by their hardware
vendor. Others buy PC packages in the U.S. and
distribute them to their subsidiaries. Firms deal-
ing in developing countries face even more
challenging problems. A firm with operations in
China first selected a hardware platform that they
could legally import into the country and then
searched for applications that potentially might
be of some use to their Chinese business.
Table 4 lists the key issues related to
technoiogical infrastructure.
Data
In 1988, McCrohan and Lowe (1988) predicted
increasing regulation of transborder data flows
(TDF), claiming that "the control of transborder
data flows will be the trade war of the 199O's"
(p. 8). Our interviewees tell us that McCrohan and
Lowe's war was never fought. One manager
claimed that "transborder data flow is a myth."
Another said that "TDF looked very exciting in
the 70s, but proved to be a non-event in the 80s."
One expert expiained that many transtx>rder data
laws are vague and therefore difficuit to follow
and to enforce. He explained his policy for deal-
ing with the regulators: "The officials charged
with enforcement are often as confused about
these complex laws as we are and they are not
anxious to spend much time interpreting them.
We don't ask their permission. Instead, we tell
them what we intend to do and ask them to let
us know if there are any problems."
37. Table 4. Information Technology
Platforms: Key Issues
• Determine the number and locations of
regional data centers.
• Ensure 24-hour system avaiiability and
support for global applications operating
from global data centers.
• Select vendors who can provide support
in dispersed iocations.
• Select hardware and software appro-
priate for shared data or processing re-
quirements.
• Expect delays and incompatibilities from
vendors operating outside their own
home markets.
• Anticipate a reduced set of hardware
and software alternatives.
• identify reiiable local IT distributors and
service providers.
Two application categories seemed most
vulnerable to TDF or privacy iegislation. The first
is payroll systems, which generaiiy do not lend
themselves to global use. The second is
personnei-record systems. Typcially, the firm
must commit to providing the same level of
security and access to personnei data stored
abroad as is required by privacy iegisiation
38. iocally. Although our IT experts acknowledged
the difficulty of transporting personal data from
some countries in Europe to the U.S. or from
Canada to the U.S., some questioned whether
"we even really need it [personai data] in the
U.S." Few companies expressed need for a skiils
inventory system that spans nationai boundaries.
However, as corporations continue to institute
truly transnationai corporate strategies, the need
for worldwide personnei systems—at least for
senior managers and professionals—is likely to
surface.
Although transborder data laws and regulations
were not perceived to be a major obstacie to
globai iT, worldwide data management and data
standardization within the firms were perceived
to present significant barriers for internationai
data sharing. Defining common data names
presents unique problems when multiple
languages are used. But, even within countries
MIS Quarterly/March 1991 43
Global Information Technology
sharing a language, the same word or phrase
may take on quite different meanings. Differing
nationai standards, rules of thumb, or differences
in technology platforms also present problems
when, for instance, common part codes are
desirable. Data modeling presents further
challenges as real world entities and relationships
among data entities, as weli as day-to-day plant
39. and field operations, vary from country to country.
According to one executive, "People suddenly
just forgot how to speak English" when con-
fronted with standards that threatened cherished
local operating procedures.
To find an organizational body within the firm that
is willing to lead the standardization effort may
be difficuit. A major manufacturer of farm equip-
ment, for example, installed a worldwide
manufacturing system in its piants. The corporate
finance group was responsible for developing
common standards for general ledger accounts,
but nobody was willing to take action to stan-
dardize part numbers. Finaiiy, the project
manager from the corporate IT group developed
a new standard coding scheme for parts. Locai
personnei complained, but not enough to catch
the ear of top management. The project manager
commented: "The systems group became a
cataiyst for changes that should have been done
long before."
The key issues related to international data that
were uncovered in the interviews are iisted in
Table 5.
Cultural environment
"Not Invented Here" and "Unsuitable for Our En-
vironment" were commoniy identified barriers
that severeiy hampered attempts to standardize
on a global or regional application. Several in-
terviewees acknowiedged that these concerns
had been well founded in the past. We found
some signs of them still. One respondent, for in-
stance, was disappointed when system users in
40. his Japanese subsidiary balked at data fieids con-
taining dollar signs ($) as substitutes for the yen
sign (¥). Nevertheless, the Japanese were
recognized as being more accepting of
"parachuted" solutions than the Europeans. Ac-
cording to severai interviewees, the Japanese,
once convinced that an application met their
needs, were quick to embrace it. Severai firms
interviewed had chosen to distribute deveiop-
Table 5. Internationai Data Sharing:
Key Issues
• Weigh the desirability of transborder
sharing and standardizing against the
requirements for local fiexibiiity.
• Understand your responsibilities, limita-
tions, and exposures vis-a-vis TDF and
privacy laws.
• Assign responsibility for data standard-
ization.
• Involve subsidiary users and IT groups
in the standardization of common data
names and data modeling activities.
• Design and deveiop a giobai data ar-
chitecture around giobai business ob-
jectives.
• Physically locate databases based on
business requirements, legal considera-
tions, relative costs, vendor support,
organizational politics, etc.
41. ment between the U.S. and European sub-
sidiaries to neutralize subsidiary resistance to an
imposed outside solution. This appeared to pro-
vide some short-run advantages, but in the long
run reduce opportunities for full integration.
Variations in work vaiues were perceived across
cultures, some no doubt stereotypic. One inter-
viewee ciaimed that employees in one European
subsidiary were half as productive as their
American counterparts (they were also paid ap-
proximateiy haif as much). In another country,
where skilled jobs werre at a premium, workers
were seen as highly protective of their personal
knowledge. The interviewee had found that
employees there were generally unwiiiing to
share knowledge with others and considerably
overstated their own proficiency. Another inter-
viewee had been delighted to discover that
aithough Japanese systems personnei were in
short supply, women were more readily available
than men. After the interviewee encouraged her
Japanese systems manager to hire severai
women, she was later chagrined to discover that
he had "turned them into tea ladies." Religion
is often another important factor. Prayer breaks
and iong holidays must be accommodated. Ob-
viously, the cultural stereotyping goes both ways;
44 MIS Quarterly/March 1991
Global Information Technology
42. managers from the European subsidiary of a U.S.
firm described their American counterparts as
"indined to do something fast, but likeiy to have
to iater sow the seeds of the storm they pianted."
The firms' subsidiaries aiso varied in systems si<iii
sets. Severai interviewees noted that the French
were skiiied in data modeiing and in the more
theoreticai aspects of systems deveiopment.
Other interviewees reported the English to be weii
trained in the use of structured deveiopment
methodoiogies, whiie the Germans were seen as
exceiient project managers. Singaporeans were
described by one interviewee as extremeiy hard
working, skiiied, and wiiiing to take on any task
assigned. Another manager described them as
the consultants of Asia. Austraiia, on the other
hand, was seen as iacking in systems skiiis.
Where such observations reflect reai rather than
perceived cross-cuitural differences, there may
be opportuntities for creatively aiiocating systems
work or for fostering organizationai learning
across subsidiaries.
The key issues reiated to cultural environment
are summarized in Table 6.
Table 6. Cultural Environment: Key Issues
• Identify critical systems applications or
skiiis competencies (or weaknesses)
possessed by foreign subsidiaries.
• Provide opportuntities for giobal
organizational learning reiated to these
areas of unique competency.
43. • Recognize the sensitivity of foreign sub-
sidiaries to imposed solutions and seek
mutually acceptable alternatives.
• Seek new ways to sensitize managers
sent abroad (or brought to the U.S.)
to cultural, religious, and political
differences.
Developing Global
Applications of Information
Technology
Some of the cultural, infrastructure, and data
issues that can impede the successfui employ-
ment of global information systems were de-
scribed above. The importance of tightiy iinking
information technology to the firm's giobai
business strategy was also highiighted. Next,
some additionai, but more specific, issues ex-
pressed by the inten/iewees about the develop-
ment and maintenance of individual global
applications are described. A few generic ap-
proaches used to overcome these specific
deveiopment-related issues are aiso presented.
The most commoniy mentioned chailenges in the
deveiopment of global applications were the
determination of giobai versus iocal requirements
and the maintenance of high levels of local user
involvement and ownership. One interviewee
estimated that it takes five to 10 times more time
to reach an understanding and agreement on
system requirements and deliverabies when the
users and developers are in different countries.
44. This is partialiy explained by travel requirements
and language and cuiturai differences, but
technical iimitations aiso contribute to the
probiem. In many developing countries, outdated
or unreliable communications systems can
restrict or totally preclude regular phone calls, fax
transmissions, or dial-up computer connections.
One interviewee, who faced a 12-hour time dif-
ference in reaching some subsidiaries, claimed
that it typically took neariy an hour to establish
a phone iink and that the iine wouid often go dead
during the caii.
Ongoing maintenance of a functioning appiica-
tion presented problems for many respondents.
Our interviews suggested that giobal systems
face simiiar, but usuaiiy more extreme,
maintenance probiems than do distributed
domestic systems. If the global system is run from
one centraiized data center serving different
markets, time-zone differences pose probiems for
preventive and file maintenance. An interruption
during a third shift in New York City wiii present
midday service interruptions in Tokyo. One
respondent recaiied a decision he had made
earlier in his career that eventuaiiy came back
to haunt him. "For various reasons we had
designed the system so that it had to be down
for one day each year. I had chosen the Fourth
of July [U.S. Independence Day] because
everyone would be on vacation that day."
If the global system is to be run on muitiple host
computers, a decision must be made whether to
MIS Quarterly/March 1991 45
45. Global Information Technology
deveiop a single system reflecting aii the varia-
tions required for its target countries or to develop
multipie sets of code, each taiiored to a particular
environment. The first option ensures a more
consistent evolution of the system, but may cause
performance degradation and siow response to
iocal maintenance requests. Even within one
single system, if run from multiple data centers,
there tends to be an evolution to multiple locai
systems. "Without strong central supervision in
maintenance," one of our interviewees argued,
"there is a naturai affinity for iocal solutions, no
matter how similar the business."
The interviews surfaced three approaches for
overcoming problems in developing and im-
plementing global systems. The most common
approach is to transform the home office or "best
in firm" appiication into a global system. Some
respondents reported better success in bringing
a European system to the U.S. than the other way
around, because the European systems were
already designed to deal with multiple languages
and currency conversions. Having indentified the
system, it is then modified to meet worldwide
requirements. A smaiier version of the system
may be created for developing countries where
both the required functionaiity and technological
resources are modest. Almost without exception,
the worldwide roll-out of the application has been
gradual. Typically, the system is first modified to
46. meet the requirements of the European sub-
sidiaries. Later, the requirements of the Far
Eastern operations might be added, followed by
the requirements from South American sub-
sidiaries, and so on.
A second development approach requires
assembly of a multinationai design team.
Systems and user personnel from headquarters
and from local subsidiaries are posted to one
design location, often for months at a time. Costs
for this approach were reported as high. One
respondent noted that the costs to maintain a
U.S. systems manager in Japan are approx-
imately 2.5 times greater than the U.S. fuiiy
costed rated. Some countries restrict the number
of foreign personnel assigned to a firm's local
office, and the procedures to gain approvai for
staff can be time-consuming. Deveiopment out-
side the U.S. need not always be expensive,
however. For instance, one firm reported that a
U.S.-based software engineer costs three times
as much as an indian with simiiar qualifications.
Whatever their costs, muitinational design teams
ensure that appropriate decisions are made con-
cerning allocations of system functionality to
common versus local code, adherence to inter-
national standards, and, over time, the develop-
ment of common tools. The approach also
develops personal networks across borders and
exposes the home office personnei to the en-
vironment of foreign operations (and vice versa).
Parailel development is the third approach. Here,
the project is broken into components, with each
47. component developed by a different home office
or subsidiary development team. One firm in-
ciuded in the study was using this approach with
a system cun-ently in the requirements stage. The
iocation of particular development sites was
seiected based on the availability of appropriate
expertise and resources. The home office was
scheduled to develop one significant module of
the global system, whiie a European systems
group was scheduled to develop a second. Each
was expected to assist the other with require-
ments determination. The respondent hoped that
common development methodologies, shared
software engineering toois, eiectronic maii, and
consistent definitions of data would ensure close
coordination and consistency in the resuiting
application.
Few of the firms had considered a common
methodology for systems development projects
to facilitate cooperation in giobai projects, and
there was iittie activity in impiementing common
automated development tools across sub-
sidiaries. Interestingiy, severai of the manufac-
turers we interviewed already used common,
automated design tools within their product or
process engineering groups in different countries,
but shared software deveiopment toois appear
to lag far behind their engineering equivaients.
In summary, management must realize that
giobal applications are expensive and difficult to
develop and operate. Even when a home office
system is transformed into a global system,
designers must fuliy understand the simiiarities
and differences in the underlying business pro-
48. cesses across countries. The applications must
also often be designed with 24-hour, seven-day-
a-week support and operational requirements in
mind. Maintenance must be ciosely orchestrated
for duplicated systems. To aiiow development in
centers in different parts of the world, common
46 MIS Quarterly/March 1991
Global Information Technology
development approaches, tools, and method-
ologies must be agreed upon. But perhaps of
most critical importance is the need to align the
global appiications and application approaches
with giobal business objectives.
multiple diverse business units, it is likely that one
would find a diversity of both global business
strategies and corresponding IT management
approaches.
Future Research Directions
The purpose of this study was to outline some
of the key management issues in global infor-
mation technology and broadly examine the
phenomenon of giobal IT through semi-structured
interviews with a relatively smail number of senior
managers. This broad brush approach is ap-
propriate given both the complexity of the area
and the lack of previous literature. Future re-
searchers may find it advantageous to focus on
some of the specific "key management issues"
identified here.
49. We have several practicai recommendations for
conducting giobai iT research. First, we en-
courage researchers to be creative and oppor-
tunistic in studying some of the naturaiiy
occurring experiments such as Europe 1992 or
the opening up of Eastern Europe. "Living" with
a muitinationai deveiopment team for a few
months provides another fascinating naturai
laboratory for studying project management and
team management issues in a giobal area.
Moreover, voice maii, electronic mail, and fax
messages so common in these international in-
terchanges provide artifacts of considerabie
potentiai value to the interested researcher. Finai-
iy, researchers shouid invoive schoiars located
throughout the world in their projects to reduce
the costs of research whiie fostering giobal
learning. Our own globai messaging systems give
us the infrastructure for coordinating giobal
efforts, whiie providing us with experience par-
ticipating in and managing our own giobal
enterprise.
There are also iimitations of this research that
may suggest additionai opportunities for future
investigators. Our sampie size was smaii (only
U.S.-based), and selected partiaily on the basis
of convenience. Our conversations with the inter-
viewees, though far ranging, were reiatively short
and were biased by the interviewees' current con-
cerns and fauity memories. Our starting point was
business appiications rather than either the cor-
poration or a specific business unit within that
corporation. For a iarge, multinationai firm with
50. Conclusion
By the year 2000, firms with woridwide operations
will use advances in communications and com-
puter technoiogy to ieverage their distinctive com-
petencies. This may mean providing multinationai
customers with a singular woridwide identity or
being abie to quickiy adapt products to the re-
quirements of different cultures and nationaiities.
It may mean being able to shift production
schedules from one country to another or pro-
ducing iead-country products with common com-
ponents and toois. Impiementing any of these
strategies will require a major upheaval for
existing IT applications and architectures—most
of which were initially designed to support singie
geographic markets and homogeneous hardware
environments. These new business needs wiii
require software and documentation that can be
quickly enabled for particuiar nationai ianguages
so that products available in one part of the world
are nearly simultaneously made available
throughout the worid. Top management will
demand instant access to meaningful data from
around the world. Engineers of global products
wiii require giobal information on legal re-
quirements, professional codes, product per-
formance, and customer needs. These new
strategies wiii require us to leverage scarce
inteiiectual resources on a woridwide basis using
knowledge systems, databases, and various
communication systems.
In the future, many giobal applications will be inter-
organizational. Multinational firms will require
immediate access to information systems
residing in the computer systems of nationai
51. customs departments, freight forwarders and
consoiidators, brokers, carriers, bankers, and
insurers as well as their customers, suppliers,
and channel partners. Participation in such net-
works will require firms to have carefully integrated
their own internal processing systems using inter-
nationally recognized standards. Firms who fail
to build those global and interorganizationai in-
formation bridges wiii be increasingiy at a com-
petitive disadvantage.
MIS Quarterly/March 1991 47
Global Information Technology
Acknowledgements
We want to thank Peat Marwick Main Founda-
tion for financial assistance on this project. We
are aiso gratefui to Siddik Badruddin for his able
research assistance and Michael Vitale for com-
ments on a previous draft.
References
Bartlett, C.A. "Buiiding and Managing the
Transnationai: The New Organizational
Challenge," in Competition in Global In-
dustries. M.E. Porter (ed.). Harvard Business
School Press, Boston, MA, 1986.
Bartlett, C.A. and Ghoshal, S. Managing Across
Borders: The Transnational
52. Solution
, Harvard
Business Schooi Press, Boston, MA, 1989.
Business Week. " T h e Global 1000—The
Leaders," July 17, 1989, pp. 139-145.
Buss, M.D.J. "Legislative Threat to Transborder
Data Fiow," Harvard Business Review (62:3),
May-June 1984, pp. 111-118.
Cariyle, R.E. "Managing IS at Multinationals,"
Datamation, March 1, 1988, pp. 54-57.
Carlyle, R.E. "The Tomorrow Organization,"
Datamation, February 1, 1990, pp. 22-29.
Cash, J.I., McFarlan, F.W., and McKenney, J.L.
Corporate Information Systems Management:
The Issues Facing Senior Executives, Irwin,
Homewood, IL, 1988.
53. Chandran, R., Phatak, A., and Sambharya, R.
"Transporter Data Flows: Impiications for
Muitinational Corporations," Business
Horizons (30:6), November-December 1987,
pp. 74-81.
Couger, J.D. and Motiwaiia, J. "Occidental
Versus Oriental IS Professionais' Perceptions
on Key Factors for Motivation," Proceedings
of the Sixth International Conference on Infor-
mation Systems, Indianapolis, IN, December
1985, pp. 105-112.
Dagwell, R. and Weber, R. "System Designers'
User Modeis: A Comparative Study and
Methodoiogical Critique, Communications of
the ACM (26:11), November 1983, pp.
987-997.
Datamation, "internationai Users: What the
Worid Needs Now," May 1, 1988, Interna-
tional Section, 48:1-4.
Egelhoff, W.G. "Strategy and Structure in
Multinational Corporations: An Information-
54. Processing A p p r o a c h , " Administrative
Science Quarterly (27), 1982, pp. 435-458.
Feeny, D., Earl, M.N., and Stevenson, H. "Infor-
mation Technoiogy and Giobal Strategy: From
Trade-offs to Simultaneities," working paper,
Oxford Institute of Information Management,
Tempieton College, Oxford, 0X1 5NY,
England, 1990.
Freeman, D.H. "Managing Information Systems
at the Multinational," Infosystems (32:1),
January 1985, pp. 58-62.
Harrington, L "Global EDI Language May Have
Finaiiy Arrived," Traffic Management (27),
April 1988, pp. 17-18.
Ho, T.H., Raman, K.S., and Watson, R.T. "Group
Decision Support Systems: The Cuiturai
Factor," Proceedings of the Tenth Interna-
tional Conference on Information Systems,
Boston, MA, December 1989, pp. 119-129.
Kane, M.J. and Ricks, D.A. "Is Transnational
55. Data Flow Regulation a Probiem," Journal of
International Business Studies (19:3), Fall
1988, pp. 477-482.
Keen, P.G.W. "An International Perspective on
Managing Information Technoiogies," An ICIT
Briefing Paper, International Center for Infor-
mation Technoiogies, Washington, D.C,
1987.
Keen, P.G.W., Bronsema, G.S., and Zuboff, S.
"impiementing Common Systems: One
Organization's Experience," Systems, Qbjec-
tives, and