IT战略规划

整理文档很辛苦,赏杯茶钱您下走!

免费阅读已结束,点击下载阅读编辑剩下 ...

阅读已结束,您可以下载文档离线阅读编辑

资源描述

InformationTechnologyManagementLecture3Strategy,PlanningandebusinessInformationSystemsManagementInPractice5E(McNurlin&Sprague)Chapter3&4Introduction“Strategicuse”ofITisdefinedas“havingasignificant,long-termimpactonafirm’sgrowthrate,industry,andrevenue.”Historically,thestrategicuseofIThasfollowedanevolutionfromimprovinginternalprocessesandstructuresofafirm,toimprovingtheproducts,services,andrelationshipswithitscustomers,andthenwithitspartners.Theseevolutionstagesarecharacterizedas:LookinginwardLookingoutwardLookingacrossStrategicUsesofInformationSystemsInternalsystemstoimproveProcessesandStructureIT-BasedproductsandServicesLinkstootherorganisationsLookinginwardLookingforwardLookingacrossIntroductionWhatise-business?Theuseoftelecommunicationsnetworks,particularlytheInternet,toconductbusinesstransactions.Threecategoriesofe-business(seeFigure3.2):Business-to-employee:Intranet-basedapplicationsinternaltoafirmBusiness-to-consumer:Internet-basedapplicationsforafirm’scustomersBusiness-to-business:Extranet-basedapplicationsforafirm’sbusinesspartnersE-BusinessDriversKeyComponentsthathaveacceleratedtheacceptanceofe-business:WideaccesstoapublicnetworkStandardcommunicationprotocolStandarduserinterfaceE-businessapplicationsrunovertheInternet,drasticallyreducingaccessandcommunicationscosts.Withstandardizedcommunicationprotocolsanduserinterfaces,implementationandtrainingcostsarefarlower.Asaresult,amuchbroadersetofusersandfirmshasaccesstothesystems,allowingrapidgrowth.LookingInward:Business-to-EmployeeIntranetsIntranetsareprivatecompanynetworksthatuseInternettechnologiesandprotocols,andpossiblytheInternetitself.BenefitsofusingintranetsWideraccesstocompanyinformationMoreefficientandlessexpensivesystemsdevelopmentDecreasedtrainingManagingIntranetsManagerialconcernsHowtointegratelegacysystemsintotheintranetDecidinghowmuchcontrolofthesystemsshouldbedecentralizedProposedsolutionsCreateacorporateportaltoactasthegatewaytothefirm’sinternalresources,information,andInternetservices.Developseparatedepartmentalordivisionalportals,suchassales,HR,operations,andfinanceportals.LookingOutward:Business-to-ConsumerTheE-BusinessModelRedefiningCustomerValue“Demandingon-demand”:reducesthetimeittakestorespondtocustomerrequestsConvenience:allowsgatheringandmanagingcustomerinformationAccesstoawiderangeofcompetitivepricesandsellersforproductsLookingOutward:Business-to-ConsumerRedesigningRelationshipswithBusinessPartnersE-businessallows:“disintermediation”:bypassingintermediariesbydirectlylinkingcustomerstothemanufacturer.thedevelopmentof“virtualorganizations,”whereafirmdoesnotownpartsofthevaluechain,butrathercontrolsthecoordinationofotherfirmstoappearasasinglefirm.LookingAcross:Business-to-BusinessIThasbeenusedtoreducecostsandtimeofinterorganizationaltransactions,forexample:InterorganizationalSystems(IOS)Reservationsystems,electronicfundstransfersystems,ElectronicDataInterchangeSystems(EDI)ElectronicDataInterchangeSystems(EDI)Transmission,instandardsyntax,ofdataforbusinesstransactionsbetweencomputersofindependentorganizationSupplyChainIntegrationSupplychainincludesprocessessuchas:logistics,procurement,production,anddistributionStrategicoptionsBuild-to-ordermodeofoperationEliminationofintermediariesRedesigntheprocurementprocessIntegrationwithBack-EndSystemsChallengeVarietyofplatformsIncompatibleApproachDatabaseManagementSystems(DBMS)ERPSystemsExtranetTechnicalConsiderationsA.EvolutionoftheInternet:QualityofServiceNextGenerationInternet(NGI)ResearchanddevelopadvancednetworktechnologiesDeployhigh-speedtestbednetworksDevelopanddemonstraterevolutionaryapplicationsthatdemandhigh-speednetworksnotcurrentlyavailableontoday’sinternetUniversityConsortiumforAdvancedInternet(UCAID)Internet2(advancedacademicnetwork)Abilene(supportthedemandsoftheadvancedresearchapplicationsoftheUCAID)TechnicalConsiderationsB.Security-ranksasoneofthetopmanagementandconsumerconcernsC.Dividedintothreecategories:1.Sniffing:interceptionandreadingofelectronicmessagesastheytraveloverthecommunicationnetworksProtection:Encryption(DES,RSA)2.Spoofing:assumptionofafalseidentityandtheexecutionoffraudulenttransactionsProtection:Authentication(RSA)3.Hacking:unauthorizedaccesstoahostcomputerProtection:FirewallLegalandEthicalConsiderationsPrivacyIntellectualPropertyRightsCopyrightsPatentsTrademarksTradeSecretsLegalJurisdictionContentRegulationITStrategyITisastrategicassetthatcanbeusedto:LookoutwardtoincorporateproductsandservicesLookinwardtore-designandcreatenewbusinessprocessesLookacrosstolinkwithotherorganizationsmakepermanentchangesinthenatureofbusinesswithe-businessWhyStrategicIssuesAreImportantAdvancesininformationaffectorganisationmorethananyothertechnicaladvancesInformationtechnologyshiftspowerandinfluencefromgovernmentstoindividualsIToffersgreatopportunityforinnovationinorganisationandbusinessoperationInformationtechnologyispervasiveinmostfirmsPrecedentsareabundantandobvious—organisationsmustnotfallbehindTheCha

1 / 66
下载文档,编辑使用

©2015-2020 m.777doc.com 三七文档.

备案号:鲁ICP备2024069028号-1 客服联系 QQ:2149211541

×
保存成功