
Sunday, June 21, 2009
Chapter 15 Article Review: When You Shouldn't Go Global

Chapter 15 Case Study: Nestle Tries for an All for One Global Strategy

2) What type of global business and systems strategy did Nestle adopt? Was this strategy appropriate for Nestle’s business model?
Nestle has not necessarily believed in the concept of the global consumer. None of Nestle’s products is considered a truly global brand, with perhaps the exception of Nescafe, of which 100 million cups are served around the world each year. Nestle does target the world market but does so by creating brand strength locally by each diversified region. Nestle's global strategy fits the multinational startegy which is characterized by decentralization of production, sales and marketing operations to units in other countries. This strategy works well for Nestle since they are in the food market which needs to take into consideration, differing business cultures and local market preferences. Nestle remains the leading food and beverage company in the world so their strategy is effective, however, their decentralization of operations makes it extremely difficult to mainstream IT systems.
3)What management, organization, and technology challenges did Nestle have to deal with to standardize its business processes and systems?
As complex as the challenge seemed, Nestle embarked on a program to standardize and coordinate its information systems and business processes through a system called GLOBE. The company initially installedSAP’s R/3 enterprise resource planning software to integrate material, distribution, and accounting applications in the United States, Europe, and Canada. Instead of technology managers, Johnson tried to build his team from a diverse group of business managers who had experience in a variety of business sectors including manufacturing, finance, marketing, and human resources. It became apparent to Johnson that the greatest challenge of GLOBE might not be technical, but was personal and organizational perhaps. Managers resisted the idea of giving up control over their business processes to particpate in a centralized solution.
4)What strategies did Nestle management use to deal with these challenges? How successful were these strategies?
The implementation of the GLOBE system was paramount to Nestle's global market approach and it required large scale company buy-in. By the end of 2005, Nestle had converted 30 percent of its business to GLOBE, and had the capacity for one major rollout every month. The 80 percent number by the end of 2006 was still looming but the company had learned how to operate as a single unit on a global scale. Nestle is much closer to achieving its goal of standardizing all processes, data, and systems. Chris Johnson was able to develop projections for his team that were both measureable and attainable. Such a large scale important project deserves adequate manpower, budget and time to allow for the system to be properly implemented.
Sunday, June 7, 2009
Article Review: Microsoft Unveils Project Management Effort for Partners

On June 3, 2009, Microsoft announced that all of its US partners who utilize Microsoft Office Project Server 2007, will have access to share templates, project methodologies and other project-management assets associated with Office Project Server 2007 via a Web portal. They named this program, "Project for Workgroups." Project for Workgroups provides solutions built by Microsoft's partners to create enterprise project management systems. The aim is to reduce deployment costs associated with project management implementations.
There are so many aspects of Project Management to keep track of that a Manager with multiple projects must invest a great deal of time simply to follow each individual project. Depending on the number of projects running simultaneously, this process may be exceedingly time consuming. Since finding problem areas before they become critical is essential to effective Project Management, any delay could be costly.
Project Management tools that provide a global overview of all the projects in a company’s portfolio, are a time-saving solution that can positively affect the outcome of a project. Having the necessary information at the right time can make the difference between project failure and success. The right tool can also help you to leverage your resources (people, money, schedules and capacity).
Chapter 14 Case Study: What Went Wrong with Maine's New Medicaid System?

Sunday, May 31, 2009
Chapter 12 Case Study: Can Information Systems Make Your Doctor Better?

1) What problems are hospitals and physicians encountering in diagnosis diseases and prescribing medications? What management, organization, and technology factors are responsible for these problems?
Hospitals and physicians are encountering medication errors which have led to injuries and death. Mostly resulting in inappropriate prescriptions, dosages and patient-monitoring strategies, these errors can be very costly and damaging to a hospital and/or physician. Research has found that most of these errors have resulted from human factors such as poor handwriting, memory lapses, fatigue and distractions, compounded by the sheer complexity of available medications. In addition to medication errors, physicians have been challenged with properly diagnosing medical conditions after gathering and reviewing diagnostic tests. Consequently, computerized physician order entry and diagnostic decision support software is being developed to reduce the occurrences of medication and patient diagnosis errors.
2)Are CPOE and DDS systems appropriate solutions? Why or why not? What management, technology, and organization issues are involved in the use of these systems?
CPOE and DDS systems should be utilized by nurses and physicians as an extra diagnosis and medication resource to insure that they have not missed anything. With the myriad of over the counter and prescription medications out there and the vast amount of diseases, a structured, computerized system can serve as additional knowledge/resources for a physician.
Once the CPOE and DDS technology is finely tuned and the glitches have been worked out, it can serve as a tool to reduce liability associated with medical malpractice and can make healthcare delivery more efficient. Successful implementation of these systems has many advantages such as improved communication between nurses and doctors, saves time for doctors, clarity of medication orders resulting in an estimated 25% less occurrence of adverse drug reactions.
3) What obstacles prevent computer systems from improving the medical industry? How can these obstacles be removed?
A couple of obstacles prevent computer systems from improving the medical industry. First off, many physicians, proud as they are, may not be inclined to allow computer systems to make decisions for them. Their pride, egos and expertise may get in the way of the implementation of such systems, especially for older, less computer savvy doctors. Another obstacle that complicates the implementation of such a system is that it requires significant amounts of time to input all the medical data for a given hospital. This data entry aspect is also prone to human error and is very time consuming.
These obstacles can be overcome by implementing rigorous training programs to doctors, nurses, administrators and data entry personnel. A sustained training effort for appropriate staff prior to its implementation at a hospital may build confidence in their users and reduce the likelihood of errors. Furthermore, comprehensive training and educational programs for physicians should emphasize that the computer systems should act as a tool to compliment their art.
Sources: Management Information Systems Managing the Digital Firm, tenth edition. pgs. 505-507. Laudon, Kenneth C.
Sunday, May 17, 2009
Article Review: Amazon vs. Sony: E-Book Reader Face-Off


Chapter 10 Case Study: Can eBay Continue Growing?

2) eBay faces several challenges which will test their ability to continue in their growth stage. On the international front, they face stiff competition from Yahoo!. Yahoo! is positioning themselves in the online auction site industry in the asian markets. Furthermore, another online giant, Google, dominates the online advertising industry and eBay is attempting to penetrate that market by offering its own online contextual ads and auction promotions on linked Web sites.
However, their greatest problem is their difficulty in providing their users with a secure and honest online trading environment. Their rapid growth and enormous amount of transactions that occur daily, has made it extremely difficult for eBay to monitor and control fraud, identity theft and unethical/dishonest transactions. Many users who have been victimized by these unethical practices, do not feel confident in the efforts that eBay has made to prevent dishonest transactions and thus, question eBays ability to ensure integrity in their auctions. This is a great obstacle for eBay to overcome. To battle this problem, eBay relies mostly on customer feedback through a rating sytem.
4) According to a Fortune article published on January 23, 2008, eBay has undergone a management change which will bring forth organizational and technological changes. More specifically, Meg Whitman has been replaced by John Donahoe as CEO of eBay. While Whitman was central to eBay's growth and success, she felt that the company needed fresh eyes and a new perspective to continue to drive its growth.
Donahoe promised big changes in his first several weeks to help revive eBay’s core business. He discussed his plan to offer fixed-priced goods and an improved customer rating and support system to lure buyers. In addition, he has promised to lower fees for sellers to list items hoping this attracts more sellers and thus more transactional sales revenue.
Sunday, April 26, 2009
Article Review: The Conficker Worm: A Potential Threat to PCs

Chapter 8: A stolen laptop at the VA: The worst data theft ever?

1) List and describe the security weaknesses at the Department of Veteran Affairs.
-lack of appropriate data security policies in place/disregard for privacy rights of veterans:
When policies are developed with proper foresight and safety considerations, they are typically the most important step to preventing undesirable occurrences from happening. In the case of the stolen laptop from a Veteran Affairs (VA)data analyst's home, there were very loose security policies which allowed for this security breach to occur. More specifically, the data analyst was allowed to take a laptop home containing data from millions of veterans for approximately three years. Furthermore, he was allowed to use at-home software to access and manipulate millions of veterans' social security numbers, addresses, phone numbers, etc. For lack of a better word, this ignorant decision demonstrates the VA's lack of foresight and demonstrates a disregard for the privacy of veteran's rights. There are many obvious risks with removing sensitive data from a secure location and taking it to someones home, such as an unauthorized person tampering and/or stealing data, deletion of data, acquiring a virus, etc. I am sure that none of those VA staff or management would want their personal data being taken home regularly and without proper security features to a stranger's home. It doesn't take a genius to realize that there is a risk posed by allowing laptops with personal data to be removed from the building and taken to employee's homes. This was a case of failed leadership to protect data and policies should have been in place disallowing this type of activity.
-delayed reaction to theft of sensitive identity data:
The VA Inspector General was not informed of the incident promptly after its occurrence and he found out about seven days after the fact, through"office gossip," that the burglary took place. Furthermore, the Secretary of Veteran Affairs, Jim Nicholson, did not find out about the burglary until 13 days after it occurred. This type of delay can inhibit the FBI and Justice Department's investigative process and prevent them from solving the case. Luckily, the thieves were not extremely computer savvy and did not access the data. Also, they were eventually caught but had it been a computer savvy hacker, all that personal data may have been stolen and used within a matter of days and could have created huge financial losses.
-decentralization of IT security systems:
Apparently, an audit conducted in 2004 of the VA's IT system revealed that a centralized management system should be implemented to improve information security at the VA. The current decentralized system in place at the VA made it difficult to implement necessary changes/updates to their systems and made them more susceptible to delays and performance failures. The VA's chief information security officer lacked direct authority to enforce security policies and mandates.
-weak information security program:
Sensitive data held in the laptop that was stolen, did not have adequate access control features. Data on the computer was not encrypted and there were no biometric authentication programs linked to their large database of confidential data. Theft, in general, whether at home or at the workplace is often difficult to prevent, but with stringent security features in place protecting the personal data, it would limit any unauthorized exposure and limit damages.
2)What management, organization, and technology factors contributed to these weaknesses?
It is clear that the stolen data was a result of failure on many levels. From a management perspective, the VA failed to implement adequate security policies to protect the privacy rights of the veterans. An important role of a manager is to be able to recognize risks to an organization and its stakeholders. In addition, managers should demonstrate solid judgement and foresight when making decisions. The decision to allow unprotected, confidential data to leave the VA premises on a laptop and into an employee's home for three years demonstrated poor judgement from management. With regards to organizational factors that led to the VA's weakness, I would claim that their decentralized management structure made it difficult as an organization to swiftly recognize potential threats and implement change. In this type of organizational structure, information systems security has to clear many levels and reach multiple approvals prior to its implementation. A more direct, centralized organizational structure may have allowed for a more secure IT environment. Finally, in terms of technological factors which led to the VA's weaknesses, they lacked up-to-date access controls which protected the data from unauthorized access. Whether the data was stolen from home or the workplace, there should be both biometric authentication controls and encryption controls protecting the data.
3)What solutions would you suggest to prevent these security problems?
I would propose the following three suggestions to prevent the VA's security problems:
1)The VA must update their corporate security policies and specify on each position's job descriptions, proper guidelines regarding what data they can access, to complete work on intrusion detection systems and immediately prohibit the removal of confidential data, whether by laptop or flash drive, etc., from the main server computers.
2) Implement access controls which encrypt data and install biometric authentication devices on computers which would need access to confidential data. This would protect data from unauthorized exposure in the event of a theft and would make it nearly impossible for unauthorized access to be gained into personal records.
3) Development of a centralized management structure with less levels of bureaucracy in the VA's IT department. As the two former CIO's, McFarland and Gauss, suggested, it would be beneficial for the VA to appoint a chief information security officer with direct authority to monitor IT security and enforce security policies and mandates swiftly.
Sunday, April 12, 2009
Chapter 3 Case Study: Blockbuster vs. Netflix
What is Blockbuster's business model? Blockbuster is one of the largest, well known, movie retail chains in the world. Their business model is one composed of heavy marketing and advertising to the public along with strategically placed retail stores to cater to customers seeking video rentals and/or purchases. They have been around since 1985 and were able to thrive throughout the years by offering their customers a recognizable brand to rent and buy movies from.
How successful has it been? Based on their market share in the rental video industry of 40%, it is safe to conclude that their business model has led them to success. By 2004, Blockbuster generated yearly revenues of $7-9 billion from video rental business and $16 billion from video sales.
Question #4:
How successful is Netflix and its business model? Netflix developed a unique business model in 1998 which allowed customers to rent movies through an online store without the risk of late fees. This provides the customer with unparalleled convenience which other video rental stores were not providing at the time.
Netflix is enjoying success from its online video rental business and has seen steady growth in their yearly revenues. In 1998, Netflix generated $522 million ; in 2005 they generated $1 billion and they are projected to generate $3 billion in sales in 2009. Apparently, their entry into the video rental industry has been well-received.
Question #5:
Do you think that Blockbuster or Netflix will succeed in the future? Explain your answer.
Given today's shaky economic landscape and the emergence of convenience through technology, it is difficult to predict the success of any company, but I strongly believe that Netflix holds a better chance of succeeding than does Blockbuster. Although, Blockbuster has the added advantage of having retail stores placed in numerous locations, they carry a large burden of maintaining a large workforce and mounting capital long/term liabilities such as rent, mortgages, etc. Nevertheless, I doubt that either company is going to go bankrupt anytime soon and that they will remain as competetive forces in the movie rental industry. I see both companies adapting to, if not setting, future trends in the industry.