SlideShare a Scribd company logo
1 of 18
Download to read offline
1
1
Using Information
Technology for Competitive
Advantage
Lecture 4
Abdisalam Issa-Salwe
Business Information Systems
MSc Finance and Legal Management
Thames Valley University
Abdisalam Issa-Salwe, Thames Valley University
2
Topic list
 Porter’s five forces model
 Value chain
 EDI
 Data warehousing
 Data mining
 Intelligent agents
 Value added networks
2
Abdisalam Issa-Salwe, Thames Valley University
3
Abdisalam Issa-Salwe, Thames Valley University
4
Porter’s five forces model
 All organisations operate in one or
more industries. By the nature of
their participation in an industry,
they are affected by existing or
potential uses of information
technology
3
Abdisalam Issa-Salwe, Thames Valley University
5
Porter’s five forces model
 Professor Michael Porter of Harvard
University maintained that in every
industry, competition depends on
the collective strength of five basic
forces
 Interacting with these forces are the
generic corporate strategies (see
below).
 IT can be a powerful agent to
change the balance of power in and
between these forces.
Abdisalam Issa-Salwe, Thames Valley University
6
Porter’s five forces model (cont…)
 New entrants can increase overall capacity
in the industry, thereby reducing prices and
incumbents' cost advantages.
 IT can help create or raise barriers to entry
by increasing mandatory investments in
hardware and software, facilitating control
over databases, or locking in customers to
existing distribution channels.
 There are many types of barriers to entry:
switching costs, economies of scale, high
investment in IT, economies of experience,
access to distribution channels, and
government policy
4
Abdisalam Issa-Salwe, Thames Valley University
7
Porter’s five forces model (cont…)
 Intensity of industry rivalry depends
on factors beyond the control of the
individual firm,
 such as degree of concentration,
diversity, or dependency; rate of industry
growth; or switching costs.
 It is critical to understand the strategies
of one's rivals in detail.
 For instance, Ford's strategy depends on
the strategies of Toyota, Nissan, GM, and
Volkswagen, and vice versa.
Abdisalam Issa-Salwe, Thames Valley University
8
Porter’s five forces model (cont…)
 Threat of substitute products may arise
from products and services in other
industries.
 Examples:
 * the products of stock brokers and insurance
companies now compete against banks for the
investment dollar.
 * the automobile eliminated the horse with buggy,
and the silicon chip eliminated electromechanical
adding machines. The life cycle of products can
be reduced through the use of IT, such as
Computer-Aided Design (CAD). IT has also
provided the basis for creating new information-
intensive products.
5
Abdisalam Issa-Salwe, Thames Valley University
9
Porter’s five forces model (cont…)
 Bargaining power of buyers
 Buyers drives prices down and the quality of
products up.
 Buyer power depends on the level of
switching costs, the competitive position of
the buyer in the industry (size, volume),
whether the buyer can purchase a
commodity product, or whether the buyer
poses a serious threat of backward
integration (i.e., buying out or merging with
its suppliers).
 Installing computer terminals at the buyers'
site is one way to raise the buyers' cost of
switching to other suppliers.
Abdisalam Issa-Salwe, Thames Valley University
10
Porter’s five forces model (cont…)
 Bargaining power of suppliers
 It is in some ways the antithesis of buyer
power.
 The threat of forward integration (i.e.,
buying out or merging with its customers)
is one determinant of supplier power.
 Influential suppliers drive prices up and
reduce the quality and quantity of
products and services.
 Supplier power also depends on size,
volume, and concentration relative to
other firms in the industry.
6
Abdisalam Issa-Salwe, Thames Valley University
11
Abdisalam Issa-Salwe, Thames Valley University
12
7
Abdisalam Issa-Salwe, Thames Valley University
13
Abdisalam Issa-Salwe, Thames Valley University
14
Value Chain Analysis
 The value chain is a systematic approach
to examining the development of
competitive advantage. It was created by
M. E. Porter in his book, Competitive
Advantage (1980). The chain consists of a
series of activities that create and build
value. They culminate in the total value
delivered by an organisation. The 'margin'
depicted in the diagram is the same as
added value. The organisation is split into
'primary activities' and 'support activities
8
Abdisalam Issa-Salwe, Thames Valley University
15
Value Chain Analysis (cont…)
 The value chain begins with the data
resource.
 Information is developed from the data
resource to support the knowledge
environment of an intelligent learning
organisation.
 Data is the raw material for information
which is the raw material for the
knowledge environment.
 Knowledge is the raw material for
business intelligence that supports
business strategies.
Abdisalam Issa-Salwe, Thames Valley University
16
Value Chain Analysis (cont…)
 Data is the individual raw facts that are
out of context, have no meaning and are
difficult to understand. Facts are
numbers, characters, character strings,
text, images, voice, video and any other
form in which a fact may be presented.
Data in context is facts that have
meaning and can be readily understood.
It is the raw facts in context with meaning
and understanding, but is not yet
information because it has no relevance
or time frame.
9
Abdisalam Issa-Salwe, Thames Valley University
17
Electronic Data Interchange (EDI)
 EDI was first developed by the
automobile/transportation industry in the
1970s.
 Today, it is widely used in a variety of
industries, including distribution, finance
and accounting, health care,
manufacturing, purchasing, retail, tax
form filing, and shipping.
 Early EDI packages used rather simple
standard forms that forced companies to
convert data to fit the forms.
 Newer EDI systems allow companies to
create custom systems using simple
programming or authoring tools.
Abdisalam Issa-Salwe, Thames Valley University
18
Electronic Data Interchange (EDI) (cont…)
 Electronic Data Interchange is the electronic exchange
of routine business transactions.
 Typical transactions include such documents as
purchase orders, invoices, advance shipping
notification, payments, etc.
 Exchange of electronic data using inter-organisational
information systems
 Set of hardware, software, and standards that
accommodate the EDI process
 EDI defines the electronic exchange of structured
business data, such as purchase orders, invoices, and
shipping notices, typically between one organisation
and another.
 The relationship is usually between a vendor and
customer.
10
Abdisalam Issa-Salwe, Thames Valley University
19
Electronic Data Interchange (EDI) (cont…)
 It is important to differentiate between EDI
and electronic commerce.
 Electronic commerce encompasses all aspects of
electronic business exchanges, including person-to-
person interaction (collaboration), money transfers,
data sharing and exchange, Web site merchant
systems, and so on.
 EDI as a subset of electronic commerce that
encompasses the exchange of business information
in a standardised electronic form.
Abdisalam Issa-Salwe, Thames Valley University
20
Electronic Data Interchange (EDI) (cont…)
 EDI can reduce costs, workforce
requirements, and errors associated
with retyping orders, invoices, and
other documents.
 With EDI, computer data already
entered by one organisation is
made available to a business
partner.
 EDI is typically handled using store-
and-forward technologies similar to
e-mail.
11
Abdisalam Issa-Salwe, Thames Valley University
21
Electronic Data Interchange (EDI) (cont…)
 Two approaches in the
implementation of EDI.
 Many large organisations acquire or build
their own proprietary systems, often in
association with their business partners.
 To work with a VAN (value added
network) provider, which provides EDI
transaction services, security, document
interchange assistance, standard message
formats, communication protocols, and
communication parameters for EDI. Most
VANs also provide a network on which to
transmit information.
Abdisalam Issa-Salwe, Thames Valley University
22
12
Abdisalam Issa-Salwe, Thames Valley University
23
Value Added Network (VAN)
 A (VAN) Value Added Network is a
third party who stores the data to
be communicated. It serves as a
middle person, so neither party can
access the other’s private network.
The main key to a VAN is that the
other partner does not touch your
network, as business partners
initiate the sending or retrieving of
the data from the VAN.
Abdisalam Issa-Salwe, Thames Valley University
24
Value Added Network (VAN) (cont…)
 With the data being sent to or
received from the VAN by the
business partners initiating the
communication, business partners
are insuring a safe method of data
transportation.
 The different ways of
communicating to the VAN include
dialup as well as FTP protocols.
13
Abdisalam Issa-Salwe, Thames Valley University
25
Business Intelligent
 Business intelligence represent a popular
trend in many public and private sector
organisations.
 Ideally, any manager or knowledge
worker should be able to compose
information requests without programmer
assistance and achieve answers at the
speed of thought.
 Follow-up questions should be
immediately asked and answered in order
to maintain continuity of thought on a
particular topic of importance.
Abdisalam Issa-Salwe, Thames Valley University
26
14
Abdisalam Issa-Salwe, Thames Valley University
27
Data warehouse, data marts
 Data warehouses are computer based information
systems that are home for "secondhand" data
that originated from either another application or
from an external system or source.
 Warehouses optimize database query and
reporting tools because of their ability to analyse
data, often from disparate databases and in
interesting ways.
 They are a way for managers and decision
makers to extract information quickly and easily
in order to answer questions about their business.
 In other words, data warehouses are read-only,
integrated databases designed to answer
comparative and "what if" questions.
Abdisalam Issa-Salwe, Thames Valley University
28
Data warehouse, data marts (cont…)
 Data Marts:
 Data in a data warehouse should be
reasonably current, but not necessarily up to
the minute, although developments in the
data warehouse industry have made frequent
and incremental data dumps more feasible.
 Data marts are smaller than data warehouses
and generally contain information from a
single department of a business or
organisation. The current trend in data
warehousing is to develop a data warehouse
with several smaller related data marts for
specific kinds of queries and reports.
15
Abdisalam Issa-Salwe, Thames Valley University
29
A Data Warehouse Architecture
Abdisalam Issa-Salwe, Thames Valley University
30
Data mining
 Data mining is primarily used today by
companies with a strong consumer focus -
retail, financial, communication, and
marketing organisations.
 It enables these companies to determine
relationships among "internal" factors
such as price, product positioning, or staff
skills, and "external" factors such as
economic indicators, competition, and
customer demographics.
16
Abdisalam Issa-Salwe, Thames Valley University
31
Data mining
 Data mining, or knowledge discovery, is the
computer-assisted process of digging through and
analysing enormous sets of data and then
extracting the meaning of the data.
 Data mining tools predict behaviors and future
trends, allowing businesses to make proactive,
knowledge-driven decisions.
 Data mining tools can answer business questions
that traditionally were too time consuming to
resolve.
 They scour databases for hidden patterns, finding
predictive information that experts may miss
because it lies outside their expectations.
Abdisalam Issa-Salwe, Thames Valley University
32
Data mining (cont…)
 With data mining, a retailer could
use point-of-sale records of
customer purchases to send
targeted promotions based on an
individual's purchase history.
 By mining demographic data from
comment or warranty cards, the
retailer could develop products and
promotions to appeal to specific
customer segments
17
Abdisalam Issa-Salwe, Thames Valley University
33
Data mining (cont…)
 Data mining consists of five major
elements:
 Extract, transform, and load transaction
data onto the data warehouse system.
 Store and manage the data in a
multidimensional database system.
 Provide data access to business analysts
and information technology professionals.
 Analyse the data by application software.
 Present the data in a useful format, such
as a graph or table.
Abdisalam Issa-Salwe, Thames Valley University
34
18
Abdisalam Issa-Salwe, Thames Valley University
35
Tutorial Question
Michael Porter described a
concept that has become
known as the "five forces
model". This concept involves
a relationship between
competitors within an
industry, potential
competitors, suppliers,
buyers and alternative
solutions to the problem
being addressed.
Could you critical discus
Porter’s five force
model?

More Related Content

What's hot

Strategic Mangement For Under Grad Animated
Strategic Mangement For Under Grad   AnimatedStrategic Mangement For Under Grad   Animated
Strategic Mangement For Under Grad AnimatedUlhas Wadivkar
 
Etop presentation
Etop presentationEtop presentation
Etop presentationAshok Dubey
 
Information System audit
Information System auditInformation System audit
Information System auditPratapchandra
 
Factors affecting business environment
Factors affecting business environmentFactors affecting business environment
Factors affecting business environmentRENNIFER
 
Environmental scanning
Environmental scanningEnvironmental scanning
Environmental scanningRajesh kumar
 
Strategic analysis and choice
Strategic analysis and choice Strategic analysis and choice
Strategic analysis and choice Krishna Kumar Paul
 
FORMAL & INFORMAL INFORMATION SYSTEM
FORMAL & INFORMAL  INFORMATION SYSTEMFORMAL & INFORMAL  INFORMATION SYSTEM
FORMAL & INFORMAL INFORMATION SYSTEMZahid Parvez
 
Ten Schools of Thought on Strategic Management
Ten Schools of Thought on Strategic ManagementTen Schools of Thought on Strategic Management
Ten Schools of Thought on Strategic ManagementFlevy.com Best Practices
 
Types o f information systems
Types o f information systemsTypes o f information systems
Types o f information systemsBimbashree K.G
 
Analyzing a company’s external environment
Analyzing a company’s external environmentAnalyzing a company’s external environment
Analyzing a company’s external environmentM.S. SaHiR
 

What's hot (20)

Strategic Mangement For Under Grad Animated
Strategic Mangement For Under Grad   AnimatedStrategic Mangement For Under Grad   Animated
Strategic Mangement For Under Grad Animated
 
Pest analysis
Pest analysisPest analysis
Pest analysis
 
Etop presentation
Etop presentationEtop presentation
Etop presentation
 
Strategic management
Strategic  managementStrategic  management
Strategic management
 
Information System audit
Information System auditInformation System audit
Information System audit
 
Factors affecting business environment
Factors affecting business environmentFactors affecting business environment
Factors affecting business environment
 
Industry analysis
Industry analysisIndustry analysis
Industry analysis
 
The role of information system
The role of information system The role of information system
The role of information system
 
Internal environment
Internal environmentInternal environment
Internal environment
 
Business and society relationship
Business and society relationshipBusiness and society relationship
Business and society relationship
 
Environmental scanning
Environmental scanningEnvironmental scanning
Environmental scanning
 
INTERNAL ENVIRONMENT
INTERNAL ENVIRONMENTINTERNAL ENVIRONMENT
INTERNAL ENVIRONMENT
 
Pestle analysis
Pestle  analysisPestle  analysis
Pestle analysis
 
Strategic analysis and choice
Strategic analysis and choice Strategic analysis and choice
Strategic analysis and choice
 
FORMAL & INFORMAL INFORMATION SYSTEM
FORMAL & INFORMAL  INFORMATION SYSTEMFORMAL & INFORMAL  INFORMATION SYSTEM
FORMAL & INFORMAL INFORMATION SYSTEM
 
Ten Schools of Thought on Strategic Management
Ten Schools of Thought on Strategic ManagementTen Schools of Thought on Strategic Management
Ten Schools of Thought on Strategic Management
 
Strategic fit
Strategic fitStrategic fit
Strategic fit
 
Types o f information systems
Types o f information systemsTypes o f information systems
Types o f information systems
 
SWOT
SWOT SWOT
SWOT
 
Analyzing a company’s external environment
Analyzing a company’s external environmentAnalyzing a company’s external environment
Analyzing a company’s external environment
 

Viewers also liked

Ppt competitive advantage
Ppt competitive advantagePpt competitive advantage
Ppt competitive advantagezhouguoqing
 
Case study of Competitive advantage at Dell Inc
Case study of  Competitive advantage at Dell IncCase study of  Competitive advantage at Dell Inc
Case study of Competitive advantage at Dell IncMehvish Rehman
 
Individual behavior
Individual behaviorIndividual behavior
Individual behaviorroyneelima
 
Big 5 Model ppt
Big 5 Model pptBig 5 Model ppt
Big 5 Model pptSankuD
 
workforce diversity
workforce diversityworkforce diversity
workforce diversitykumudu737sjp
 
Diversity in the workplace
Diversity in the workplaceDiversity in the workplace
Diversity in the workplaceaet0719
 
Stable environment/Dynamic environment
Stable environment/Dynamic environmentStable environment/Dynamic environment
Stable environment/Dynamic environmentVJIMPGDM
 
Amazon.com Strategic Analysis
Amazon.com Strategic AnalysisAmazon.com Strategic Analysis
Amazon.com Strategic AnalysisMax Jallifier
 
OB - INDIVIDUAL BEHAVIOUR
OB - INDIVIDUAL BEHAVIOUROB - INDIVIDUAL BEHAVIOUR
OB - INDIVIDUAL BEHAVIOURsandhyaanil
 

Viewers also liked (11)

Ppt competitive advantage
Ppt competitive advantagePpt competitive advantage
Ppt competitive advantage
 
Case study of Competitive advantage at Dell Inc
Case study of  Competitive advantage at Dell IncCase study of  Competitive advantage at Dell Inc
Case study of Competitive advantage at Dell Inc
 
Individual behavior
Individual behaviorIndividual behavior
Individual behavior
 
Individual differences
Individual differencesIndividual differences
Individual differences
 
Big 5 Model ppt
Big 5 Model pptBig 5 Model ppt
Big 5 Model ppt
 
workforce diversity
workforce diversityworkforce diversity
workforce diversity
 
Diversity in the workplace
Diversity in the workplaceDiversity in the workplace
Diversity in the workplace
 
Stable environment/Dynamic environment
Stable environment/Dynamic environmentStable environment/Dynamic environment
Stable environment/Dynamic environment
 
Amazon.com Strategic Analysis
Amazon.com Strategic AnalysisAmazon.com Strategic Analysis
Amazon.com Strategic Analysis
 
Dell Case Study
Dell Case StudyDell Case Study
Dell Case Study
 
OB - INDIVIDUAL BEHAVIOUR
OB - INDIVIDUAL BEHAVIOUROB - INDIVIDUAL BEHAVIOUR
OB - INDIVIDUAL BEHAVIOUR
 

Similar to Lecture 4(Using Information Technology for Competitive Advantage)

BizDay: Marco Polo: Making Trade Finance Smarter, More Transparent & Better C...
BizDay: Marco Polo: Making Trade Finance Smarter, More Transparent & Better C...BizDay: Marco Polo: Making Trade Finance Smarter, More Transparent & Better C...
BizDay: Marco Polo: Making Trade Finance Smarter, More Transparent & Better C...R3
 
SIM - Mc leod ch03
SIM - Mc leod ch03SIM - Mc leod ch03
SIM - Mc leod ch03Welly Tjoe
 
Addressing Storage Challenges to Support Business Analytics and Big Data Work...
Addressing Storage Challenges to Support Business Analytics and Big Data Work...Addressing Storage Challenges to Support Business Analytics and Big Data Work...
Addressing Storage Challenges to Support Business Analytics and Big Data Work...IBM India Smarter Computing
 
Modmeters Case Study
Modmeters Case StudyModmeters Case Study
Modmeters Case StudyKate Loge
 
How banks reinvent themselves through enterprise systems
How banks reinvent themselves through enterprise systemsHow banks reinvent themselves through enterprise systems
How banks reinvent themselves through enterprise systemsProf. Dr. Alexander Maedche
 
Using Information Technology to Engage in Electronic Commerce
Using Information Technology to Engage in Electronic CommerceUsing Information Technology to Engage in Electronic Commerce
Using Information Technology to Engage in Electronic CommerceElla Mae Ayen
 
Electronic Commerce
Electronic CommerceElectronic Commerce
Electronic Commerceellamee27
 
Virtual Data Room Industry Growth Statistics and Trends.pdf
Virtual Data Room Industry Growth Statistics and Trends.pdfVirtual Data Room Industry Growth Statistics and Trends.pdf
Virtual Data Room Industry Growth Statistics and Trends.pdfHokme
 

Similar to Lecture 4(Using Information Technology for Competitive Advantage) (20)

Lecture 7 (business-level strategy and the value chain model)
Lecture 7  (business-level strategy and the value chain model)Lecture 7  (business-level strategy and the value chain model)
Lecture 7 (business-level strategy and the value chain model)
 
Mc leod ch03
Mc leod ch03Mc leod ch03
Mc leod ch03
 
2008 4
2008 42008 4
2008 4
 
IDC Rethinking the datacenter
IDC Rethinking the datacenterIDC Rethinking the datacenter
IDC Rethinking the datacenter
 
Essay It
Essay ItEssay It
Essay It
 
5-Unit (CAB).pdf
5-Unit (CAB).pdf5-Unit (CAB).pdf
5-Unit (CAB).pdf
 
BizDay: Marco Polo: Making Trade Finance Smarter, More Transparent & Better C...
BizDay: Marco Polo: Making Trade Finance Smarter, More Transparent & Better C...BizDay: Marco Polo: Making Trade Finance Smarter, More Transparent & Better C...
BizDay: Marco Polo: Making Trade Finance Smarter, More Transparent & Better C...
 
SIM - Mc leod ch03
SIM - Mc leod ch03SIM - Mc leod ch03
SIM - Mc leod ch03
 
Addressing Storage Challenges to Support Business Analytics and Big Data Work...
Addressing Storage Challenges to Support Business Analytics and Big Data Work...Addressing Storage Challenges to Support Business Analytics and Big Data Work...
Addressing Storage Challenges to Support Business Analytics and Big Data Work...
 
Ash cis 500 preview full class
Ash cis 500 preview full classAsh cis 500 preview full class
Ash cis 500 preview full class
 
Modmeters Case Study
Modmeters Case StudyModmeters Case Study
Modmeters Case Study
 
IBM: Redefining Enterprise Systems
IBM: Redefining Enterprise SystemsIBM: Redefining Enterprise Systems
IBM: Redefining Enterprise Systems
 
IBM: Redefining Enterprise Systems
IBM: Redefining Enterprise SystemsIBM: Redefining Enterprise Systems
IBM: Redefining Enterprise Systems
 
Lecture 4 (using information technology for competitive advantage)
Lecture 4 (using information technology for competitive advantage)Lecture 4 (using information technology for competitive advantage)
Lecture 4 (using information technology for competitive advantage)
 
MIS.ppt
MIS.pptMIS.ppt
MIS.ppt
 
How banks reinvent themselves through enterprise systems
How banks reinvent themselves through enterprise systemsHow banks reinvent themselves through enterprise systems
How banks reinvent themselves through enterprise systems
 
Using Information Technology to Engage in Electronic Commerce
Using Information Technology to Engage in Electronic CommerceUsing Information Technology to Engage in Electronic Commerce
Using Information Technology to Engage in Electronic Commerce
 
Electronic Commerce
Electronic CommerceElectronic Commerce
Electronic Commerce
 
Virtual Data Room Industry Growth Statistics and Trends.pdf
Virtual Data Room Industry Growth Statistics and Trends.pdfVirtual Data Room Industry Growth Statistics and Trends.pdf
Virtual Data Room Industry Growth Statistics and Trends.pdf
 
Tft2 Task3 Essay
Tft2 Task3 EssayTft2 Task3 Essay
Tft2 Task3 Essay
 

More from Taibah University, College of Computer Science & Engineering

More from Taibah University, College of Computer Science & Engineering (20)

Lecture 1- Computer Organization and Architecture.pdf
Lecture 1- Computer Organization and Architecture.pdfLecture 1- Computer Organization and Architecture.pdf
Lecture 1- Computer Organization and Architecture.pdf
 
The paper the welfare state of the somali nation - a possible solution to t...
The paper   the welfare state of the somali nation - a possible solution to t...The paper   the welfare state of the somali nation - a possible solution to t...
The paper the welfare state of the somali nation - a possible solution to t...
 
Colonial intrusion and_the_somali_resistance
Colonial intrusion and_the_somali_resistanceColonial intrusion and_the_somali_resistance
Colonial intrusion and_the_somali_resistance
 
Lecture 3 (Contemporary approaches to Information Systems)
Lecture 3 (Contemporary approaches to Information Systems)Lecture 3 (Contemporary approaches to Information Systems)
Lecture 3 (Contemporary approaches to Information Systems)
 
Lecture 2 (major types of information systems in organizations)
Lecture 2 (major types of information systems in organizations)Lecture 2 (major types of information systems in organizations)
Lecture 2 (major types of information systems in organizations)
 
Practical session 1 (critical path analaysis)
Practical session 1 (critical path analaysis)Practical session 1 (critical path analaysis)
Practical session 1 (critical path analaysis)
 
Chapter 2 modeling the process and life-cycle
Chapter 2  modeling the process and life-cycleChapter 2  modeling the process and life-cycle
Chapter 2 modeling the process and life-cycle
 
Historical Perspective on the Challenge Facing the Somali Sacral Unity
Historical Perspective on the Challenge Facing the Somali Sacral UnityHistorical Perspective on the Challenge Facing the Somali Sacral Unity
Historical Perspective on the Challenge Facing the Somali Sacral Unity
 
Colonial intrusion and the Somali Resistance
Colonial intrusion and the Somali ResistanceColonial intrusion and the Somali Resistance
Colonial intrusion and the Somali Resistance
 
Lecture 8 (information systems and strategy planning)
Lecture 8  (information systems and strategy planning)Lecture 8  (information systems and strategy planning)
Lecture 8 (information systems and strategy planning)
 
Lecture1 data structure(introduction)
Lecture1 data structure(introduction)Lecture1 data structure(introduction)
Lecture1 data structure(introduction)
 
Lecture2 is331 data&infomanag(databaseenv)
Lecture2 is331 data&infomanag(databaseenv)Lecture2 is331 data&infomanag(databaseenv)
Lecture2 is331 data&infomanag(databaseenv)
 
Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)
 
Lecture6 is353(ea&data viewpoint )
Lecture6 is353(ea&data viewpoint )Lecture6 is353(ea&data viewpoint )
Lecture6 is353(ea&data viewpoint )
 
Lecture4 is353-ea(fea)
Lecture4 is353-ea(fea)Lecture4 is353-ea(fea)
Lecture4 is353-ea(fea)
 
Lecture3 is353-ea(togaf)
Lecture3 is353-ea(togaf)Lecture3 is353-ea(togaf)
Lecture3 is353-ea(togaf)
 
Lecture2 is353-ea(the zachma framework)
Lecture2 is353-ea(the zachma framework)Lecture2 is353-ea(the zachma framework)
Lecture2 is353-ea(the zachma framework)
 
Lecture1 is353-enterprise architectureconcept)
Lecture1 is353-enterprise architectureconcept)Lecture1 is353-enterprise architectureconcept)
Lecture1 is353-enterprise architectureconcept)
 
Lecture1 is313-(is-innovation&tech)
Lecture1 is313-(is-innovation&tech)Lecture1 is313-(is-innovation&tech)
Lecture1 is313-(is-innovation&tech)
 
Lab 1 (cs351) (computer tech & c++)
Lab 1 (cs351) (computer tech & c++)Lab 1 (cs351) (computer tech & c++)
Lab 1 (cs351) (computer tech & c++)
 

Recently uploaded

Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsManeerUddin
 

Recently uploaded (20)

Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture hons
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 

Lecture 4(Using Information Technology for Competitive Advantage)

  • 1. 1 1 Using Information Technology for Competitive Advantage Lecture 4 Abdisalam Issa-Salwe Business Information Systems MSc Finance and Legal Management Thames Valley University Abdisalam Issa-Salwe, Thames Valley University 2 Topic list  Porter’s five forces model  Value chain  EDI  Data warehousing  Data mining  Intelligent agents  Value added networks
  • 2. 2 Abdisalam Issa-Salwe, Thames Valley University 3 Abdisalam Issa-Salwe, Thames Valley University 4 Porter’s five forces model  All organisations operate in one or more industries. By the nature of their participation in an industry, they are affected by existing or potential uses of information technology
  • 3. 3 Abdisalam Issa-Salwe, Thames Valley University 5 Porter’s five forces model  Professor Michael Porter of Harvard University maintained that in every industry, competition depends on the collective strength of five basic forces  Interacting with these forces are the generic corporate strategies (see below).  IT can be a powerful agent to change the balance of power in and between these forces. Abdisalam Issa-Salwe, Thames Valley University 6 Porter’s five forces model (cont…)  New entrants can increase overall capacity in the industry, thereby reducing prices and incumbents' cost advantages.  IT can help create or raise barriers to entry by increasing mandatory investments in hardware and software, facilitating control over databases, or locking in customers to existing distribution channels.  There are many types of barriers to entry: switching costs, economies of scale, high investment in IT, economies of experience, access to distribution channels, and government policy
  • 4. 4 Abdisalam Issa-Salwe, Thames Valley University 7 Porter’s five forces model (cont…)  Intensity of industry rivalry depends on factors beyond the control of the individual firm,  such as degree of concentration, diversity, or dependency; rate of industry growth; or switching costs.  It is critical to understand the strategies of one's rivals in detail.  For instance, Ford's strategy depends on the strategies of Toyota, Nissan, GM, and Volkswagen, and vice versa. Abdisalam Issa-Salwe, Thames Valley University 8 Porter’s five forces model (cont…)  Threat of substitute products may arise from products and services in other industries.  Examples:  * the products of stock brokers and insurance companies now compete against banks for the investment dollar.  * the automobile eliminated the horse with buggy, and the silicon chip eliminated electromechanical adding machines. The life cycle of products can be reduced through the use of IT, such as Computer-Aided Design (CAD). IT has also provided the basis for creating new information- intensive products.
  • 5. 5 Abdisalam Issa-Salwe, Thames Valley University 9 Porter’s five forces model (cont…)  Bargaining power of buyers  Buyers drives prices down and the quality of products up.  Buyer power depends on the level of switching costs, the competitive position of the buyer in the industry (size, volume), whether the buyer can purchase a commodity product, or whether the buyer poses a serious threat of backward integration (i.e., buying out or merging with its suppliers).  Installing computer terminals at the buyers' site is one way to raise the buyers' cost of switching to other suppliers. Abdisalam Issa-Salwe, Thames Valley University 10 Porter’s five forces model (cont…)  Bargaining power of suppliers  It is in some ways the antithesis of buyer power.  The threat of forward integration (i.e., buying out or merging with its customers) is one determinant of supplier power.  Influential suppliers drive prices up and reduce the quality and quantity of products and services.  Supplier power also depends on size, volume, and concentration relative to other firms in the industry.
  • 6. 6 Abdisalam Issa-Salwe, Thames Valley University 11 Abdisalam Issa-Salwe, Thames Valley University 12
  • 7. 7 Abdisalam Issa-Salwe, Thames Valley University 13 Abdisalam Issa-Salwe, Thames Valley University 14 Value Chain Analysis  The value chain is a systematic approach to examining the development of competitive advantage. It was created by M. E. Porter in his book, Competitive Advantage (1980). The chain consists of a series of activities that create and build value. They culminate in the total value delivered by an organisation. The 'margin' depicted in the diagram is the same as added value. The organisation is split into 'primary activities' and 'support activities
  • 8. 8 Abdisalam Issa-Salwe, Thames Valley University 15 Value Chain Analysis (cont…)  The value chain begins with the data resource.  Information is developed from the data resource to support the knowledge environment of an intelligent learning organisation.  Data is the raw material for information which is the raw material for the knowledge environment.  Knowledge is the raw material for business intelligence that supports business strategies. Abdisalam Issa-Salwe, Thames Valley University 16 Value Chain Analysis (cont…)  Data is the individual raw facts that are out of context, have no meaning and are difficult to understand. Facts are numbers, characters, character strings, text, images, voice, video and any other form in which a fact may be presented. Data in context is facts that have meaning and can be readily understood. It is the raw facts in context with meaning and understanding, but is not yet information because it has no relevance or time frame.
  • 9. 9 Abdisalam Issa-Salwe, Thames Valley University 17 Electronic Data Interchange (EDI)  EDI was first developed by the automobile/transportation industry in the 1970s.  Today, it is widely used in a variety of industries, including distribution, finance and accounting, health care, manufacturing, purchasing, retail, tax form filing, and shipping.  Early EDI packages used rather simple standard forms that forced companies to convert data to fit the forms.  Newer EDI systems allow companies to create custom systems using simple programming or authoring tools. Abdisalam Issa-Salwe, Thames Valley University 18 Electronic Data Interchange (EDI) (cont…)  Electronic Data Interchange is the electronic exchange of routine business transactions.  Typical transactions include such documents as purchase orders, invoices, advance shipping notification, payments, etc.  Exchange of electronic data using inter-organisational information systems  Set of hardware, software, and standards that accommodate the EDI process  EDI defines the electronic exchange of structured business data, such as purchase orders, invoices, and shipping notices, typically between one organisation and another.  The relationship is usually between a vendor and customer.
  • 10. 10 Abdisalam Issa-Salwe, Thames Valley University 19 Electronic Data Interchange (EDI) (cont…)  It is important to differentiate between EDI and electronic commerce.  Electronic commerce encompasses all aspects of electronic business exchanges, including person-to- person interaction (collaboration), money transfers, data sharing and exchange, Web site merchant systems, and so on.  EDI as a subset of electronic commerce that encompasses the exchange of business information in a standardised electronic form. Abdisalam Issa-Salwe, Thames Valley University 20 Electronic Data Interchange (EDI) (cont…)  EDI can reduce costs, workforce requirements, and errors associated with retyping orders, invoices, and other documents.  With EDI, computer data already entered by one organisation is made available to a business partner.  EDI is typically handled using store- and-forward technologies similar to e-mail.
  • 11. 11 Abdisalam Issa-Salwe, Thames Valley University 21 Electronic Data Interchange (EDI) (cont…)  Two approaches in the implementation of EDI.  Many large organisations acquire or build their own proprietary systems, often in association with their business partners.  To work with a VAN (value added network) provider, which provides EDI transaction services, security, document interchange assistance, standard message formats, communication protocols, and communication parameters for EDI. Most VANs also provide a network on which to transmit information. Abdisalam Issa-Salwe, Thames Valley University 22
  • 12. 12 Abdisalam Issa-Salwe, Thames Valley University 23 Value Added Network (VAN)  A (VAN) Value Added Network is a third party who stores the data to be communicated. It serves as a middle person, so neither party can access the other’s private network. The main key to a VAN is that the other partner does not touch your network, as business partners initiate the sending or retrieving of the data from the VAN. Abdisalam Issa-Salwe, Thames Valley University 24 Value Added Network (VAN) (cont…)  With the data being sent to or received from the VAN by the business partners initiating the communication, business partners are insuring a safe method of data transportation.  The different ways of communicating to the VAN include dialup as well as FTP protocols.
  • 13. 13 Abdisalam Issa-Salwe, Thames Valley University 25 Business Intelligent  Business intelligence represent a popular trend in many public and private sector organisations.  Ideally, any manager or knowledge worker should be able to compose information requests without programmer assistance and achieve answers at the speed of thought.  Follow-up questions should be immediately asked and answered in order to maintain continuity of thought on a particular topic of importance. Abdisalam Issa-Salwe, Thames Valley University 26
  • 14. 14 Abdisalam Issa-Salwe, Thames Valley University 27 Data warehouse, data marts  Data warehouses are computer based information systems that are home for "secondhand" data that originated from either another application or from an external system or source.  Warehouses optimize database query and reporting tools because of their ability to analyse data, often from disparate databases and in interesting ways.  They are a way for managers and decision makers to extract information quickly and easily in order to answer questions about their business.  In other words, data warehouses are read-only, integrated databases designed to answer comparative and "what if" questions. Abdisalam Issa-Salwe, Thames Valley University 28 Data warehouse, data marts (cont…)  Data Marts:  Data in a data warehouse should be reasonably current, but not necessarily up to the minute, although developments in the data warehouse industry have made frequent and incremental data dumps more feasible.  Data marts are smaller than data warehouses and generally contain information from a single department of a business or organisation. The current trend in data warehousing is to develop a data warehouse with several smaller related data marts for specific kinds of queries and reports.
  • 15. 15 Abdisalam Issa-Salwe, Thames Valley University 29 A Data Warehouse Architecture Abdisalam Issa-Salwe, Thames Valley University 30 Data mining  Data mining is primarily used today by companies with a strong consumer focus - retail, financial, communication, and marketing organisations.  It enables these companies to determine relationships among "internal" factors such as price, product positioning, or staff skills, and "external" factors such as economic indicators, competition, and customer demographics.
  • 16. 16 Abdisalam Issa-Salwe, Thames Valley University 31 Data mining  Data mining, or knowledge discovery, is the computer-assisted process of digging through and analysing enormous sets of data and then extracting the meaning of the data.  Data mining tools predict behaviors and future trends, allowing businesses to make proactive, knowledge-driven decisions.  Data mining tools can answer business questions that traditionally were too time consuming to resolve.  They scour databases for hidden patterns, finding predictive information that experts may miss because it lies outside their expectations. Abdisalam Issa-Salwe, Thames Valley University 32 Data mining (cont…)  With data mining, a retailer could use point-of-sale records of customer purchases to send targeted promotions based on an individual's purchase history.  By mining demographic data from comment or warranty cards, the retailer could develop products and promotions to appeal to specific customer segments
  • 17. 17 Abdisalam Issa-Salwe, Thames Valley University 33 Data mining (cont…)  Data mining consists of five major elements:  Extract, transform, and load transaction data onto the data warehouse system.  Store and manage the data in a multidimensional database system.  Provide data access to business analysts and information technology professionals.  Analyse the data by application software.  Present the data in a useful format, such as a graph or table. Abdisalam Issa-Salwe, Thames Valley University 34
  • 18. 18 Abdisalam Issa-Salwe, Thames Valley University 35 Tutorial Question Michael Porter described a concept that has become known as the "five forces model". This concept involves a relationship between competitors within an industry, potential competitors, suppliers, buyers and alternative solutions to the problem being addressed. Could you critical discus Porter’s five force model?