{"id":308,"date":"2018-12-27T19:24:02","date_gmt":"2018-12-28T00:24:02","guid":{"rendered":"http:\/\/pressbooks.library.upei.ca\/smallbusinessmanagement\/chapter\/chapter-15-managing-information-and-technology-exploring-business\/"},"modified":"2020-01-06T09:58:37","modified_gmt":"2020-01-06T14:58:37","slug":"chapter-15-managing-information-and-technology-exploring-business","status":"publish","type":"chapter","link":"https:\/\/pressbooks.library.upei.ca\/smallbusinessmanagement\/chapter\/chapter-15-managing-information-and-technology-exploring-business\/","title":{"raw":"Chapter 15: Managing Information and Technology","rendered":"Chapter 15: Managing Information and Technology"},"content":{"raw":"<div class=\"part\" id=\"chapter-15-managing-information-and-technology\">\r\n<div class=\"part-title-wrap\">\r\n<p class=\"part-title\" style=\"text-align: left\"><span style=\"font-family: Roboto, Helvetica, Arial, sans-serif;font-size: 1.3rem;font-weight: bold;text-align: left\">Data versus Information<\/span><\/p>\r\n\r\n<\/div>\r\n<div class=\"ugc part-ugc\">\r\n<div class=\"chapter standard\" id=\"slug-15-1-data-versus-information\">\r\n<div class=\"ugc chapter-ugc\">\r\n<div class=\"bcc-box bcc-highlight\" id=\"frank-ch15_s01_n01\">\r\n<h3 class=\"title\">Learning Objectives<\/h3>\r\n<ol id=\"frank-ch15_s01_l01\" class=\"orderedlist\">\r\n \t<li>Distinguish between data and information.<\/li>\r\n \t<li>Define information system (IS) and identify the tasks of the information systems manager.<\/li>\r\n<\/ol>\r\n<\/div>\r\n<p id=\"frank-ch15_s01_p01\" class=\"nonindent para editable block\">By the time the company took the plunge and committed $100 million to marketing-related information technology (IT), Caesars had been collecting and storing data about customers for almost a decade. \u201cWhile the company thought it important to collect customer information,\u201d recalls a senior marketing executive, \u201cthe problem was we had millions of customers to collect information on, but we had no systematic way of turning it into a marketing decision. We didn\u2019t know what to do with it.\u201d In other words, Caesars was collecting a lot of <em class=\"emphasis\">data<\/em> but not necessarily any <em class=\"emphasis\">information<\/em>. So what\u2019s the difference?<\/p>\r\n<p id=\"frank-ch15_s01_p02\" class=\"indent para editable block no-indent\">As an example, suppose that you want to know how you\u2019re doing in a particular course. So far, you\u2019ve taken two 20-question multiple-choice tests. On the first, you got questions 8, 11, and 14 wrong; on the second, you did worse, missing items 7, 15, 16, and 19. The items that you got wrong are merely [pb_glossary id=\"1461\"]<strong>data<\/strong>[\/pb_glossary]\u2014unprocessed facts. What\u2019s important is your total score. You scored 85 on the first exam and 80 on the second. These two numbers constitute [pb_glossary id=\"1462\"]<strong>information<\/strong>[\/pb_glossary]\u2014data that have been processed, or turned into some useful form. Knowing the questions that you missed simply supplied you with some data for calculating your scores.<\/p>\r\n<p id=\"frank-ch15_s01_p03\" class=\"indent para editable block no-indent\">Now let\u2019s fast-forward to the end of the semester. At this point, in addition to taking the two tests, you\u2019ve written two papers and taken a final. You got a 90 and 95 on the papers and a 90 on the final. You now have more processed data, but you still want to organize them into more useful information. What you want to know is your average grade for the semester. To get the information you want, you need yet more data\u2014namely, the weight assigned to each graded item. Fortunately, you\u2019ve known from day one that each test counts 20 percent, each paper 10 percent, and the final exam 40 percent. A little math reveals an average grade of 87.<\/p>\r\n<p id=\"frank-ch15_s01_p04\" class=\"indent para editable block no-indent\">Though this is the information you\u2019re interested in, it may be mere data to your instructor, who may want different information: an instructor who intends to scale grades, for example, will want to know the average grade for the entire class. You\u2019re hoping that the class average is low enough to push your average of 87 up from a B+ to an A\u2013 (or maybe even an A\u2014it doesn\u2019t hurt to hope for the best). The moral of the story is that what constitutes <em class=\"emphasis\">information<\/em> at one stage can easily become <em class=\"emphasis\">data<\/em> at another: or, one person\u2019s information can be another person\u2019s data.<\/p>\r\n<p id=\"frank-ch15_s01_p05\" class=\"indent para editable block no-indent\">As a rule, you want information; data are good only for generating the information. So, how do you convert data into information that\u2019s useful in helping you make decisions and solve problems? That\u2019s the question we\u2019ll explore in the next section.<\/p>\r\n\r\n<div class=\"section\" id=\"frank-ch15_s01_s01\">\r\n<h2 class=\"title editable block\">Information Systems<\/h2>\r\n<p id=\"frank-ch15_s01_s01_p01\" class=\"nonindent para editable block\">To gather and process data into information and distribute it to people who need it, organizations develop an [pb_glossary id=\"1463\"]information system (IS)[\/pb_glossary]\u2014the combination of technologies, procedures, and people who collect and distribute the information needed to make decisions and coordinate and control company-wide activities. In most large organizations, the IS is operated by a senior management team that includes a chief information officer (CIO) who oversees information and telecommunications systems. There may also be a chief technology officer who reports to the CIO and oversees IT planning and implementation. As for information managers, their tasks include the following:<\/p>\r\n\r\n<ul id=\"frank-ch15_s01_s01_l01\" class=\"itemizedlist editable block\">\r\n \t<li>Determining the information needs of members of the organization<\/li>\r\n \t<li>Collecting the appropriate data<\/li>\r\n \t<li>Applying technology to convert data into information<\/li>\r\n \t<li>Directing the flow of information to the right people<\/li>\r\n<\/ul>\r\n<div class=\"section\" id=\"frank-ch15_s01_s01_s01\">\r\n<h2 class=\"title editable block\">Differences in Information Needs<\/h2>\r\n<p id=\"frank-ch15_s01_s01_s01_p01\" class=\"nonindent para editable block\">The job is complicated by the fact that information needs vary according to different levels, operational units, and functional areas. Consider, for instance, the information needs of managers at several levels:<\/p>\r\n\r\n<ul id=\"frank-ch15_s01_s01_s01_l01\" class=\"itemizedlist editable block\">\r\n \t<li><em class=\"emphasis\">Top managers<\/em> need information for planning, setting objectives, and making major strategic decisions.<\/li>\r\n \t<li><em class=\"emphasis\">Middle managers<\/em> need information that helps them allocate resources and oversee the activities under their control.<\/li>\r\n \t<li><em class=\"emphasis\">First-line managers<\/em> require information that helps them supervise employees, oversee daily operations, and coordinate activities.<\/li>\r\n<\/ul>\r\n<p id=\"frank-ch15_s01_s01_s01_p02\" class=\"indent para editable block no-indent\"><a class=\"xref\" href=\"#frank-ch15_s01_s01_s01_f01\">Figure 15.1 \u201cInformation Needs and Flows\u201d<\/a> illustrates a hypothetical hierarchy of information needs at Caesars. The president, for example, needs information to determine whether profitability is up or down or if the organization is facing any new competitive threats. At the vice-presidential level, executives need information that will help them in controlling and planning for specific areas of operations. The VP of casino operations, for example, might need to know which operations are most profitable\u2014slots, table games, or other gaming activities. The VP of hotel operations might want to know whether room revenues are going up or down.<\/p>\r\n\r\n<h3 class=\"indent para editable block\"><span class=\"title-prefix\">Figure 15.1<\/span> Information Needs and Flows<\/h3>\r\n<h3 class=\"indent para editable block\"><a style=\"text-indent: 2em;font-size: 0.8em;font-family: Tinos, Georgia, serif;font-weight: normal\"><img src=\"http:\/\/pressbooks.library.upei.ca\/smallbusinessmanagement\/wp-content\/uploads\/sites\/23\/2018\/12\/5b54a190896bc0f1d5bde16e07681ed8.jpg\" alt=\"Information Needs and Flows\" style=\"max-width: 497px\" \/><\/a><\/h3>\r\n<p id=\"frank-ch15_s01_s01_s01_p03\" class=\"indent para editable block no-indent\">The information needs of middle-level and lower-level managers are different still. The slot-machine manager might want to know whether the placement of machines on the casino floor affects profitability. The poker manager might want to know whether all table games comply with state regulations. At a lower level, the pit manager (who\u2019s in charge of table games in a particular area) needs to know whether there\u2019s a card-counter at his blackjack table or whether a dealer\u2019s activities are suspicious.<\/p>\r\n<p id=\"frank-ch15_s01_s01_s01_p04\" class=\"indent para editable block no-indent\">Even at a given level, information needs can vary. A manager on the hotel side of the business, for instance, doesn\u2019t care much about profitability at the poker tables, while a pit manager doesn\u2019t have much use for hotel housekeeping reports. The reports that an accountant needs would hardly be the same as those needed by a human resources manager.<\/p>\r\n\r\n<\/div>\r\n<div class=\"section\" id=\"frank-ch15_s01_s01_s02\">\r\n<h2 class=\"title editable block\">The Need to Share Information<\/h2>\r\n<p id=\"frank-ch15_s01_s01_s02_p01\" class=\"nonindent para editable block\">Having stressed the differences in information needs, we should pause to remind ourselves that the managerial levels, operations, and functions of every organization are intertwined, to a greater or lesser degree. If you\u2019ll glance again at <a class=\"xref\" href=\"#frank-ch15_s01_s01_s01_f01\">Figure 15.1 \u201cInformation Needs and Flows\u201d<\/a>, you\u2019ll be reminded that organizations need to share information, that information must flow, and that it must flow in both directions, bottom-up and top-down. At Caesars, for instance, both casino and hotel managers are concerned about security, which is also of interest to managers in different functional areas. Information supplied by the security group is obviously vital to managers in the gaming areas, but HR managers also need it to screen potential employees. Marketing information is clearly important to both casino and hotel operations: to maximize overall profits, the company uses marketing data to fill hotel rooms with customers who spend big in the casinos.[footnote]Kilby, J., Jim Fox, and Anthony F. Lucas, Casino Operations and Management, 2nd ed. (Hoboken, NJ: John Wiley &amp; Sons, 2005), 183\u201384.[\/footnote]<\/p>\r\n<p id=\"frank-ch15_s01_s01_s02_p02\" class=\"indent para editable block no-indent\">Caesars\u2019s information needs entail more than allowing individuals in a given casino to share information; information has to be shared among all of Caesars\u2019s thirty-nine casinos. Thus, Caesars relies on an <em class=\"emphasis\">integrated IT system<\/em> that allows real-time communication among all its properties. Installing the system (in the mid-1990s) was complicated, and not everyone in the organization liked the idea. Some managers felt that information sharing threatened their independence. Others, including some in the IT group, doubted that a large number of separate IT systems could be adequately integrated. To get everyone on board, John Bushy, then senior VP of information technology, pledged that he wouldn\u2019t cut his hair until the system was up and running. By the time it was operational in 1997, Bushy had hair down to his shoulders, but it was worth it: Caesars\u2019s ability to share real-time information across all its properties has been a major factor in the company\u2019s success. Caesars\u2019s new system cut costs by $20 million a year, increased brand recognition, and increased the number of customers playing at more than one Caesars property by 72 percent.[footnote]LeVinson, M., \u201cJackpot! Harrah\u2019s Big Payoff Came from Using IT to Manage Customer Information,\u201d CIO Magazine, February 1, 2001, <a target=\"_blank\" href=\"http:\/\/www.cio.com\/archive\/020101\/harrah.html\" rel=\"noopener noreferrer\">http:\/\/www.cio.com\/archive\/020101\/harrah.html<\/a> (accessed June 2, 2006).[\/footnote][footnote]Global Supply Chain Management Forum, \u201cHarrah\u2019s Entertainment Inc.: Real-Time CRM in a Service Supply Chain,\u201d Global Supply Chain Management Forum, Stanford Graduate School of Business, http:\/\/www.gsb.stanford.edu\/scforum\/login\/pdfs\/Harrah.pdf (accessed November 14, 2011).[\/footnote]<\/p>\r\n\r\n<\/div>\r\n<div class=\"section\" id=\"frank-ch15_s01_s01_s03\">\r\n<h2 class=\"title editable block\">Enterprise Systems<\/h2>\r\n<p id=\"frank-ch15_s01_s01_s03_p01\" class=\"nonindent para editable block\">Many large and mid-size companies rely on a highly integrated system called an [pb_glossary id=\"1465\"]<strong>enterprise resource planning (ERP) system<\/strong>[\/pb_glossary] to channel information to multiple users. To understand what an ERP system does, forget about the P for <em class=\"emphasis\">planning<\/em> (it really doesn\u2019t have much to do with planning) and the R for <em class=\"emphasis\">resource<\/em> (it\u2019s an imprecise term).[footnote]Koch, C., \u201cThe ABCs of ERP,\u201d CIO.com, http:\/\/wikifab.dimf.etsii.upm.es\/wikifab\/images\/d\/da\/The_ABCs_of_ERP.pdf (accessed November 14, 2011).[\/footnote] Focus on the E for <em class=\"emphasis\">enterprise<\/em>. An ERP system integrates the computer needs of all activities <em class=\"emphasis\">across the enterprise<\/em> into a single system that serves all users. Such broad integration isn\u2019t a simple task, and you wouldn\u2019t be the first person to wonder whether it wouldn\u2019t be easier to give each department its own computer system. Salespeople, for example, need a system that tracks sales and generates sales reports. Meanwhile, manufacturing personnel don\u2019t need to track sales but do need to track inventory. What\u2019s the problem with stand-alone computer systems? Quite simply, users in various departments can\u2019t share information or communicate with each other.<\/p>\r\n\r\n<\/div>\r\n<div class=\"section\" id=\"frank-ch15_s01_s01_s04\">\r\n<h2 class=\"title editable block\">What If You Don\u2019t Have ERP?<\/h2>\r\n<p id=\"frank-ch15_s01_s01_s04_p01\" class=\"nonindent para editable block\">Imagine that you\u2019re a sales manager for a fairly large manufacturing company that produces and sells treadmills. Like every other department in the organization, you have your own computer system. A local sporting-goods store orders one hundred treadmills through a regional sales representative. It\u2019s your job to process the order. It wouldn\u2019t be much of a problem for you to go into your computer and place the order. But how would you know if the treadmills were actually in stock and when they could be delivered? How would you know if the customer\u2019s credit was any good? You could call the warehouse and ask if the treadmills are in stock. If they are, you\u2019d tell the warehouse manager that you\u2019re placing an order and hope that the treadmills are still in stock by the time your order gets there two days later. While you\u2019re at it, you\u2019d better ask for an expected delivery date. As a final precaution, you should probably call the finance department and ask about your customer\u2019s credit rating. So now you\u2019ve done your job, and it can hardly be your fault that because the cost of manufacturing treadmills has gone up, accounting has recommended an immediate price increase that hasn\u2019t shown up in your computer system yet.<\/p>\r\n\r\n<\/div>\r\n<div class=\"section\" id=\"frank-ch15_s01_s01_s05\">\r\n<h2 class=\"title editable block\">What If You Do Have ERP?<\/h2>\r\n<p id=\"frank-ch15_s01_s01_s05_p01\" class=\"nonindent para editable block\">Wouldn\u2019t it be easier if you had an ERP system like the one illustrated in <a class=\"xref\" href=\"#frank-ch15_s01_s01_s05_f01\">Figure 15.2 \u201cERP System\u201d<\/a>\u2014one that lets you access the same information as every other department? Then you could find out if there were one hundred treadmills in stock, the expected delivery date, your customer\u2019s credit rating, and the current selling price\u2014without spending most of the day exchanging phone calls, e-mails, text messages, and faxes. You\u2019d be in a better position to decide whether you can give your customer credit, and you could promise delivery (at a correct price) on a specified date. <em class=\"emphasis\">Then<\/em>, you\u2019d enter the order into the system. The information that you entered would be immediately available to everyone else. The warehouse would know what needs to be shipped, to whom, and when. The accounting department would know that a sale had been made, the dollar amount, and where to send the bill. In short, everyone would have up-to-date information, and no one would have to reinput any data.<\/p>\r\n\r\n<div class=\"figure full large-height editable block\" id=\"frank-ch15_s01_s01_s05_f01\">\r\n<h3 class=\"nonindent title\"><span class=\"title-prefix\">Figure 15.2<\/span> ERP System<\/h3>\r\n<p class=\"indent\"><a>\r\n<img src=\"http:\/\/pressbooks.library.upei.ca\/smallbusinessmanagement\/wp-content\/uploads\/sites\/23\/2018\/12\/adda2ce207c76b75e7d01f7e894a4922.jpg\" alt=\"The ERP System: manages information flow among all database applications. Finance: reports customer's credit rating and current selling prices; Human resources: recruits, trains, evaluates, and compensates salespeople; Marketing: coordinates sales activities and handles customer-relationship management; Operations: controls inventory throughout the supply chain, from procurement to distribution; Accounting: records sales and payments and tracks business performance.\" style=\"max-width: 497px\" \/>\r\n<\/a><\/p>\r\n\r\n<\/div>\r\n<div class=\"bcc-box bcc-success\" id=\"frank-ch15_s01_s01_s05_n01\">\r\n<h3 class=\"title\">Key Takeaways<\/h3>\r\n<ul id=\"frank-ch15_s01_s01_s05_l01\" class=\"itemizedlist\">\r\n \t<li><strong class=\"emphasis bold\">Data<\/strong> are unprocessed facts. <strong class=\"emphasis bold\">Information<\/strong> is data that have been processed or turned into some useful form.<\/li>\r\n \t<li>To gather and process data into information and distribute it to people who need it, an organization develops an <strong class=\"emphasis bold\">information system (IS)<\/strong>\u2014the combination of technologies, procedures, and people who collect and distribute the information needed to make decisions and to coordinate and control company-wide activities.<\/li>\r\n \t<li>In most large organizations, the information system is operated by a senior management team that includes a <strong class=\"emphasis bold\">chief information officer (CIO)<\/strong> who oversees information and telecommunications systems.<\/li>\r\n \t<li>There may also be a <strong class=\"emphasis bold\">chief technology officer<\/strong> who reports to the CIO and oversees IT planning and implementation.<\/li>\r\n \t<li>\r\n<p class=\"nonindent para\">The tasks of <strong class=\"emphasis bold\">information managers<\/strong> include:<\/p>\r\n\r\n<ol id=\"frank-ch15_s01_s01_s05_l02\" class=\"orderedlist\">\r\n \t<li>Determining the information needs of people in the organization<\/li>\r\n \t<li>Collecting the appropriate data<\/li>\r\n \t<li>Applying technology to convert data into information<\/li>\r\n \t<li>Directing the flow of information to the right people<\/li>\r\n<\/ol>\r\n<\/li>\r\n \t<li>The job is complicated by the fact that information needs vary according to different levels, operational units, and functional areas.<\/li>\r\n \t<li>In addition, information must be shared. To channel information to multiple users, large and mid-size companies often rely on a highly integrated system called an <strong class=\"emphasis bold\">enterprise resource planning (ERP) system<\/strong>.<\/li>\r\n \t<li>An ERP system integrates the computer needs of all business activities <em class=\"emphasis\">across the enterprise<\/em> into a single computer system that serves all users.<\/li>\r\n<\/ul>\r\n<\/div>\r\n<div class=\"bcc-box bcc-info\" id=\"frank-ch15_s01_s01_s05_n02\">\r\n<h3 class=\"title\">Exercises<\/h3>\r\n<ol id=\"frank-ch15_s01_s01_s05_l03\" class=\"orderedlist\">\r\n \t<li>Using the college-application process as an example, explain the difference between <em class=\"emphasis\">data<\/em> and <em class=\"emphasis\">information<\/em>. Identify the categories of data that you supplied on your college application and the information generated from them by the admissions department.<\/li>\r\n \t<li>\r\n<p class=\"nonindent simpara\"><strong class=\"emphasis bold\">(AACSB) Analysis<\/strong><\/p>\r\n<p id=\"frank-ch15_s01_s01_s05_p02\" class=\"indent para\">Consider these three positions at Starbucks: retail store manager (in charge of the day-to-day operations at one store), district manager (responsible for the operations at multiple stores), and president of Starbucks North America (in charge of operations throughout the United States, Canada, and Mexico). Identify the information needs of managers at each level.<\/p>\r\n<\/li>\r\n \t<li>\r\n<p class=\"nonindent simpara\"><strong class=\"emphasis bold\">(AACSB) Analysis<\/strong><\/p>\r\n<p id=\"frank-ch15_s01_s01_s05_p03\" class=\"indent para\">In what ways could a large automobile dealership, with a service shop and a body shop, benefit from an ERP system?<\/p>\r\n<\/li>\r\n<\/ol>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<div class=\"chapter standard\" id=\"slug-15-2-managing-data\">\r\n<div class=\"chapter-title-wrap\">\r\n<h1 class=\"chapter-title\" style=\"text-align: center\">Managing Data<\/h1>\r\n<\/div>\r\n<div class=\"ugc chapter-ugc\">\r\n<div id=\"frank-ch15_s02_n01\" class=\"bcc-box bcc-highlight\">\r\n<h3 class=\"title\">Learning Objective<\/h3>\r\n<ol id=\"frank-ch15_s02_l01\" class=\"orderedlist\">\r\n \t<li>Explain how IS managers capture, store, and analyze data.<\/li>\r\n<\/ol>\r\n<\/div>\r\n<p id=\"frank-ch15_s02_p01\" class=\"indent para editable block no-indent\">Did you ever think about how much data you yourself generate? Just remember what you went through to start college. First, you had to fill out application forms asking you about test scores, high school grades, extracurricular activities, and finances, plus demographic data about you and your family. Once you\u2019d picked a college, you had to supply data on your housing preferences, the curriculum you wanted to follow, and the party who\u2019d be responsible for paying your tuition. When you registered for classes, you gave more data to the registrar\u2019s office. When you arrived on campus, you gave out still more data to have your ID picture taken, to get your computer and phone hooked up, to open a bookstore account, and to buy an on-campus food-charge card. Once you started classes, data generation continued on a daily basis: your food card and bookstore account, for example, tracked your various purchases, and your ID tracked your coming and going all over campus. And you generated grades.<\/p>\r\n<p id=\"frank-ch15_s02_p02\" class=\"indent para editable block no-indent\">And all these data apply to just one aspect of your life. You also generated data every time you used your credit card and your cell phone. Who uses all these data? How are they collected, stored, analyzed, and distributed in organizations that have various reasons for keeping track of you?<\/p>\r\n\r\n<div id=\"frank-ch15_s02_s01\" class=\"section\">\r\n<h2 class=\"title editable block no-indent\">Data and Databases<\/h2>\r\n<p id=\"frank-ch15_s02_s01_p01\" class=\"nonindent para editable block no-indent\">To answer such questions, let\u2019s go back to our Caesars example. As we\u2019ve seen, Caesars collects a vast amount of data. Its hotel system generates data when customers make reservations, check in, buy food and beverages, purchase stuff at shops, attend entertainment events, and even relax at the spa. In the casino, customers apply for rewards programs, convert cash to chips (and occasionally chips back to cash), try their luck at the tables and slots, and get complimentary drinks. Then, there are the data generated by the activities of the company itself: employees, for instance, generate payroll and benefits data, and retail operations generate data every time they buy or sell something. Moreover, if we added up all these data, we\u2019d have only a fraction of the amount generated by the company\u2019s gaming operations.<\/p>\r\n<p id=\"frank-ch15_s02_s01_p02\" class=\"indent para editable block no-indent\">How does Caesars handle all these data? First of all, it captures and stores them in several [pb_glossary id=\"1466\"]<strong>databases<\/strong>[\/pb_glossary]\u2014 electronic collections of related data that can be accessed by various members of the organization. Think of databases as filing cabinets that can hold massive amounts of organized information, such as revenues and costs from hotel activities, casino activities, and events reservations at each of Caesars facilities.<\/p>\r\n\r\n<div id=\"frank-ch15_s02_s01_s01\" class=\"section\">\r\n<h2 class=\"title editable block\">Warehousing and Mining Data<\/h2>\r\n<p id=\"frank-ch15_s02_s01_s01_p01\" class=\"nonindent para editable block\">What if Caesars wants to target customers who generate a lot of revenue, by using a program designed to entice return visits? How would it identify and contact these people? Theoretically, it could search through the relevant databases\u2014those that hold customer-contact information (such as name and address) and information about customer activity in the company\u2019s hotels, casinos, and entertainment venues. It would be a start, perhaps, but it wouldn\u2019t be very efficient. First of all, it would be time-consuming. Plus, what if the same data weren\u2019t stored in a similar fashion in each database? In that case, it would be quite hard to combine the data in a meaningful way. To address this problem, Caesars managers will rely on a system like the one illustrated in <a class=\"xref\" href=\"#frank-ch15_s02_s01_s01_f01\">Figure 15.3 \u201cThe Data Mining Process\u201d<\/a>, which calls for moving all the relevant data into a [pb_glossary id=\"1467\"]<strong>data warehouse<\/strong>[\/pb_glossary]\u2014a centralized database in which data from several databases are consolidated and organized so that they can be easily analyzed.<\/p>\r\n\r\n<h3><span class=\"title-prefix\">Figure 15.3<\/span> The Data Mining Process<\/h3>\r\n<div id=\"frank-ch15_s02_s01_s01_f01\" class=\"caption\" style=\"text-align: center;font-size: .8em\">\r\n<p class=\"indent\"><a><img style=\"max-width: 497px\" src=\"http:\/\/pressbooks.library.upei.ca\/smallbusinessmanagement\/wp-content\/uploads\/sites\/23\/2018\/12\/fcf140f3e8e4d0fb4ef09e8e5507e4b0.jpg\" \/> <\/a><\/p>\r\n\r\n<h4 class=\"indent\"><a>Data transformation -&gt; Data warehouse -&gt; Data mining\"&gt;\r\n<\/a><\/h4>\r\n<\/div>\r\n<\/div>\r\n<div id=\"frank-ch15_s02_s01_s02\" class=\"section\">\r\n<h2 class=\"title editable block\">Data Mining<\/h2>\r\n<p id=\"frank-ch15_s02_s01_s02_p01\" class=\"nonindent para editable block\">With the data in one central location, management can find out everything it needs to about a particular group of customers. It can also use the data to address some pretty interesting questions. Why do people come to our casinos? How can we keep customers coming back? How can we increase the number of visits per customer? How can we increase the amount they spend on each visit? What incentives (such as free dinners, hotel rooms, or show tickets) do our customers like most? To come up with answers to these questions, they\u2019ll perform a technique called [pb_glossary id=\"1470\"]<strong>data mining<\/strong>[\/pb_glossary]\u2014the process of searching and analyzing large amounts of data to reveal patterns and trends that can be used to predict future behavior.<\/p>\r\n\r\n<\/div>\r\n<div id=\"frank-ch15_s02_s01_s03\" class=\"section\">\r\n<h2 class=\"title editable block\">Data Mining and Customer Behavior<\/h2>\r\n<p id=\"frank-ch15_s02_s01_s03_p01\" class=\"nonindent para editable block\">By data-mining its customer-based data warehouse, Caesars\u2019s management can discover previously unknown relationships between the general behavior of its customers and that of a certain group of customers (namely, the most profitable ones). Then, it can design incentives to appeal specifically to those people who will generate the most profit for the company.<\/p>\r\n<p id=\"frank-ch15_s02_s01_s03_p02\" class=\"indent para editable block no-indent\">To get a better idea of how data mining works, let\u2019s simplify a description of the process at Caesars. First, we need to know how the casino gathered the data to conduct its preliminary analysis. Most customers who play the slots use a Caesars player\u2019s card that offers incentives based on the amount of money that they wager on slot machines, video poker, and table games.[footnote]Caesars, \u201cTotal Rewards,\u201d https:\/\/www.totalrewards.com\/TotalRewards\/RewardsAndBenefits.do?page=overview (accessed November 14, 2011).[\/footnote] To get the card, a customer must supply some personal information, such as name, address, and phone number. From Caesars\u2019s standpoint, the card is extremely valuable because it can reveal a lot about the user\u2019s betting behavior: actual wins and losses, length of time played, preferred machines and coin denominations, average amount per bet, and\u2014most important\u2014the speed with which coins are deposited and buttons pushed.[footnote]Shook, R. L., Jackpot! Harrah\u2019s Winning Secrets for Customer Loyalty (Hoboken, NJ: John Wiley &amp; Sons, 2003), 228\u201329.[\/footnote] As you can see from <a class=\"xref\" href=\"#frank-ch15_s02_s01_s01_f01\">Figure 15.3 \u201cThe Data Mining Process\u201d<\/a>, Caesars\u2019s primary data source was <em class=\"emphasis\">internal<\/em>\u2014generated by the company itself rather than provided by an outside source\u2014and drew on a marketing database developed for <em class=\"emphasis\">customer relationship management<\/em> (CRM).<\/p>\r\n\r\n<h3><span class=\"title-prefix\">Figure 15.4\u00a0Caesars Resort<\/span><\/h3>\r\n<div id=\"frank-ch15_s02_s01_s03_f01\" class=\"caption\" style=\"text-align: center;font-size: .8em;max-width: 500px\">\r\n<div class=\"wp-nocaption size-full wp-image-1482\"><a><img class=\"size-full wp-image-1482\" src=\"http:\/\/pressbooks.library.upei.ca\/smallbusinessmanagement\/wp-content\/uploads\/sites\/23\/2018\/12\/15.2.0.jpg\" alt=\"A view of the Caesar's Palace Forum Shops just after sunrise. Sunrise and night are very different in Las Vegas, as one would expect. There's nobody on the street at sunrise, except for a few people who are just calling it a night. The building is beautifully lit with purple light.\" width=\"500\" \/><\/a><\/div>\r\n<\/div>\r\nCaesars collects data on its customers by using players\u2019 cards to gather information and to track betting behavior.\u00a0[footnote]zhouxuan12345678 \u2013 <a href=\"https:\/\/www.flickr.com\/photos\/andrewbain\/3899715321\">Caesar\u2019s Palace, Las Vegas<\/a> \u2013 CC BY-SA 2.0.[\/footnote]\r\n<p id=\"frank-ch15_s02_s01_s03_p03\" class=\"indent para editable block no-indent\">What does the casino do with the data that it\u2019s mined? Caesars was most interested in \u201c[pb_glossary id=\"1473\"]first trippers[\/pb_glossary]\u201d\u2014first-time casino customers. In particular, it wanted to know which of these customers should be enticed to return. By analyzing the data collected from player\u2019s-card applications and from customer\u2019s actual play at the casino (even if for no more than an hour), Caesars could develop a profile of a profitable customer. Now, when a first-timer comes into any of its casinos and plays for a while, Caesars can instantly tell whether he or she fits the profitable-customer profile. To lure these people back for return visits, it makes generous offers of free or reduced-rate rooms, meals, entertainment, or free chips (the incentive of choice for Caesars\u2019s preferred customers). These customers make up 26 percent of all Caesars\u2019s customers and generate 82 percent of its revenues. Surprisingly, they\u2019re not the wealthy high rollers to whom Caesars had been catering for years. Most of them are regular working people or retirees with available time and income and a fondness for slots. They generally stop at the casino on the way home from work or on a weekend night and don\u2019t stay overnight. They enjoy the thrill of gambling, and you can recognize them because they\u2019re the ones who can\u2019t push the button or pump tokens in fast enough.[footnote]Loveman, G., \u201cDiamonds in the Data Mine,\u201d Harvard Business Review, May 2003, 3.[\/footnote]<\/p>\r\n\r\n<div id=\"frank-ch15_s02_s01_s03_n01\" class=\"bcc-box bcc-success\">\r\n<h3 class=\"title\">Key Takeaways<\/h3>\r\n<ul id=\"frank-ch15_s02_s01_s03_l01\" class=\"itemizedlist\">\r\n \t<li>Organizations capture and store data in <strong class=\"emphasis bold\">databases<\/strong>\u2014electronic collections of related data that can be accessed by various people in the organization.<\/li>\r\n \t<li>To facilitate data analysis, IS managers may move data from various databases into a <strong class=\"emphasis bold\">data warehouse<\/strong>\u2014a centralized database in which data are consolidated and organized for efficient analysis.<\/li>\r\n \t<li>To come up with answers to a huge range of questions, managers perform a technique called <strong class=\"emphasis bold\">data mining<\/strong>\u2014the process of searching and analyzing large amounts of data to reveal patterns and trends that can be used to predict future behavior.<\/li>\r\n<\/ul>\r\n<\/div>\r\n<div id=\"frank-ch15_s02_s01_s03_n02\" class=\"bcc-box bcc-info\">\r\n<h3 class=\"title\">Exercise<\/h3>\r\n<p class=\"nonindent simpara\">(AACSB) Analysis<\/p>\r\n<p id=\"frank-ch15_s02_s01_s03_p04\" class=\"indent para\">Caesars uses data mining to identify its most profitable customers and predict their future behavior. It then designs incentives to appeal specifically to these customers. Do you see any ethical problems with this process? Is it ethical to encourage people to gamble? Explain your answer.<\/p>\r\n\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<div class=\"chapter standard\" id=\"slug-15-3-types-of-information-systems\">\r\n<div class=\"chapter-title-wrap\">\r\n<h1 class=\"chapter-title\" style=\"text-align: center\">Types of Information Systems<\/h1>\r\n<\/div>\r\n<div class=\"ugc chapter-ugc\">\r\n<div class=\"bcc-box bcc-highlight\" id=\"frank-ch15_s03_n01\">\r\n<h3 class=\"title\">Learning Objective<\/h3>\r\n<ol id=\"frank-ch15_s03_l01\" class=\"orderedlist\">\r\n \t<li>Discuss ways in which an IS can be designed to meet the needs of individuals at various organizational levels.<\/li>\r\n<\/ol>\r\n<\/div>\r\n<p id=\"frank-ch15_s03_p01\" class=\"nonindent para editable block\">As we saw earlier, different managers, operational units, and functional areas have different information needs. That\u2019s why organizations often tailor information systems to meet particular needs. Caesars\u2019s IT group, for example, developed the Player Contact System [footnote]Dunn, D., \u201cClient-Tracking System Helps Harrah\u2019s Tailor Sales Efforts for Frequent Visitors,\u201d Information Week, November 4, 2003, http:\/\/www.informationweek.com\/story\/showArticle.jhtml?articleID=16000115 (accessed June 2, 2006).[\/footnote][footnote]Dunn, D., \u201cPersonal Touch For VIPs,\u201d Information Week, November 4, 2003, http:\/\/www.informationweek.com\/news\/16000115 (accessed November 14, 2011).[\/footnote] to help its casino salespeople connect to top customers on a more personal basis. Working from a prioritized list of customer names displayed on a computer screen, the salesperson clicks on a name to view relevant information about the customer, such as background and preferred casino activities. There\u2019s even a printed script that can be used to guide the conversation. Such a system isn\u2019t very helpful, however, to middle or top-level managers, who need systems to help them carry out their oversight and planning responsibilities. To design marketing programs, for instance, marketing managers rely on summary information gleaned from a dedicated customer-relationship management system. Let\u2019s look at some of the widely available information systems designed to support people at the operational and upper-management levels.<\/p>\r\n\r\n<div class=\"section\" id=\"frank-ch15_s03_s01\">\r\n<h2 class=\"title editable block\">Operations Support Systems<\/h2>\r\n<p id=\"frank-ch15_s03_s01_p01\" class=\"nonindent para editable block\">Operations support systems are generally used by managers at lower levels of the organization\u2014those who run day-to-day business operations and make fairly routine decisions. They may be <em class=\"emphasis\">transaction processing systems, process control systems<\/em>, or <em class=\"emphasis\">design and production systems<\/em>.<\/p>\r\n\r\n<div class=\"section\" id=\"frank-ch15_s03_s01_s01\">\r\n<h2 class=\"title editable block\">Transaction Processing Systems<\/h2>\r\n<p id=\"frank-ch15_s03_s01_s01_p01\" class=\"nonindent para editable block\">Most of an organization\u2019s daily activities are recorded and processed by its transaction processing system, which receives input data and converts them into output\u2014information\u2014intended for various users. Input data are called transactions\u2014events that affect a business. A <em class=\"emphasis\">financial transaction<\/em> is an economic event: it affects the firm\u2019s assets, is reflected in its accounting statements, and is measured in monetary terms. Sales of goods to customers, purchases of inventory from suppliers, and salaries paid to employees are all financial transactions. Everything else is a <em class=\"emphasis\">nonfinancial transaction<\/em>. The marketing department, for example, might add some demographic data to its customer database. The information would be processed by the firm\u2019s transaction processing system, but it wouldn\u2019t be a financial transaction.<\/p>\r\n<p id=\"frank-ch15_s03_s01_s01_p02\" class=\"indent para editable block no-indent\"><a class=\"xref\" href=\"#frank-ch15_s03_s01_s01_f01\">Figure 15.5 \u201cTransaction Processing System\u201d<\/a> illustrates a transaction processing system in which the transaction is a customer\u2019s electronic payment of a bill. As you can see, transaction processing system output can consist not only of documents sent to outside parties (in this case, notification of payment received), but also of information circulated internally (in the form of reports), as well as of information entered into the database for updating.<\/p>\r\n\r\n<h3><span class=\"title-prefix\">Figure 15.5<\/span> Transaction Processing System<\/h3>\r\n<div class=\"caption\" style=\"text-align: center;font-size: .8em\" id=\"frank-ch15_s03_s01_s01_f01\">\r\n<p class=\"indent\"><a><img src=\"http:\/\/pressbooks.library.upei.ca\/smallbusinessmanagement\/wp-content\/uploads\/sites\/23\/2018\/12\/d942d45e597ad6259e2b66a97c36ec91.jpg\" alt=\"Transaction Processing System\" style=\"max-width: 497px\" \/>\r\n<\/a><\/p>\r\n\r\n<\/div>\r\n<\/div>\r\n<div class=\"section\" id=\"frank-ch15_s03_s01_s02\">\r\n<h2 class=\"title editable block\">Process Control Systems<\/h2>\r\n<p id=\"frank-ch15_s03_s01_s02_p01\" class=\"nonindent para editable block\">Process control refers to the application of technology to monitor and control physical processes. It\u2019s useful, for example, in testing the temperature of food as it\u2019s being prepared or gauging the moisture content of paper as it\u2019s being manufactured. Typically, it depends on sensors to collect data periodically. The data are then analyzed by a computer programmed either to make adjustments or to signal an operator.<\/p>\r\n<p id=\"frank-ch15_s03_s01_s02_p02\" class=\"indent para editable block no-indent\">Caesars uses process-control technology to keep customers happy. At any given point, some slot machines are down, whether because a machine broke or ran out of money or somebody hit the jackpot. All these contingencies require immediate attention by a service attendant. In the past, service personnel strolled around looking for machines in need of fixing. Now, however, a downed slot machine sends out an \u201cI need attention\u201d signal, which is instantly picked up by a monitoring and paging system called MessengerPlus and sent to a service attendant.<\/p>\r\n\r\n<\/div>\r\n<div class=\"section\" id=\"frank-ch15_s03_s01_s03\">\r\n<h2 class=\"title editable block\">Design and Production Systems<\/h2>\r\n<p id=\"frank-ch15_s03_s01_s03_p01\" class=\"nonindent para editable block\">Modern companies rely heavily on technology to design and make products. Computer-aided design (CAD) software, for instance, enables designers to test computer models digitally before moving new products into the prototype stage. Many companies link CAD systems to the manufacturing process through computer-aided manufacturing (CAM) systems that not only determine the steps needed to produce components but also instruct machines to do the necessary work. A CAD\/CAM system can be expanded by means of computer-integrated manufacturing (CIM), which integrates various operations (from design through manufacturing) with functional activities ranging from order taking to final shipment. The CIM system may also control [pb_glossary id=\"1474\"]<strong>industrial robots<\/strong>[\/pb_glossary]\u2014computer-run machines that can perform repetitive or dangerous tasks. A CIM system is a common element in a flexible manufacturing system, which makes it possible to change equipment setups by reprogramming computer-controlled machines that can be adapted to produce a variety of goods. Such flexibility is particularly valuable to makers of customized products.<\/p>\r\n\r\n<\/div>\r\n<\/div>\r\n<div class=\"section\" id=\"frank-ch15_s03_s02\">\r\n<h2 class=\"title editable block\">Management Support Systems<\/h2>\r\n<p id=\"frank-ch15_s03_s02_p01\" class=\"nonindent para editable block\">Mid- and upper-level managers rely on a variety of information systems to support decision-making activities, including <em class=\"emphasis\">management information systems, decision support systems, executive support systems<\/em>, and <em class=\"emphasis\">expert systems<\/em>.<\/p>\r\n\r\n<div class=\"section\" id=\"frank-ch15_s03_s02_s01\">\r\n<h2 class=\"title editable block\">Management Information Systems<\/h2>\r\n<p id=\"frank-ch15_s03_s02_s01_p01\" class=\"nonindent para editable block\">A management information system extracts data from a database to compile reports, such as sales analyses, inventory-level reports, and financial statements, to help managers make routine decisions. The type and form of the report depend on the information needs of a particular manager. At Caesars, for example, several reports are available each day to a games manager (who\u2019s responsible for table-game operations and personnel): a customer-analysis report, a profitability report, and a labor-analysis report.[footnote]Shook, R. L., Jackpot! Harrah\u2019s Winning Secrets for Customer Loyalty (Hoboken, NJ: John Wiley &amp; Sons, 2003), 248\u201352.[\/footnote]<\/p>\r\n\r\n<\/div>\r\n<div class=\"section\" id=\"frank-ch15_s03_s02_s02\">\r\n<h2 class=\"title editable block\">Decision Support Systems<\/h2>\r\n<p id=\"frank-ch15_s03_s02_s02_p01\" class=\"nonindent para editable block\">A decision support system is an interactive system that collects, displays, and integrates data from multiple sources to help managers make nonroutine decisions. For example, suppose that a gaming company is considering a new casino in Pennsylvania (which has recently legalized slot machines). To decide whether it would be a wise business move, management could use a decision support system like the one illustrated in <a class=\"xref\" href=\"#frank-ch15_s03_s02_s02_f01\">Figure 15.6 \u201cDecision Support System\u201d<\/a>. The first step is to extract data from internal sources to decide whether the company has the financial strength to expand its operations. From external sources (such as industry data and Pennsylvania demographics), managers might find the data needed to determine whether there\u2019s sufficient demand for a casino in the state. The decision support system will apply both types of data as variables in a quantitative <em class=\"emphasis\">model<\/em> that managers can analyze and interpret. People must make the final decision, but in making sense of the relevant data, the decision support system makes the decision-making process easier\u2014and more reliable.[footnote]Webopedia, \u201cDecision Support System,\u201d Webopedia, http:\/\/www.webopedia.com\/TERM\/D\/decision_support_system.html (accessed November 14, 2011).[\/footnote]<\/p>\r\n\r\n<h3><span class=\"title-prefix\">Figure 15.6<\/span> Decision Support System<\/h3>\r\n<div class=\"caption\" style=\"text-align: center;font-size: .8em\" id=\"frank-ch15_s03_s02_s02_f01\">\r\n<p class=\"indent\"><a><img src=\"http:\/\/pressbooks.library.upei.ca\/smallbusinessmanagement\/wp-content\/uploads\/sites\/23\/2018\/12\/0d7e93e7f4fe3381f7bd4d1b2b3b2d56.jpg\" alt=\"Decision Support System\" style=\"max-width: 497px\" \/>\r\n<\/a><\/p>\r\n\r\n<\/div>\r\n<\/div>\r\n<div class=\"section\" id=\"frank-ch15_s03_s02_s03\">\r\n<h2 class=\"title editable block\">Executive Information Systems<\/h2>\r\n<p id=\"frank-ch15_s03_s02_s03_p01\" class=\"nonindent para editable block\">Senior managers spend a good deal of their time planning and making major decisions. They set performance targets, determine whether they\u2019re being met, and routinely scan the external environment for opportunities and threats. To accomplish these tasks, they need relevant, timely, easily understood information. Often, they can get it through an executive information system, which provides ready access to strategic information that\u2019s customized to their needs and presented in a convenient format. Using an executive information system, for example, a gaming-company executive might simply touch a screen to view key summary information that highlights in graphical form a critical area of corporate performance, such as revenue trends. After scanning this summary, our executive can \u201cdrill down\u201d to retrieve more detailed information\u2014for example, revenue trends by resort or revenue trends from various types of activities, such as gaming, hotel, retail, restaurant, or entertainment operations.<\/p>\r\n\r\n<\/div>\r\n<div class=\"section\" id=\"frank-ch15_s03_s02_s04\">\r\n<h2 class=\"title editable block\">Artificial Intelligence<\/h2>\r\n<p id=\"frank-ch15_s03_s02_s04_p01\" class=\"nonindent para editable block\">Artificial intelligence is the science of developing computer systems that can mimic human behavior. Ever since the term was coined in 1956, artificial intelligence has always seemed on the verge of being \u201cthe next big thing.\u201d Unfortunately, optimistic predictions eventually collided with underwhelming results, and many experts began to doubt that it would ever have profitable applications.[footnote]Webopedia, \u201cArtificial Intelligence,\u201d Webopedia, http:\/\/www.webopedia.com\/TERM\/A\/artificial_intelligence.html (accessed November 14, 2011).[\/footnote] In the last decade, however, some significant advances have been made in artificial intelligence\u2014albeit in the area of game playing, where activities are generally governed by small sets of well-defined rules. But even the game-playing environment is sometimes complex enough to promote interesting developments. In 1997, for example, IBM\u2019s Deep Blue\u2014a specialized computer with an advanced chess-playing program\u2014defeated the world\u2019s highest-ranked player.[footnote]Webopedia, \u201cDecision Support System,\u201d Webopedia, <a href=\"http:\/\/www.webopedia.com\/TERM\/D\/decision_support_system.html\">http:\/\/www.webopedia.com\/TERM\/D\/decision_support_system.html<\/a> (accessed November 14, 2011).[\/footnote]<\/p>\r\n<p id=\"frank-ch15_s03_s02_s04_p02\" class=\"indent para editable block no-indent\">More recently, several artificial intelligence applications have been successfully put to commercial use. Let\u2019s take a brief look at two of these: <em class=\"emphasis\">expert systems<\/em> and <em class=\"emphasis\">face-recognition technology<\/em>.<\/p>\r\n\r\n<\/div>\r\n<div class=\"section\" id=\"frank-ch15_s03_s02_s05\">\r\n<h2 class=\"title editable block\">Expert Systems<\/h2>\r\n<p id=\"frank-ch15_s03_s02_s05_p01\" class=\"nonindent para editable block\">Expert systems are programs that mimic the judgment of experts by following sets of rules that experts would follow. They\u2019re useful in such diverse areas as medical diagnosis, portfolio management, and credit assessment. For example, you\u2019ve called the customer-service department of your credit-card company because you want to increase your credit line. Don\u2019t expect to talk to some financial expert who\u2019s authorized to say yes or no. You\u2019ll be talking to a service representative with no financial expertise whatsoever. He or she will, however, have access to an expert system, which will give you an answer in a few seconds. How does it work? The expert system will prompt the representative to ask you certain questions about your salary and living expenses. It will also check internal corporate data to analyze your purchases and payment behavior, and, based on the results, it will determine whether you get an increase and, if so, how much.<\/p>\r\n<p id=\"frank-ch15_s03_s02_s05_p02\" class=\"indent para editable block no-indent\">At Caesars, an expert system called the Revenue Management System helps to optimize the overall profitability of both hotel and casino operations. When a customer requests a room, the program accesses his or her profile in the database and consults certain \u201crules\u201d for assessing the application.[footnote]Goff, J., \u201cHead Games: Businesses Deploying Analytical Software to Get a Better Fix on Customer Behavior,\u201d CFO Magazine for Senior Financial Executives 20:9, July 1, 2004, http:\/\/www.cfo.com\/article.cfm\/3014815 (accessed November 14, 2011).[\/footnote] One rule, for example, might be, \u201cIf the customer has wagered more than $100,000 in the past year, add 10 points.\u201d Eventually, the system decides whether your application will be accepted (and at what rate) by adding up points determined by the rules. While a tightwad may not get a room even when there are vacancies, a high roller may get a good rate on a luxury suite even if the hotel is nearly full.<\/p>\r\n\r\n<\/div>\r\n<div class=\"section\" id=\"frank-ch15_s03_s02_s06\">\r\n<h2 class=\"title editable block\">Face-Recognition Technology<\/h2>\r\n<p id=\"frank-ch15_s03_s02_s06_p01\" class=\"nonindent para editable block\">Caesars uses another particularly interesting, and sophisticated, application of artificial intelligence. In the hotel-casino business, it\u2019s crucial to identify and turn away undesirable visitors. One tool for this task is a digital camera-surveillance system that uses <em class=\"emphasis\">face-recognition technology<\/em>. Using this technology, a program classifies a person\u2019s face according to the presence\/absence or extent of certain unique features, such as dimpled chins, receding jaws, overbites, and long or short noses. If there\u2019s a match on, for example, fifteen features between a person being scanned and someone in the company database, a staff member decides whether the two people are the same. If a security manager then concludes that the face belongs to a skilled card-counter, the customer will be discouraged from playing blackjack; if it belongs to a known cheater, the individual will be escorted out of the casino. The system, however, does more than spot undesirables. It can also identify high rollers and send information about customers to managers on the floor. That\u2019s why a Caesars manager can greet a preferred customer at the door with his favorite drink and a personalized greeting, such as \u201cHi, Bill! How\u2019s Karen? Did you ever get that vintage Corvette? Here, have a gin rickey on the house\u201d.[footnote]Duffy, D., \u201cTechnology\u2019s Winning Hand,\u201d CSO.online, October 1, 2003, http:\/\/www.csoonline.com\/article\/218574\/catching-casino-cheats-technology-s-winning-hand (accessed November 14, 2011).[\/footnote][footnote]Gallagher, L. B., and Sean Gallagher, \u201cNORA and ANNA: Non-Obvious Relationship Awareness,\u201d Baseline, April 4, 2004, http:\/\/www.baselinemag.com\/c\/a\/Past-News\/NORA-and-ANNA\/ (accessed November 14, 2011).[\/footnote]<\/p>\r\n\r\n<div class=\"bcc-box bcc-success\" id=\"frank-ch15_s03_s02_s06_n01\">\r\n<h3 class=\"title\">Key Takeaways<\/h3>\r\n<ul id=\"frank-ch15_s03_s02_s06_l01\" class=\"itemizedlist\">\r\n \t<li>Information needs vary according to managerial level (top, middle, or first-line).<\/li>\r\n \t<li>\r\n<p class=\"nonindent para\">An IS, or information system, can be divided into two categories:<\/p>\r\n\r\n<ol id=\"frank-ch15_s03_s02_s06_l02\" class=\"orderedlist\">\r\n \t<li>Those that meet the needs of low-level managers<\/li>\r\n \t<li>Those that meet the needs of middle- and upper-level managers<\/li>\r\n<\/ol>\r\n<\/li>\r\n \t<li>\r\n<p class=\"nonindent para\">Low-level managers\u2014those who run day-to-day operations and make routine decisions\u2014use <strong class=\"emphasis bold\">operations support systems<\/strong>, which usually fall into three categories: transaction processing systems, process control systems, and computer-aided design software.<\/p>\r\n\r\n<ol id=\"frank-ch15_s03_s02_s06_l03\" class=\"orderedlist\">\r\n \t<li>Most daily activities are recorded and processed by a <strong class=\"emphasis bold\">transaction processing system<\/strong>, which receives input data and converts them into output\u2014information\u2014intended for various users.<\/li>\r\n \t<li><strong class=\"emphasis bold\">Process control<\/strong> refers to the application of technology to monitor and control physical processes, such as food preparation. The system depends on sensors to collect data for analysis by a computer programmed either to make adjustments or to signal an operator.<\/li>\r\n \t<li>Technology can be used to design and make products. <strong class=\"emphasis bold\">Computer-aided design (CAD)<\/strong> software, for instance, enables designers to test computer models digitally before moving new products into the prototype stage.<\/li>\r\n<\/ol>\r\n<\/li>\r\n \t<li>\r\n<p class=\"nonindent para\">Mid- and upper-level managers may use one of four types of <strong class=\"emphasis bold\">management support system<\/strong> to assist in decision-making activities: management information systems, decision support systems, executive information systems, and expert systems.<\/p>\r\n\r\n<ol id=\"frank-ch15_s03_s02_s06_l04\" class=\"orderedlist\">\r\n \t<li>A <strong class=\"emphasis bold\">management information system<\/strong> extracts data from a database to compile reports, such as sales analyses, needed for making routine decisions.<\/li>\r\n \t<li>A <strong class=\"emphasis bold\">decision support system<\/strong> is an interactive system that collects and integrates data from multiple sources to assist in making nonroutine decisions.<\/li>\r\n \t<li>To develop plans and make major decisions, managers may gather relevant, timely, easily understood information through an <strong class=\"emphasis bold\">executive information system<\/strong>; an EIS provides ready access to strategic information that\u2019s customized to their needs and presented in a convenient format.<\/li>\r\n \t<li>An <strong class=\"emphasis bold\">expert system<\/strong> mimics expert judgment by following sets of rules that experts would follow; it relies on <strong class=\"emphasis bold\">[pb_glossary id=\"1475\"]artificial intelligence[\/pb_glossary]<\/strong>\u2014the science of developing computer systems that can mimic human behavior.<\/li>\r\n<\/ol>\r\n<\/li>\r\n<\/ul>\r\n<\/div>\r\n<div class=\"bcc-box bcc-info\" id=\"frank-ch15_s03_s02_s06_n02\">\r\n<h3 class=\"title\">Exercise<\/h3>\r\n<p class=\"nonindent simpara\">(AACSB) Analysis<\/p>\r\n<p id=\"frank-ch15_s03_s02_s06_p02\" class=\"indent para\">For each of the following situations, select the appropriate management support system to aid the user: decision support system, executive support system, or expert system. In each case, describe the management support system that you recommend.<\/p>\r\n\r\n<ul id=\"frank-ch15_s03_s02_s06_l05\" class=\"itemizedlist\">\r\n \t<li>You\u2019re trying to identify a rash on your arm.<\/li>\r\n \t<li>You own two golf courses in the Northeast, and you\u2019re thinking about building one in Florida. You need to gather and analyze information about your current operations in the Northeast, as well as external information about the golf industry in Florida.<\/li>\r\n \t<li>You own three McDonald\u2019s franchises. Every morning, you want to know the revenues and costs at each store. You\u2019re also interested in a breakdown of revenues by product and costs by category of expense (salaries, food and ingredients, maintenance, and so on).<\/li>\r\n<\/ul>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<div class=\"chapter standard\" id=\"slug-15-4-computer-networks-and-cloud-computing\">\r\n<div class=\"chapter-title-wrap\">\r\n<h1 class=\"chapter-title\" style=\"text-align: center\">Computer Networks and Cloud Computing<\/h1>\r\n<\/div>\r\n<div class=\"ugc chapter-ugc\">\r\n<div class=\"bcc-box bcc-highlight\" id=\"frank-ch15_s04_n01\">\r\n<h3 class=\"title\">Learning Objectives<\/h3>\r\n<ol id=\"frank-ch15_s04_l01\" class=\"orderedlist\">\r\n \t<li>Describe the main systems for sharing information through networked computers.<\/li>\r\n \t<li>Define cloud computing and identify its advantages and disadvantages.<\/li>\r\n<\/ol>\r\n<\/div>\r\n<p id=\"frank-ch15_s04_p01\" class=\"nonindent para editable block\">Once it\u2019s grown beyond just a handful of employees, an organization needs a way of sharing information. Imagine a flower shop with twenty employees. The person who takes phone orders needs access to the store\u2019s customer list, as do the delivery person and the bookkeeper. Now, the store may have one computer and everyone could share it. It\u2019s more likely, however, that there are a number of computers (several for salespeople, one for delivery, and one for bookkeeping). In this case, everyone needs to be sure that customer records have been updated on all computers every time that a change is required.<\/p>\r\n\r\n<div class=\"section\" id=\"frank-ch15_s04_s99\">\r\n<h2 class=\"title editable block\">Networks<\/h2>\r\n<p id=\"frank-ch15_s04_p02\" class=\"nonindent para editable block\">Likewise, many companies want their personal computers to run their own software and process data independently. But they also want people to share databases, files, and printers, and they want them to share applications software that performs particular tasks, including word processing, creating and managing spreadsheets, designing graphical presentations, and producing high-quality printed documents (<em class=\"emphasis\">desktop publishing<\/em>).<\/p>\r\n<p id=\"frank-ch15_s04_p03\" class=\"indent para editable block no-indent\">The solution in both cases is <em class=\"emphasis\">[pb_glossary id=\"1476\"]<strong>networking<\/strong>[\/pb_glossary]<\/em>\u2014linking computers to one another. The two major types of networks are distinguished according to geographical coverage:<\/p>\r\n\r\n<ul id=\"frank-ch15_s04_l02\" class=\"itemizedlist editable block\">\r\n \t<li>A local area network (LAN) links computers that are in [pb_glossary id=\"1478\"]close proximity[\/pb_glossary]\u2014in the same building or office complex. They can be connected by cables or by wireless technology. Your university might have a LAN system that gives you access to resources, such as registration information, software packages, and printers. <a class=\"xref\" href=\"#frank-ch15_s04_f01\">Figure 15.7 \u201cLocal Area Network (LAN)\u201d<\/a> illustrates a LAN that\u2019s connected to another network by means of a <em class=\"emphasis\">[pb_glossary id=\"1477\"]gateway[\/pb_glossary]<\/em>\u2014a processor that allows dissimilar networks to communicate with one another.<\/li>\r\n<\/ul>\r\n<h3><span class=\"title-prefix\">Figure 15.7<\/span> Local Area Network (LAN)<\/h3>\r\n<div class=\"caption\" style=\"text-align: center;font-size: .8em;max-width: 500px\">\r\n<div class=\"figure full large-height editable block\" id=\"frank-ch15_s04_f01\">\r\n<p class=\"indent\"><a><img src=\"http:\/\/pressbooks.library.upei.ca\/smallbusinessmanagement\/wp-content\/uploads\/sites\/23\/2018\/12\/7cc9211e1efdbf1c8465dd25d64a877e.jpg\" alt=\"Local Area Network (LAN)\" style=\"max-width: 497px\" \/>\r\n<\/a><\/p>\r\n\r\n<\/div>\r\n<\/div>\r\n<ul id=\"frank-ch15_s04_l03\" class=\"itemizedlist editable block\">\r\n \t<li>Because a wide area network (WAN) covers a relatively large geographical area, its computers are connected by telephone lines, wireless technology, or even satellite.<\/li>\r\n<\/ul>\r\n<p id=\"frank-ch15_s04_p04\" class=\"indent para editable block no-indent\">Like the one in <a class=\"xref\" href=\"#frank-ch15_s04_f01\">Figure 15.7 \u201cLocal Area Network (LAN)\u201d<\/a>, some networks are client-server systems, which include a number of client machines (the ones used by employees for data input and retrieval) and a server (which stores the database and the programs used to process the data). Such a setup saves time and money and circulates more-accurate information.<\/p>\r\n\r\n<\/div>\r\n<div class=\"section\" id=\"frank-ch15_s04_s01\">\r\n<h2 class=\"title editable block\">Cloud Computing<\/h2>\r\n<p id=\"frank-ch15_s04_s01_s99_p99\" class=\"nonindent para editable block\">A cloud is a \u201cvisible mass of condensed water vapor floating in the atmosphere, typically high above the ground\u201d.[footnote]Dictionary.com, \u201cCloud,\u201d Dictionary.com, http:\/\/dictionary.reference.com\/browse\/cloud (accessed November 15, 2011).[\/footnote] The term \u201ccloud computing\u201d means performing computer tasks using services provided over the Internet.[footnote]Pinola, M., \u201cWhat Is Cloud Computing?,\u201d About.com, http:\/\/mobileoffice.about.com\/od\/workingontheroad\/f\/cloudcomputing.htm (accessed November 15, 2011).[\/footnote] So how do you connect the two definitions? When IT professionals diagrammed computer systems, they used a cloud symbol to represent the Internet. So when you hear or read that an individual or company is using the \u201ccloud\u201d or technology firms, such as IBM, Hewlett-Packard, and Salesforce.com, are offering cloud services, just substitute the word \u201cInternet\u201d for \u201ccloud\u201d and things will make sense.<\/p>\r\n<p id=\"frank-ch15_s04_s01_s99_p98\" class=\"indent para editable block no-indent\">You might be surprised to learn that you\u2019re already using the cloud\u2014that is if you use Facebook (which is very likely\u2014in fact, just mentioning Facebook here might prompt you to stop studying and check out your friends\u2019 pages). How do you know that Facebook is a cloud application? Remember the trick: just substitute the word \u201cInternet\u201d for \u201ccloud.\u201d The Facebook computer application lets you store information about yourself and share it with others using the Internet.<\/p>\r\n\r\n<div class=\"section\" id=\"frank-ch15_s04_s02\">\r\n<h2 class=\"title editable block no-indent\">Business Applications<\/h2>\r\n<p id=\"frank-ch15_s04_s01_s99_p97\" class=\"nonindent para editable block no-indent\">Think about the functional areas of business you\u2019ve explored in this text: accounting, finance, human resources, management, marketing, operations, and product design. Now imagine you\u2019re Katrina Lane, senior vice president and chief technology officer for Caesars Entertainment, who is responsible for the information technology needed to handle multiple tasks in all these functional areas. You\u2019re sitting at your desk when Gary Loveman, chief executive officer of Caesars, walks in and gives you the news. Caesars just purchased the Planet Hollywood Casino and Resort in Las Vegas and will open up two new casinos in Ohio in 2012. This is good news for the company, but it means a lot of work for you and your staff.<\/p>\r\n<p id=\"frank-ch15_s04_s01_s96_p96\" class=\"indent para editable block no-indent\">You wonder whether this might be the time to outsource some of your computing tasks to a technology firm specializing in cloud computing. You remember an example that really makes sense:[footnote]Gil, P., \u201cWhat Is Cloud Computing?,\u201d About.com, http:\/\/netforbeginners.about.com\/od\/c\/f\/cloudcomputing.htm (accessed November 15, 2011).[\/footnote] Right now, whenever Microsoft comes out with a new version of Word, Caesars has to pay $350 per PC for the latest version. Wouldn\u2019t it make more sense to rent the use of the Microsoft Word program from a cloud vendor for say $5 a month (or $60 a year)? Given that the average time between new releases of Word is two years, your total cost per PC would be $120 (2 \u00d7 $60)\u2014a savings of about $230 per PC ($350 \u2212 $120). Your employees wouldn\u2019t mind; instead of working offline, they would just login to the Internet and work with their online version using the files that were saved for them. And the members of your IT staff would be pleased that they wouldn\u2019t need to install the new version of Word on all your PCs.<\/p>\r\n\r\n<\/div>\r\n<div class=\"section\" id=\"frank-ch15_s04_s02_s01\">\r\n<h2 class=\"title editable block\">The As-A-Service Group<\/h2>\r\n<p id=\"frank-ch15_s04_s01_s99_p95\" class=\"nonindent para editable block\">Companies can contract for various cloud computing services. The Microsoft Word example discussed previously is classified as software as a service (SaaS). This type of service gives companies access to a large assortment of software packages without having to invest in hardware or install and maintain software on its own computers. The available software, which includes e-mail and collaboration systems and customer relationship management programs, can be customized and used by an individual client or shared among several clients. A second type of service is called infrastructure as a service (IaaS). Instead of providing users with software, a technology firm offering infrastructure as a service provides hardware, including servers, central processing units, network equipment, and disk space.[footnote]Thrive Networks, \u201cSoftware as a Service\/ Infrastructure as a Service,\u201d Thrive Networks, March 2009, http:\/\/www.thrivenetworks.com\/resources\/march-2009-software-as-a-service.html (accessed November 15, 2011).[\/footnote] The most successful IaaS provider is Amazon Web Services.[footnote]Best Price Computers, \u201cInfrastructure as a Service,\u201d Best Price Computers, http:\/\/www.bestpricecomputers.co.uk\/glossary\/infrastructure-as-a-service.htm (accessed November 15, 2011).[\/footnote] The company rents computer power and storage to users who access their data via the Internet. The last as-a-service model is called platform as a service (PaaS). Those offering platform as a service provide services that enable users to develop customized web applications. Because they don\u2019t have to start from scratch but rather build on existing platforms made available by the service provider, the web applications can be developed quickly.<\/p>\r\n\r\n<div class=\"video editable block\" id=\"frank-ch15_s04_s01_s99_p94\">\r\n<h3 class=\"title\">Video Clip 15.1 Cloud Computing<\/h3>\r\n\u201cTraditional business applications and platforms are too complicated and expensive. They need a data center, a complex software stack, and a team of experts to run them.\u201d\r\n\r\nhttp:\/\/www.youtube.com\/watch?v=ae_DKNwK_ms\r\n\r\n<\/div>\r\n<\/div>\r\n<div class=\"section\" id=\"frank-ch15_s04_s03\">\r\n<h2 class=\"title editable block\">Advantages and Disadvantages of Cloud Computing<\/h2>\r\n<p id=\"frank-ch15_s04_s01_s99_p93\" class=\"nonindent para editable block\">In making your final decision (as the pretend chief technology officer for Caesars) you should consider these advantages and disadvantages of cloud computing:<\/p>\r\n\r\n<div class=\"section\" id=\"frank-ch15_s04_s03_s01\">\r\n<h2 class=\"title editable block\">Advantages<\/h2>\r\n<p id=\"frank-ch15_s04_s01_s99_p92\" class=\"nonindent para editable block\">Shifting some of Caesars\u2019s IT functions to the cloud would produce a number of advantages:<\/p>\r\n\r\n<ol id=\"frank-ch15_s04_s01_s99_p91\" class=\"orderedlist editable block\">\r\n \t<li><em class=\"emphasis\">Cost Savings<\/em>\u2014By \u201crenting\u201d software rather than buying it, Caesars can reduce its costs. The monthly fee to \u201cuse\u201d the software is generally less than the combined cost of buying, installing, and maintaining the software internally. On the hardware site, housing Caesars\u2019s data in a service provider\u2019s facilities, rather than in-house, reduces the large outlay of cash needed to build and maintain data centers.<\/li>\r\n \t<li><em class=\"emphasis\">Speed of Delivery<\/em>\u2014Purchasing and installing software and data processing equipment can be time consuming. A cloud computing service provider could get Caesars\u2019s applications up and running in only a few weeks.<\/li>\r\n \t<li><em class=\"emphasis\">Scalable<\/em>\u2014Caesars is constantly expanding both in the number of casinos it owns and geographically. In this ever-changing environment, it\u2019s difficult to gauge the level of our technology needs. If we overestimate our requirements, we end up paying for technology we don\u2019t need. If we underestimate, efficiency goes down, and the experience for our customers diminishes. By using cloud computing we are able to have exactly what we need at our disposal at any point in time.<\/li>\r\n \t<li><em class=\"emphasis\">Employees Can Be Mobile<\/em>\u2014The use of cloud computing will free workers from their desks and allow them to work wherever they are. As applications move to the cloud, all that is needed for our employees to connect to their \u201coffices\u201d is the Internet. This mobility benefit also makes it easier for employees to collaborate on projects and connect with others in the company.<\/li>\r\n \t<li><em class=\"emphasis\">Information Technology Staff<\/em>\u2014Although our current staff is extremely qualified and dedicated, finding experienced and knowledgeable staff is a continuing problem particularly in the casino industry which suffers from historically high turnover. By using cloud computing, we reduce our human resource needs by shifting some of our work to outside vendors who are able to hire and keep well qualified individuals (in part because IT professionals enjoy working for technology companies).<\/li>\r\n<\/ol>\r\n<\/div>\r\n<div class=\"section\" id=\"frank-ch15_s04_s03_s02\">\r\n<h2 class=\"title editable block\">Disadvantages<\/h2>\r\n<p id=\"frank-ch15_s04_s01_s99_p90\" class=\"nonindent para editable block\">Although the advantages of moving to a cloud environment outnumber the disadvantages, the following disadvantages are cause for concern:<\/p>\r\n\r\n<ol id=\"frank-ch15_s04_s01_s99_p89\" class=\"orderedlist editable block\">\r\n \t<li><em class=\"emphasis\">Disruption in Internet Service<\/em>\u2014If Caesars moves some of its applications to the cloud, its employees can work on these applications on any device and in any location as long as they have an Internet connection. But what if the Internet is unavailable because of a disruption? Depending on the length of the disruption, this could create serious problems for Caesars.<\/li>\r\n \t<li><em class=\"emphasis\">Security<\/em>\u2014Many companies are reluctant to trust cloud service providers with their data because they\u2019re afraid it might become available to unauthorized individuals or criminals. This is a particular problem for Caesars, which collects and stores sensitive client information and has to constantly be on the lookout for fraudulent activity of staff and customers.[footnote]Eve, J., \u201cCloud Computing as a Security Asset,\u201d Indian Gaming, www.indiangaming.com\/istore\/Apr11_JosephEve.pdf (accessed November 16, 2011), 60-61.[\/footnote]<\/li>\r\n \t<li><em class=\"emphasis\">Service Provider System Crash<\/em>\u2014Organizations considering moving to the cloud are justifiably concerned about the possibility of a computer service crash at their service providers\u2019 facilities. It looks like this concern was warranted. In April of 2011, Amazon Web Service (a leading cloud services provider) experienced an outage in one of its large web-connected data centers. The outage crashed its system and brought down the Web sites of a number of companies, including the location-based social network, Foursquare.[footnote]Lohr, S., \u201cAmazon\u2019s Trouble Raises Cloud Computing Doubts,\u201d The New York Times, April 22, 2011, http:\/\/www.nytimes.com\/2011\/04\/23\/technology\/23cloud.html?_r=1 (accessed November 16, 2011).[\/footnote] It took more than thirty-six hours to get all seventy or so of the crashed sites up and running.<\/li>\r\n<\/ol>\r\n<\/div>\r\n<\/div>\r\n<div class=\"section\" id=\"frank-ch15_s04_s03_s03\">\r\n<h2 class=\"title editable block\">Go or No Go?<\/h2>\r\n<p id=\"frank-ch15_s04_s01_s99_p88\" class=\"nonindent para editable block\">So, pretend chief technology officer for Caesars, what\u2019s your decision: will you get on the cloud or stay on the ground? If you are curious about what the real chief technology officer did, she took the high road and transferred a number of applications to <a class=\"link\" target=\"_blank\" href=\"http:\/\/salesforce.com\" rel=\"noopener noreferrer\">Salesforce.com<\/a>\u2019s Web-based <a class=\"link\" target=\"_blank\" href=\"http:\/\/force.com\" rel=\"noopener noreferrer\">Force.com<\/a>\u2019s cloud applications service.[footnote]Salesforce.com, \u201cCaesars Entertainment Hits the Efficiency Jackpot with Force.com,\u201d Salesforce.com, http:\/\/www.salesforce.com\/showcase\/stories\/caesars.jsp (accessed November 16, 2011).[\/footnote]<\/p>\r\n\r\n<div class=\"bcc-box bcc-success\" id=\"frank-ch15_s04_s03_s03_n01\">\r\n<h3 class=\"title\">Key Takeaways<\/h3>\r\n<ul id=\"frank-ch15_s04_l04\" class=\"itemizedlist\">\r\n \t<li>Once an organization has grown to more than a few employees, it needs to network individual computers to allow them to share information and technologies.<\/li>\r\n \t<li>A <strong class=\"emphasis bold\">client-server system<\/strong> links a number of client machines (for data input and retrieval) with a server (for storing the database and the programs that process data).<\/li>\r\n \t<li>Many companies want personal computers to run their own software and process data independently.<\/li>\r\n \t<li>But they also want individuals to share databases, files, printers, and <strong class=\"emphasis bold\">applications software<\/strong> that perform particular types of work (word processing, creating and managing spreadsheets, and so forth).<\/li>\r\n \t<li>\r\n<p class=\"nonindent para\">There are two systems that can satisfy both needs.<\/p>\r\n\r\n<ol id=\"frank-ch15_s04_l05\" class=\"orderedlist\">\r\n \t<li>A <strong class=\"emphasis bold\">local area network (LAN)<\/strong> links computers in close proximity, connecting them by cables or by wireless technology.<\/li>\r\n \t<li>A <strong class=\"emphasis bold\">wide area network (WAN)<\/strong> covers a relatively large geographical area and connects computers by telephone lines, wireless technology, or satellite.<\/li>\r\n<\/ol>\r\n<\/li>\r\n \t<li>The term \u201c<strong class=\"emphasis bold\">cloud computing<\/strong>\u201d means performing computer tasks using services provided over the Internet.<\/li>\r\n \t<li>The <strong class=\"emphasis bold\">software as a service (SaaS)<\/strong> category of cloud computing gives companies access to a large assortment of software packages without having to invest in hardware or install and maintain software on its own computers.<\/li>\r\n \t<li>A technology firm offering <strong class=\"emphasis bold\">infrastructure as a service<\/strong> provides users with hardware, including servers, central processing units, network equipment, and disk space.<\/li>\r\n \t<li>Those offering the <strong class=\"emphasis bold\">platform as a service<\/strong> category of cloud computing provide services that enable users to develop customized web applications.<\/li>\r\n \t<li>Shifting IT functions to the cloud produces a number of advantages, including cost savings, speedy delivery of software, scalability (you pay for only what you need), employee mobility, and a reduction in information technology staff.<\/li>\r\n \t<li>The following disadvantages of cloud computing are cause for concern: disruption in internet service, security issues, and unreliability of service provider systems.<\/li>\r\n<\/ul>\r\n<\/div>\r\n<div class=\"bcc-box bcc-info\" id=\"frank-ch15_s04_s03_s03_n02\">\r\n<h3 class=\"title\">Exercises<\/h3>\r\n<ol id=\"frank-ch15_s04_l06\" class=\"orderedlist\">\r\n \t<li>What\u2019s the difference between a LAN and a WAN? Give an example of the use to which each type of system can be put. Does your college maintain either type of computer network?<\/li>\r\n \t<li>In what ways could your college benefit from cloud computing? In responding, consider the three types of services offered by cloud service providers: software as a service, infrastructure as a service, and platform as a service. What type of security issues might your college administrators be concerned with?<\/li>\r\n<\/ol>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<h2><\/h2>\r\n<div class=\"chapter standard\" id=\"slug-15-5-data-communications-networks\">\r\n<div class=\"chapter-title-wrap\">\r\n<h1 class=\"chapter-title\" style=\"text-align: center\">Data Communications Networks<\/h1>\r\n<\/div>\r\n<div class=\"ugc chapter-ugc\">\r\n<div class=\"bcc-box bcc-highlight\" id=\"frank-ch15_s05_n01\">\r\n<h3 class=\"title\">Learning Objective<\/h3>\r\n<ol id=\"frank-ch15_s05_l01\" class=\"orderedlist\">\r\n \t<li>Explain how four networking technologies\u2014the Internet, the World Wide Web, intranets, and extranets\u2014make data communication possible.<\/li>\r\n<\/ol>\r\n<\/div>\r\n<p id=\"frank-ch15_s05_p01\" class=\"nonindent para editable block\">In addition to using networks for information sharing within the organization, companies use networks to communicate and share information with those outside the organization. All this is made possible by data communication networks, which transmit digital data (numeric data, text, graphics, photos, video, and voice) from one computer to another using a variety of wired and wireless communication channels. Let\u2019s take a closer look at the networking technologies that make possible all this electronic communication\u2014in particular, the <em class=\"emphasis\">Internet<\/em> (including the <em class=\"emphasis\">World Wide Web<\/em>), <em class=\"emphasis\">intranets<\/em>, and <em class=\"emphasis\">extranets<\/em>.<\/p>\r\n\r\n<div class=\"section\" id=\"frank-ch15_s05_s01\">\r\n<h2 class=\"title editable block\">The Internet and the World Wide Web<\/h2>\r\n<p id=\"frank-ch15_s05_s01_p01\" class=\"nonindent para editable block\">Though we often use the terms <em class=\"emphasis\">Internet<\/em> and <em class=\"emphasis\">World Wide Web<\/em> interchangeably, they\u2019re not the same thing.[footnote]Webopedia, \u201cThe Difference Between the Internet and the World Wide Web,\u201d Webopedia, http:\/\/www.webopedia.com\/DidYouKnow\/Internet\/2002\/Web_vs_Internet.asp (accessed November 14, 2011)[\/footnote] The Internet is an immense global network comprising smaller interconnected networks linking millions of computers around the world. Originally developed for the U.S. military and later adapted for use in academic and government research, the Internet experienced rapid growth in the 1990s, when companies called Internet service providers were allowed to link into the Internet infrastructure in order to connect paying subscribers. Today, Internet service providers, such as CompuServe, America Online (AOL), MSN, and Comcast, enable us to use the Internet to communicate with others through e-mail, texting, instant messaging, online conferencing, and so on. These services also connect us with third-party providers of information, including news stories, stock quotes, and magazine articles.<\/p>\r\n<p id=\"frank-ch15_s05_s01_p02\" class=\"indent para editable block no-indent\">The World Wide Web (or simply \u201cthe Web\u201d) is just a portion of the Internet\u2014albeit a large portion. The Web is a subsystem of computers that can be accessed on the Internet using a special protocol, or language, known as <em class=\"emphasis\">hypertext transfer protocol<\/em> (HTTP). What\u2019s the difference between the Internet and the Web? According to Tim Berners-Lee (one of the small team of scientists who developed the concept for the Web in 1989), the Internet is a network of networks composed of cables and computers. You can use it to send \u201cpackets\u201d of information from one computer to another, much like sending a postcard. If the address on the packet is accurate, it will arrive at the correct destination in much less than a second. Thus, the Internet is a packet-delivery <em class=\"emphasis\">service<\/em> that delivers such items as e-mail messages all over the globe. The Web, by contrast, is composed of <em class=\"emphasis\">information<\/em>\u2014documents, pictures, sounds, streaming videos, and so on. It\u2019s connected not through cables, but rather through <em class=\"emphasis\">hypertext links<\/em> that allow users to navigate between resources on the Internet.[footnote]Griffiths, R. T., \u201cChapter Two: The World Wide Web (WWW),\u201d The History of the Internet, http:\/\/www.let.leidenuniv.nl\/history\/ivh\/chap2.htm (accessed November 14, 2011).[\/footnote]<\/p>\r\n<p id=\"frank-ch15_s05_s01_p03\" class=\"indent para editable block no-indent\">Because it\u2019s driven by programs that communicate between computers connected to the Internet, the Web couldn\u2019t exist without the Internet. The Internet, on the other hand, could exist without the Web, but it wouldn\u2019t be nearly as useful. The Internet itself is enormous, but it\u2019s difficult to navigate, and it has no pictures, sounds, or streamed videos. They exist on computers connected to the Web, which also makes it much easier to retrieve information. The creation of [pb_glossary id=\"1479\"]Web browsers[\/pb_glossary]\u2014software, such as Microsoft\u2019s Internet Explorer and Netscape Navigator, that locates and displays Web pages\u2014opened up the Internet to a vast range of users. Almost 80 percent of individuals in the United States use the Internet regularly.[footnote]Internet World Stats, \u201cTop 20 Countries with the Highest Number of Internet Users,\u201d Internet World Stats, June 30, 2011, http:\/\/www.internetworldstats.com\/top20.htm (accessed November 14, 2011).[\/footnote][footnote]Kessler, S., \u201cStudy: 80 Percent of Children under 5 Use Internet Weekly,\u201d Mashable, March 15, 2011, http:\/\/content.usatoday.com\/communities\/technologylive\/post\/2011\/03\/study-80-percent-of-children-under-5-use-internet-weekly\/1 (accessed November 14, 2011).[\/footnote] So, who\u2019s in charge of the Web? No one owns it, but an organization called the World Wide Web Consortium (W3C) oversees the development and maintenance of standards governing the way information is stored, displayed, and retrieved on it.[footnote]Wikipedia, \u201cWorld Wide Web,\u201d Wikipedia, http:\/\/en.wikipedia.org\/wiki\/World_Wide_Web (accessed November 14, 2011).[\/footnote]<\/p>\r\n\r\n<div class=\"section\" id=\"frank-ch15_s05_s01_s01\">\r\n<h2 class=\"title editable block\">The Technology of the Web<\/h2>\r\n<h3><span class=\"title-prefix\">Figure 15.8<\/span> Google<\/h3>\r\n<div class=\"caption\" style=\"text-align: center;font-size: .8em;max-width: 500px\" id=\"frank-ch15_s05_s01_s01_f01\">\r\n<p class=\"indent\"><a><img src=\"http:\/\/pressbooks.library.upei.ca\/smallbusinessmanagement\/wp-content\/uploads\/sites\/23\/2018\/12\/15.5-1024x342.png\" alt=\"Google\" class=\"aligncenter size-large wp-image-1485\" width=\"500\" \/>\r\n<\/a><\/p>\r\n\r\n<\/div>\r\n<p id=\"frank-ch15_s05_s01_s01_p01\" class=\"indent para editable block no-indent\">Let\u2019s look a little more closely at some of the technologies that enable us to transmit and receive data over the Web. Documents on the Web are called <em class=\"emphasis\">Web pages<\/em>, and they\u2019re stored on <em class=\"emphasis\">Web sites<\/em>. Each site is maintained by a <em class=\"emphasis\">Webmaster<\/em> and opens with a <em class=\"emphasis\">home page<\/em>. Each Web page is accessed through a unique address called a <em class=\"emphasis\">uniform resource locator (URL)<\/em>. For example, if you want to find statistics on basketball star LeBron James, you could type in the URL address <a class=\"link\" target=\"_blank\" href=\"http:\/\/www.nba.com\/home\/playerfile\/lebron_james\" rel=\"noopener noreferrer\">http:\/\/www.nba.com\/home\/playerfile\/lebron_james<\/a>. The prefix <em class=\"emphasis\">http:\/\/<\/em> is the protocol name, <em class=\"emphasis\">http:\/\/www.nba.com<\/em> the domain name, <em class=\"emphasis\">playerfile<\/em> the subdirectory name, and <em class=\"emphasis\">lebron_james<\/em> the document name (or Web page). A computer that retrieves Web pages is called a Web server. A search engine is a software program that scans Web pages containing specified keywords and provides a list of documents containing them. The most popular search engine is Google; others include Bing, Yahoo!, Ask, and AOL.<\/p>\r\n\r\n<\/div>\r\n<\/div>\r\n<div class=\"section\" id=\"frank-ch15_s05_s02\">\r\n<h2 class=\"title editable block no-indent\">Intranets and Extranets<\/h2>\r\n<p id=\"frank-ch15_s05_s02_p01\" class=\"nonindent para editable block no-indent\">What\u2019s the difference among the Internet, an intranet, and an extranet? It depends on who can and can\u2019t access the information on the network. The Internet is a public network that anyone can use. A company\u2019s intranet, on the other hand, is a private network using Internet technologies that\u2019s available only to employees; access is controlled by a software program called a firewall. The information available on an intranet varies by company but may include internal job postings, written company policies, and proprietary information, such as price lists meant for internal use only.<\/p>\r\n<p id=\"frank-ch15_s05_s02_p02\" class=\"indent para editable block no-indent\">An extranet is an intranet that\u2019s partially available to certain parties outside the organization. Say, for example, you\u2019ve posted the following information on your intranet: company policies, payroll and benefit information, training programs, parts specifications and inventories, and production schedules. To allow suppliers to bid on contracts, you might give them access to sections of the site disclosing parts specifications, inventories, and production schedules. All other sections would be off limits. You\u2019d control access to employee-only and supplier-accessible sections by means of usernames and passwords. As you can see from <a class=\"xref\" href=\"#frank-ch15_s05_s02_f01\">Figure 15.9 \u201cHow an Extranet Works\u201d<\/a>, which illustrates some of the connections made possible by an extranet, access can be made available to customers and business partners, as well.<\/p>\r\n\r\n<h3><span class=\"title-prefix\">Figure 15.9<\/span> How an Extranet Works<\/h3>\r\n<div class=\"caption\" style=\"text-align: center;font-size: .8em\" id=\"frank-ch15_s05_s02_f01\">\r\n<p class=\"indent\"><a><img src=\"http:\/\/pressbooks.library.upei.ca\/smallbusinessmanagement\/wp-content\/uploads\/sites\/23\/2018\/12\/25c37c3c86aa2a2d67cf63052c2f7008.jpg\" alt=\"How an Extranet Works\" style=\"max-width: 497px\" \/>\r\n<\/a><\/p>\r\n\r\n<\/div>\r\n<\/div>\r\n<div class=\"section\" id=\"frank-ch15_s05_s03\">\r\n<h2 class=\"title editable block\">E-Commerce<\/h2>\r\n<p id=\"frank-ch15_s05_s03_p01\" class=\"nonindent para editable block\">The level of [pb_glossary id=\"764\"]e-commerce[\/pb_glossary]\u2014conducting business over the Internet\u2014varies by company. Some companies, such as Amazon.com, rely on the Internet for their existence. Others, especially smaller firms, have yet to incorporate the Internet into their business models, but these companies belong to a dwindling group: about half of small companies and 90 percent of large companies have Web sites, and a third of the companies that maintain Web sites sell products through them.[footnote]Marketing Charts, March 15, 2011, http:\/\/www.marketingcharts.com\/direct\/less-than-half-of-small-biz-have-sites-16575\/, (accessed November 14, 2011).[\/footnote][footnote]Cambell, A., \u201cOver 70% of the Largest Small Businesses Have a Website\u201d, Selling to Small Businesses, http:\/\/www.sellingtosmallbusinesses.com\/70-percent-largest-small-businesses-have-website\/ (accessed November 14, 2011).[\/footnote] Larger companies now find that they must do business over the Internet, including selling and buying goods.<\/p>\r\n\r\n<div class=\"section\" id=\"frank-ch15_s05_s03_s01\">\r\n<h2 class=\"title editable block\">Why Business Uses the Internet<\/h2>\r\n<p id=\"frank-ch15_s05_s03_s01_p01\" class=\"nonindent para editable block\">Businesses use the Internet for four purposes: <em class=\"emphasis\">presenting information, selling products, distributing digital products<\/em>, and <em class=\"emphasis\">acquiring goods and services<\/em>.<\/p>\r\n\r\n<div class=\"section\" id=\"frank-ch15_s05_s03_s01_s01\">\r\n<h2 class=\"title editable block\">Presenting Information<\/h2>\r\n<p id=\"frank-ch15_s05_s03_s01_s01_p01\" class=\"nonindent para editable block\">By posting a Web site, a company can tell people about itself, its products, and its activities. Customers can also check the status of orders or account balances. Information should always be current, complete, and accurate. Customers should be able to find and navigate the site, which should be able to accommodate them during high-use periods.<\/p>\r\n\r\n<\/div>\r\n<div class=\"section\" id=\"frank-ch15_s05_s03_s01_s02\">\r\n<h2 class=\"title editable block\">Selling Products<\/h2>\r\n<p id=\"frank-ch15_s05_s03_s01_s02_p01\" class=\"nonindent para editable block\">Selling over the Internet\u2014whether to individuals or to other businesses\u2014enables a business to enlarge its customer base by reaching buyers outside its geographical area. A company selling over the Internet must attract customers to its site, make the buying process simple, assure customers that the site is secure, and provide helpful information.<\/p>\r\n\r\n<\/div>\r\n<div class=\"section\" id=\"frank-ch15_s05_s03_s01_s03\">\r\n<h2 class=\"title editable block\">Distributing Digital Products<\/h2>\r\n<p id=\"frank-ch15_s05_s03_s01_s03_p01\" class=\"nonindent para editable block\">Some companies use the Internet to sell and deliver such digital products as subscriptions to online news services, software products and upgrades, and music and video products. In these businesses, the timely delivery of products is crucial. Sales of digital products over the Internet are expected to increase substantially in the future, particularly sales of digital music.[footnote]Sisario, B., \u201cDigital Music Leads Boost in Record Sales,\u201d The New York Times, July 6, 2011, http:\/\/artsbeat.blogs.nytimes.com\/2011\/07\/06\/digital-music-leads-boost-in-record-sales\/ (accessed November 14, 2011).[\/footnote][footnote]Phillips, M., \u201cDigital Music Services Hit First Major Milestone as Downloads Outsell Physical Formats for the First Time,\u201d Head-Fi, September 2, 2004, http:\/\/www.head-fi.org\/t\/59174\/legal-downloads-outselling-other-formats (accessed November 14, 2011).[\/footnote]<\/p>\r\n\r\n<\/div>\r\n<div class=\"section\" id=\"frank-ch15_s05_s03_s01_s04\">\r\n<h2 class=\"title editable block\">Acquiring Goods and Services<\/h2>\r\n<p id=\"frank-ch15_s05_s03_s01_s04_p01\" class=\"nonindent para editable block\"><em class=\"emphasis\">E-purchasing<\/em> (which was introduced in <a class=\"xref\" href=\"https:\/\/umn.pressbooks.network\/exploringbusiness\/?p=904\">Chapter 11 \u201cOperations Management in Manufacturing and Service Industries\u201d<\/a>) saves time, speeds up delivery, reduces administrative costs, and fosters better communications between a firm and its suppliers. Most importantly, it cuts the costs of purchased products because it\u2019s now feasible for buyers to request competitive bids and do comparative shopping. Many companies now use a technology called electronic data interchange to process transactions and transmit purchasing documents directly from one IS to another. <a class=\"xref\" href=\"#frank-ch15_s05_s03_s01_s04_f01\">Figure 15.10 \u201cElectronic Data Interchange System and Value-Added Networks\u201d<\/a> shows an electronic data interchange system at a company that subscribes to a <em class=\"emphasis\">[pb_glossary id=\"1480\"]value-added network[\/pb_glossary]<\/em>\u2014a private system supplied by a third-party firm\u2014over which it conducts a variety of transactions.<\/p>\r\n\r\n<h3 class=\"nonindent para editable block\"><span class=\"title-prefix\">Figure 15.10<\/span> Electronic Data Interchange System and Value-Added Networks<\/h3>\r\n<div class=\"caption\" style=\"text-align: center;font-size: .8em\" id=\"frank-ch15_s05_s03_s01_s04_f01\">\r\n<p class=\"indent\"><a><img src=\"http:\/\/pressbooks.library.upei.ca\/smallbusinessmanagement\/wp-content\/uploads\/sites\/23\/2018\/12\/17469b03ca9383931d675f4b706f2196.jpg\" alt=\"Electronic Data Interchange System and Value-Added Networks\" style=\"max-width: 497px\" \/>\r\n<\/a><\/p>\r\n\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<div class=\"section\" id=\"frank-ch15_s05_s03_s02\">\r\n<h2 class=\"title editable block\">The Virtual Company<\/h2>\r\n<p id=\"frank-ch15_s05_s03_s02_p01\" class=\"nonindent para editable block\">Imagine a company that retails products for schoolteachers over the Internet\u2014for example, books, software, and teaching supplies purchased from various manufacturers and distributors. It would need facilities to store inventories and personnel to handle inventories and fill customer orders. But what if this company decided to get out of the traditional retail business? What if it decided instead to team up with three trading partners\u2014a book publisher, a software developer, and a manufacturer of office supplies? Our original company could re-create itself as a Web site for marketing the books, software, and supplies provided by its partners, without taking physical possession of them. It would become a virtual company. Its partners would warehouse their own products and furnish product descriptions, prices, and delivery times. Meanwhile, the virtual company, besides promoting all three lines of products, would verify customer orders and forward them to its partners, who would ship their own products directly to customers. All four partners would be better off, because they\u2019d be competing in a business in which none of them could compete by itself. This business approach has allowed <a class=\"link\" target=\"_blank\" href=\"http:\/\/spun.com\" rel=\"noopener noreferrer\">Spun.com<\/a>, a CD, DVD, and game Internet retailer, to avoid carrying the $8 million inventory that it would have needed to support its sales. Rather than hold its own inventory, Spun.com merely passes the orders on to Alliance Entertainment (a home entertainment products wholesale distributor), which ships them directly to customers.[footnote]Research at Penn, \u201cCan E-Tailers Find Fulfillment with Drop Shipping?\u201d Research at Penn, http:\/\/www.upenn.edu\/researchatpenn\/article.php?21&amp;bus (accessed November 14, 2011).[\/footnote]<\/p>\r\n\r\n<div class=\"bcc-box bcc-success\" id=\"frank-ch15_s05_s03_s02_n01\">\r\n<h3 class=\"title\">Key Takeaways<\/h3>\r\n<ul id=\"frank-ch15_s05_s03_s02_l01\" class=\"itemizedlist\">\r\n \t<li><strong class=\"emphasis bold\">Data communication networks<\/strong> transmit digital data from one computer to another computer using a variety of wired and wireless communication channels.<\/li>\r\n \t<li>One such network, the <strong class=\"emphasis bold\">Internet<\/strong>, is an immense global network of smaller interconnected networks linking millions of computers.<\/li>\r\n \t<li>By connecting paying subscribers into the Internet infrastructure, a company called an <strong class=\"emphasis bold\">Internet service provider<\/strong> provides services, such as e-mail, online conferencing, and instant messaging.<\/li>\r\n \t<li>A large portion of the Internet, the <strong class=\"emphasis bold\">World Wide Web<\/strong> (\u201cthe Web\u201d), is a subsystem of computers that can be accessed by means of a special protocol known as <em class=\"emphasis\">hypertext transfer protocol (HTTP)<\/em>.<\/li>\r\n \t<li>Computers on the Web are connected with <strong class=\"emphasis bold\">hypertext links<\/strong> that permit users to navigate among Internet resources.<\/li>\r\n \t<li>A Web <strong class=\"emphasis bold\">browser<\/strong> is software that locates and displays Web pages.<\/li>\r\n \t<li>Though the Web couldn\u2019t exist without the Internet, it\u2019s the Web that provides such multimedia material as pictures, sounds, and streaming videos.<\/li>\r\n \t<li>Businesses use the Internet for four purposes: presenting information, selling products, acquiring goods and services, and distributing digital products.<\/li>\r\n \t<li>While the Internet is a public network that anyone can use, a company\u2019s <strong class=\"emphasis bold\">intranet<\/strong> is a private network that\u2019s available only to its employees; access is controlled by a software program called a <em class=\"emphasis\">firewall<\/em>.<\/li>\r\n \t<li>An <strong class=\"emphasis bold\">extranet<\/strong> is an intranet that\u2019s partially available to certain outside parties, such as suppliers.<\/li>\r\n<\/ul>\r\n<\/div>\r\n<div class=\"bcc-box bcc-info\" id=\"frank-ch15_s05_s03_s02_n02\">\r\n<h3 class=\"title\">Exercises<\/h3>\r\n<ol id=\"frank-ch15_s05_s03_s02_l02\" class=\"orderedlist\">\r\n \t<li>If asked by your instructor, how would you explain the difference between the Internet and the World Wide Web?<\/li>\r\n \t<li>\r\n<p class=\"nonindent simpara\"><strong class=\"emphasis bold\">(AACSB) Analysis<\/strong><\/p>\r\n<p id=\"frank-ch15_s05_s03_s02_p02\" class=\"indent para\">Identify ten specific ways in which your college uses the Internet.<\/p>\r\n<\/li>\r\n<\/ol>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<div class=\"chapter standard\" id=\"slug-15-6-security-issues-in-electronic-communication\">\r\n<div class=\"chapter-title-wrap\">\r\n<h1 class=\"chapter-title\" style=\"text-align: center\">Security Issues in Electronic Communication<\/h1>\r\n<\/div>\r\n<div class=\"ugc chapter-ugc\">\r\n<div class=\"bcc-box bcc-highlight\" id=\"frank-ch15_s06_n01\">\r\n<h3 class=\"title\">Learning Objective<\/h3>\r\n<ol id=\"frank-ch15_s06_l01\" class=\"orderedlist\">\r\n \t<li>Identify and discuss challenges faced by companies engaged in e-commerce.<\/li>\r\n<\/ol>\r\n<\/div>\r\n<p id=\"frank-ch15_s06_p01\" class=\"nonindent para editable block\">E-commerce has presented businesses with opportunities undreamt of only a couple of decades ago. But it also has introduced some unprecedented challenges. For one thing, companies must now earmark more than 5 percent of their annual IT budgets for protecting themselves against disrupted operations and theft due to computer crime and sabotage.[footnote]Alexander, S., \u201cFeds Take Up Arms as Computer Crime Becomes Multibillion-Dollar Problem,\u201d Minneapolis Star Tribune, Computer Crime Research Center, http:\/\/www.crime-research.org\/news\/2003\/10\/Mess0601.html (accessed November 14, 2011).[\/footnote] The costs resulting from [pb_glossary id=\"1481\"]cyber crimes[\/pb_glossary]\u2014criminal activity done using computers or the Internet\u2014are substantial and increasing at an alarming rate. A 2010 study of forty-five large U.S. companies revealed that the median cost of cybercrime for the companies in the study was $3.8 million a year.[footnote]Ponemon Institute, \u201cFirst Annual Cost of Cyber Crime Study: Benchmark Study of U.S. Companies,\u201d Ponemon Institute, July 2010, http:\/\/www.riskandinsurancechalkboard.com\/uploads\/file\/Ponemon%20Study%281%29.pdf (accessed November 14, 2011).[\/footnote] And some cybercrimes involve viruses that can spread rapidly from computer to computer creating enormous damage. It\u2019s estimated, for example, that damage to 50,000 personal computers and corporate networks from the so-called Blaster worm in August 2003 totaled $2 billion, including $1.2 billion paid by Microsoft to correct the problem.[footnote]Shukovsky, P., \u201cBlaster Worm Attacker Gets 18 Months,\u201d Seattle Post-Intelligencer, http:\/\/www.seattlepi.com\/local\/article\/Blaster-worm-attacker-gets-18-months-1165231.php (accessed November 14, 2011).[\/footnote] The battle against technology crime is near the top of the FBI\u2019s list of priorities, behind only the war against terrorism and espionage.[footnote]Alexander, S., \u201cFeds Take Up Arms as Computer Crime Becomes Multibillion-Dollar Problem,\u201d Minneapolis Star Tribune, Computer Crime Research Center, http:\/\/www.crime-research.org\/news\/2003\/10\/Mess0601.html (accessed November 14, 2011).[\/footnote] In addition to protecting their own operations from computer crime, companies engaged in e-commerce must clear another hurdle: they must convince consumers that it\u2019s safe to buy things over the Internet\u2014that credit-card numbers, passwords, and other personal information are protected from theft or misuse. In this section, we\u2019ll explore some of these challenges and describe a number of the efforts being made to meet them.<\/p>\r\n\r\n<div class=\"section\" id=\"frank-ch15_s06_s01\">\r\n<h2 class=\"title editable block\">Data Security<\/h2>\r\n<p id=\"frank-ch15_s06_s01_p01\" class=\"nonindent para editable block\">In some ways, life was simpler for business-people before computers. Records were produced by hand and stored on paper. As long as you were careful to limit access to your records (and remembered to keep especially valuable documents in a safe), you faced little risk of someone altering or destroying your records. In some ways, storing and transmitting data electronically is a little riskier. Let\u2019s look at two data-security risks associated with electronic communication: <em class=\"emphasis\">malicious programs<\/em> and <em class=\"emphasis\">spoofing<\/em>.<\/p>\r\n\r\n<div class=\"section\" id=\"frank-ch15_s06_s01_s01\">\r\n<h2 class=\"title editable block\">Malicious Programs<\/h2>\r\n<p id=\"frank-ch15_s06_s01_s01_p01\" class=\"nonindent para editable block\">Some people get a kick out of wreaking havoc with computer systems by spreading a variety of destructive programs. Once they\u2019re discovered, they can be combated with antivirus programs that are installed on most computers and that can be updated daily. In the meantime, unfortunately, they can do a lot of damage, bringing down computers or entire networks by corrupting operating systems or databases.<\/p>\r\n\r\n<div class=\"section\" id=\"frank-ch15_s06_s01_s01_s01\">\r\n<h2 class=\"title editable block\">Viruses, Worms, and Trojan Horses<\/h2>\r\n<p id=\"frank-ch15_s06_s01_s01_s01_p01\" class=\"nonindent para editable block\">The cyber vandal\u2019s repertory includes \u201cviruses,\u201d \u201cworms,\u201d and \u201cTrojan horses.\u201d Viruses and worms are particularly dangerous because they can copy themselves over and over again, eventually using up all available memory and closing down the system. Trojan horses are viruses that enter your computer by posing as some type of application. Some sneak in by pretending to be virus-scanning programs designed to rid your computer of viruses. Once inside, they do just the opposite.<\/p>\r\n\r\n<\/div>\r\n<\/div>\r\n<div class=\"section\" id=\"frank-ch15_s06_s01_s02\">\r\n<h2 class=\"title editable block\">Spoofing<\/h2>\r\n<p id=\"frank-ch15_s06_s01_s02_p01\" class=\"nonindent para editable block\">It\u2019s also possible for unauthorized parties to gain access to restricted company Web sites\u2014usually for the purpose of doing something illegal. Using a technique called \u201cspoofing,\u201d culprits disguise their identities by modifying the address of the computer from which the scheme has been launched. Typically, the point is to make it look as if an incoming message has originated from an authorized source. Then, once the site\u2019s been accessed, the perpetrator can commit fraud, spy, or destroy data. You could, for example, spoof a manufacturing firm with a false sales order that seems to have come from a legitimate customer. If the spoof goes undetected, the manufacturer will incur the costs of producing and delivering products that were never ordered (and will certainly never be paid for).<\/p>\r\n<p id=\"frank-ch15_s06_s01_s02_p02\" class=\"indent para editable block no-indent\">Every day, technically savvy thieves (and dishonest employees) steal large sums of money from companies by means of spoofing or some other computer scheme. It\u2019s difficult to estimate the dollar amount because many companies don\u2019t even know how much they\u2019ve lost.<\/p>\r\n\r\n<\/div>\r\n<\/div>\r\n<div class=\"section\" id=\"frank-ch15_s06_s02\">\r\n<h2 class=\"title editable block\">Revenue Theft<\/h2>\r\n<p id=\"frank-ch15_s06_s02_p01\" class=\"nonindent para editable block\">In addition to the problems of data security faced by every company that stores and transmits information electronically, companies that sell goods or provide services online are also vulnerable to activities that threaten their revenue sources. Two of the most important forms of computer crime are <em class=\"emphasis\">denial of service<\/em> and <em class=\"emphasis\">piracy<\/em>.<\/p>\r\n\r\n<div class=\"section\" id=\"frank-ch15_s06_s02_s01\">\r\n<h2 class=\"title editable block\">Denial of Service<\/h2>\r\n<p id=\"frank-ch15_s06_s02_s01_p01\" class=\"nonindent para editable block\">A denial-of-service attack does exactly what the term suggests: it prevents a Web server from servicing authorized users. Consider the following scenario. Dozens of computers are whirring away at an online bookmaker in the offshore gambling haven of Costa Rica. Suddenly a mass of blank incoming messages floods the company\u2019s computers, slowing operations to a trickle. No legitimate customers can get through to place their bets. A few hours later, the owner gets an e-mail that reads, \u201cIf you want your computers to stay up and running through the football season, wire $40,000 to each of 10 numbered bank accounts in Eastern Europe.\u201d<\/p>\r\n<p id=\"frank-ch15_s06_s02_s01_p02\" class=\"indent para editable block no-indent\">You\u2019re probably thinking that our choice of online gambling as an example of this scheme is a little odd, but we chose it because it\u2019s real: many companies in the online-gambling industry suffer hundreds of such attacks each year.[footnote]Baker, S., and Brian Grow, \u201cGambling Sites, This Is a Holdup,\u201d BusinessWeek Online, August 9, 2004, http:\/\/www.businessweek.com\/magazine\/content\/04_32\/b3895106_mz063.htm (accessed November 14, 2011).[\/footnote] Because most gambling operations opt to pay the ransom and get back to business as usual, denial of service to businesses in the industry has become a very lucrative enterprise.<\/p>\r\n<p id=\"frank-ch15_s06_s02_s01_p03\" class=\"indent para editable block no-indent\">Online gambling operations are good targets because they\u2019re illegal in the United States, where they can\u2019t get any help from law-enforcement authorities. But extortionists have been known to hit other targets, including Microsoft and the Recording Industry Association of America. The problem could become much more serious if they start going after e-commerce companies and others that depend on incoming orders to stay afloat.<\/p>\r\n\r\n<\/div>\r\n<div class=\"section\" id=\"frank-ch15_s06_s02_s02\">\r\n<h2 class=\"title editable block\">Piracy<\/h2>\r\n<p id=\"frank-ch15_s06_s02_s02_p01\" class=\"nonindent para editable block\">Technology makes it easier to create and sell intellectual property, but it also makes it easier to steal it. Because digital products can be downloaded and copied almost instantly over the Internet, it\u2019s a simple task to make perfect replicas of your favorite copyright-protected songs, movies, TV shows, and computer software, whether for personal use or further distribution. When you steal such materials, you\u2019re cheating the countless musicians, technicians, actors, programmers, and others involved in creating and selling them. Theft cuts into sales and shrinks corporate profits, often by staggering amounts. Entertainment-industry analysts estimate that $30 billion worth of songs were illegally downloaded in the five year period ending in 2009.[footnote]Recording Industry Association of America, \u201cFor Students Doing Reports,\u201d Recording Industry Association of America, http:\/\/www.riaa.com\/faq.php (accessed November 14, 2011).[\/footnote] The software industry estimates that the global market for pirated software reached $59 billion in 2010.[footnote]Epstein, Z., \u201cGlobal Market for Pirated Software Reaches $59 billion,\u201d BGR Innovation, http:\/\/www.bgr.com\/2011\/05\/12\/global-market-for-pirated-software-reaches-59-billion\/ (accessed November 14, 2011).[\/footnote]<\/p>\r\n<p id=\"frank-ch15_s06_s02_s02_p02\" class=\"indent para editable block no-indent\">So, what\u2019s being done to protect the victimized companies? Actually, quite a lot, even though it\u2019s a daunting task, both in the United States and abroad.[footnote]AudioMicro, \u201cCan\u2019t Stop Piracy,\u201d AudioMicro, May 20, 2010, http:\/\/www.audiomicro.com\/royalty-free-music-blog\/2010\/05\/can%E2%80%99t-stop-piracy\/ (accessed November 14, 2011).[\/footnote] In 1998, Congress passed the Digital Millennium Copyright Act, which outlaws the copying of copyright-protected music (unless you\u2019re copying legally acquired music for your own use). The penalties are fairly stiff: up to three years in prison and $250,000 in fines.[footnote]Recording Industry Association of America, \u201cThe Law,\u201d Recording Industry Association of America, http:\/\/www.riaa.com\/physicalpiracy.php?content_selector=piracy_online_the_law (accessed November 14, 2011).[\/footnote][footnote]World Law Direct, \u201cIs Downloading Music Illegal?,\u201d World Law Direct, http:\/\/www.worldlawdirect.com\/article\/1395\/downloading-music-legal.html (accessed November 14, 2011).[\/footnote] To show that it means business, the music industry is also hauling offenders into court, but legal action is costly and prosecuting teenage music lovers doesn\u2019t accomplish much. Some observers believe that the best solution is for the industry to accelerate its own efforts to offer its products online.[footnote]Green, H., \u201cDigital Media: Don\u2019t Clamp Down Too Hard,\u201d BusinessWeek Online, October 14, 2002, http:\/\/www.businessweek.com\/magazine\/content\/02_41\/b3803121.htm (accessed November 14, 2011).[\/footnote] Initial attempts seem to be working: people who are willing to obey copyright laws have downloaded more than ten billion songs from the iTunes site alone.[footnote]Apple, \u201cApple\u2019s App Store Downloads Top 10 Billion,\u201d Apple, http:\/\/www.apple.com\/pr\/library\/2011\/01\/22Apples-App-Store-Downloads-Top-10-Billion.html (accessed November 14, 2011).[\/footnote]<\/p>\r\n\r\n<div class=\"section\" id=\"frank-ch15_s06_s02_s02_s01\">\r\n<h2 class=\"title editable block\">Firewalls<\/h2>\r\n<p id=\"frank-ch15_s06_s02_s02_s01_p01\" class=\"nonindent para editable block\">Builders install firewalls (or fireproof walls) in structures to keep a fire that starts in one part of a building from entering another part. Companies do something similar to protect their computer systems from outside intruders: they install virtual [pb_glossary id=\"1482\"]firewalls[\/pb_glossary]\u2014software and hardware systems that prevent unauthorized users from accessing their computer networks.<\/p>\r\n<p id=\"frank-ch15_s06_s02_s02_s01_p02\" class=\"indent para editable block no-indent\">You can think of the firewall as a gatekeeper that stands at the entry point of the company\u2019s network and monitors incoming and outgoing traffic. The firewall system inspects and screens all incoming messages to prevent unwanted intruders from entering the system and causing damage. It also regulates outgoing traffic to prevent employees from inappropriately sending out confidential data that shouldn\u2019t leave the organization.<\/p>\r\n\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<div class=\"section\" id=\"frank-ch15_s06_s03\">\r\n<h2 class=\"title editable block\">Risks to Customers<\/h2>\r\n<p id=\"frank-ch15_s06_s03_p01\" class=\"nonindent para editable block\">Many people still regard the Internet as an unsafe place to do business. They worry about the security of credit-card information and passwords and the confidentiality of personal data. Are any of these concerns valid? Are you really running risks when you shop electronically? If so, what\u2019s being done to make the Internet a safer place to conduct transactions? Let\u2019s look a little more closely at the sort of things that tend to bother some Internet users (or, as the case may be, nonusers), as well as some of the steps that companies are taking to convince people that e-commerce is safe.<\/p>\r\n\r\n<div class=\"section\" id=\"frank-ch15_s06_s03_s01\">\r\n<h2 class=\"title editable block\">Credit-Card Theft<\/h2>\r\n<p id=\"frank-ch15_s06_s03_s01_p01\" class=\"nonindent para editable block\">One of the more serious barriers to the growth of e-commerce is the perception of many people that credit-card numbers can be stolen when they\u2019re given out over the Internet. Though virtually every company takes considerable precautions, they\u2019re not entirely wrong. Cyber criminals, unfortunately, seem to be tirelessly creative. One popular scheme involves setting up a fraudulent Internet business operation to collect credit-card information. The bogus company will take orders to deliver goods\u2014say, Mother\u2019s Day flowers\u2014but when the day arrives, it will have disappeared from cyberspace. No flowers will get delivered, but even worse, the perpetrator can sell or use all the collected credit-card information.<\/p>\r\n\r\n<\/div>\r\n<div class=\"section\" id=\"frank-ch15_s06_s03_s02\">\r\n<h2 class=\"title editable block\">Password Theft<\/h2>\r\n<p id=\"frank-ch15_s06_s03_s02_p01\" class=\"nonindent para editable block\">Many people also fear that Internet passwords\u2014which can be valuable information to cyber criminals\u2014are vulnerable to theft. Again, they\u2019re not altogether wrong. There are schemes dedicated entirely to stealing passwords. In one, the cyber thief sets up a Web site that you can access only if you register, provide an e-mail address, and select a password. The cyber criminal is betting that the site will attract a certain percentage of people who use the same password for just about everything\u2014ATM accounts, e-mail, employer networks. Having finagled a password, the thief can try accessing other accounts belonging to the victim. So, one day you have a nice cushion in your checking account, and the next you\u2019re dead broke.<\/p>\r\n\r\n<\/div>\r\n<div class=\"section\" id=\"frank-ch15_s06_s03_s03\">\r\n<h2 class=\"title editable block\">Invasion of Privacy<\/h2>\r\n<p id=\"frank-ch15_s06_s03_s03_p01\" class=\"nonindent para editable block\">If you apply for a life-insurance policy online, you may be asked to supply information about your health. If you apply for a mortgage online, you may be asked questions about your personal finances. Some people shy away from Internet transactions because they\u2019re afraid that such personal information can be stolen or shared with unauthorized parties. Once again, they\u2019re right: it does happen.<\/p>\r\n\r\n<div class=\"section\" id=\"frank-ch15_s06_s03_s03_s01\">\r\n<h2 class=\"title editable block\">How Do \u201cCookies\u201d Work?<\/h2>\r\n<p id=\"frank-ch15_s06_s03_s03_s01_p01\" class=\"nonindent para editable block\">In addition to data that you supply willingly, information about you can be gathered online without your knowledge or consent.[footnote]Reputation.com, \u201cAre Cookies Jeopardizing Your Online Privacy?,\u201d Reputation.com, http:\/\/www.reputation.com\/how_to\/are-cookies-jeopardizing-your-online-privacy\/ (accessed November 14, 2011).[\/footnote] Your online activities, for example, can be captured by something called a <em class=\"emphasis\">cookie<\/em>. The process is illustrated in <a class=\"xref\" href=\"#frank-ch15_s06_s03_s03_s01_f01\">Figure 15.11 \u201cHow Cookies Work\u201d<\/a>. When you access a certain Web site, it sends back a unique piece of information to your browser, which proceeds to save it on your hard drive. When you go back to the same site, your browser returns the information, telling the site who you are and confirming that you\u2019ve been there before. The problem is not that the cookie can identify you in the same way as a name or an address. It is, however, linked to other information about you\u2014such as the goods you\u2019ve bought or the services you\u2019ve ordered online. Before long, someone will have compiled a profile of your buying habits. The result? You\u2019ll soon be bombarded with advertisements targeted to your interests. For example, let\u2019s suppose you check out the Web site for an online diet program. You furnish some information but decide that the program is not for you. The next time you log on, you may be greeted by a pop-up pushing the latest miracle diet.<\/p>\r\n\r\n<div class=\"figure full editable block\" id=\"frank-ch15_s06_s03_s03_s01_f01\">\r\n<h3 class=\"nonindent title\"><span class=\"title-prefix\">Figure 15.11<\/span> How Cookies Work<\/h3>\r\n<p class=\"indent\"><a>\r\n<img src=\"http:\/\/pressbooks.library.upei.ca\/smallbusinessmanagement\/wp-content\/uploads\/sites\/23\/2018\/12\/e78d14c2bcab42cc1ff79e651b63d462.jpg\" alt=\"How Cookies Work: 1) You get on the Web...; 2) ...and request information from a Web site.; 3) When the Web site server replies, it sends a cookie...; 4) ...which your computer puts on your hard drive.; 5) When you get online to return to the Web site...; 6) ...your computer sends the cookie back...; 7) ...where the Web site server identifies you and records data that can be shared with other online sellers.\" style=\"max-width: 497px\" \/>\r\n<\/a><\/p>\r\n\r\n<\/div>\r\n<p id=\"frank-ch15_s06_s03_s03_s01_p02\" class=\"indent para editable block no-indent\">Cookies aren\u2019t the only form of online espionage. Your own computer, for example, monitors your Internet activities and keeps track of the URLs that you access.<\/p>\r\n\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<div class=\"section\" id=\"frank-ch15_s06_s04\">\r\n<h2 class=\"title editable block\">Shoring Up Security and Building Trust<\/h2>\r\n<p id=\"frank-ch15_s06_s04_p01\" class=\"nonindent para editable block\">So, what can companies do to ease concerns about the safety of Internet transactions? First, businesses must implement internal controls for ensuring adequate security and privacy. Then, they must reassure customers that they\u2019re competent to safeguard credit-card numbers, passwords, and other personal information. Among the most common controls and assurance techniques, let\u2019s look at <em class=\"emphasis\">encryption<\/em> and <em class=\"emphasis\">seals of assurance<\/em>.<\/p>\r\n\r\n<div class=\"section\" id=\"frank-ch15_s06_s04_s01\">\r\n<h2 class=\"title editable block\">Encryption<\/h2>\r\n<p id=\"frank-ch15_s06_s04_s01_p01\" class=\"nonindent para editable block\">The most effective method of ensuring that sensitive computer-stored information can\u2019t be accessed or altered by unauthorized parties is <span class=\"margin_term\">[pb_glossary id=\"1483\"]encryption[\/pb_glossary]\u2014the process of encoding data so that only individuals (or computers) armed with a secret code (or key) can decode it. Here\u2019s a simplified example: You want to send a note to a friend on the other side of the classroom, but you don\u2019t want anyone else to know what it says. You and your friend could devise a code in which you substitute each letter in the message with the letter that\u2019s two places before it in the alphabet. So you write A as C and B as D and so on. Your friend can decode the message, but it\u2019ll look like nonsense to anyone else. This is an oversimplification of the process. In the real world, it\u2019s much more complicated: data are scrambled using a complex code, the key for unlocking it is an algorithm, and you need certain computer hardware to perform the encryption\/decryption process.<\/span><\/p>\r\n\r\n<div class=\"section\" id=\"frank-ch15_s06_s04_s01_s01\">\r\n<h2 class=\"title editable block\">Certificate Authorities<\/h2>\r\n<p id=\"frank-ch15_s06_s04_s01_s01_p01\" class=\"nonindent para editable block\">The most commonly used encryption system for transmitting data over the Internet is called <em class=\"emphasis\">secure sockets layer<\/em> (SSL). You can tell whether a Web site uses SSL if its URL begins with <em class=\"emphasis\">https<\/em> instead of <em class=\"emphasis\">http<\/em>. SSL also provides another important security measure: when you connect to a site that uses SSL (for example, your bank\u2019s site), your browser will ask the site to authenticate itself\u2014prove that it is who it says it is. You can be confident that the response is correct if it\u2019s verified by a [pb_glossary id=\"1484\"]certificate authority[\/pb_glossary]\u2014a third-party (such as VeriSign) that verifies the identify of the responding computer and sends you a digital certificate of authenticity stating that it trusts the site.<\/p>\r\n\r\n<div class=\"bcc-box bcc-success\" id=\"frank-ch15_s06_s04_s01_s01_n01\">\r\n<h3 class=\"title\">Key Takeaways<\/h3>\r\n<ul id=\"frank-ch15_s06_s04_s01_s01_l01\" class=\"itemizedlist\">\r\n \t<li>\r\n<p class=\"nonindent para\">Though a source of vast opportunities, <strong class=\"emphasis bold\">e-commerce<\/strong>\u2014conducting business over the Internet\u2014also presents some unprecedented challenges, particularly in the area of security.<\/p>\r\n\r\n<ol id=\"frank-ch15_s06_s04_s01_s01_l02\" class=\"orderedlist\">\r\n \t<li><em class=\"emphasis\">Malicious programs<\/em>, such as viruses and worms, can wreak havoc with computer systems.<\/li>\r\n \t<li>Unauthorized parties may gain access to restricted company Web sites in order to steal funds or goods.<\/li>\r\n \t<li><strong class=\"emphasis bold\">Firewalls<\/strong>\u2014software and hardware systems that prevent unauthorized users from accessing computer networks\u2014help to reduce the risks of doing business online.<\/li>\r\n<\/ol>\r\n<\/li>\r\n \t<li>\r\n<p class=\"nonindent para\">Companies that do business online are also vulnerable to illegal activities.<\/p>\r\n\r\n<ol id=\"frank-ch15_s06_s04_s01_s01_l03\" class=\"orderedlist\">\r\n \t<li>A <em class=\"emphasis\">denial-of-service attack<\/em>, for example, prevents a Web server from servicing authorized users; the culprit demands a ransom to stop the attack.<\/li>\r\n \t<li>Companies that use the Internet to create and sell intellectual property (such as songs, movies, and software) face the problem of <em class=\"emphasis\">piracy<\/em>.<\/li>\r\n \t<li>The theft of digital products, which can be downloaded and copied almost instantly over the Internet, not only cheats the individuals and organizations that create them, but also reduces sales and shrinks corporate profits.<\/li>\r\n<\/ol>\r\n<\/li>\r\n \t<li>Finally, online businesses must convince consumers that it\u2019s safe to buy things over the Internet\u2014that credit-card numbers, passwords, and other personal information are protected from theft.<\/li>\r\n \t<li>\r\n<p class=\"nonindent para\">One effective method for protecting computer-stored information is <strong class=\"emphasis bold\">encryption<\/strong>\u2014the process of encoding data so that only individuals (or computers) armed with a secret code (or key) can decode it.<\/p>\r\n\r\n<ol id=\"frank-ch15_s06_s04_s01_s01_l04\" class=\"orderedlist\">\r\n \t<li>A commonly used encryption scheme is a <em class=\"emphasis\">secure sockets layer<\/em> (SSL), which directs the user\u2019s browser to ask a site to authenticate itself.<\/li>\r\n \t<li>Often, the user receives a digital certificate of authenticity, verifying that a third-party security provider called a <strong class=\"emphasis bold\">certificate authority<\/strong> has identified a computer.<\/li>\r\n<\/ol>\r\n<\/li>\r\n<\/ul>\r\n<\/div>\r\n<div class=\"bcc-box bcc-info\" id=\"frank-ch15_s06_s04_s01_s01_n02\">\r\n<h3 class=\"title\">Exercise<\/h3>\r\n<p class=\"nonindent simpara\">(AACSB) Reflective Skills<\/p>\r\n<p id=\"frank-ch15_s06_s04_s01_s01_p02\" class=\"indent para\">Are you, or is someone you know, hesitant to buy things over the Internet? What risks concern you? What are companies doing to ease consumers\u2019 concerns about the safety of Internet transactions?<\/p>\r\n\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<div class=\"chapter standard\" id=\"slug-15-7-careers-in-information-management\">\r\n<div class=\"chapter-title-wrap\">\r\n<h1 class=\"chapter-title\" style=\"text-align: center\">Careers in Information Management<\/h1>\r\n<\/div>\r\n<div class=\"ugc chapter-ugc\">\r\n<div class=\"bcc-box bcc-highlight\" id=\"frank-ch15_s07_n01\">\r\n<h3 class=\"title\">Learning Objective<\/h3>\r\n<ol id=\"frank-ch15_s07_l01\" class=\"orderedlist\">\r\n \t<li>Identify career opportunities in information management.<\/li>\r\n<\/ol>\r\n<\/div>\r\n<p id=\"frank-ch15_s07_p01\" class=\"nonindent para editable block\">The number and variety of opportunities in the IS field have grown substantially as organizations have expanded their use of IT. In most large organizations, the senior management team includes a <em class=\"emphasis\">chief information officer (CIO)<\/em> who oversees information and telecommunications systems. A large organization might also have a <em class=\"emphasis\">chief technology officer<\/em> who reports to the CIO and oversees IT planning and implementation.<\/p>\r\n<p id=\"frank-ch15_s07_p02\" class=\"indent para editable block no-indent\">Most entry-level IS jobs require a business degree with a major in information systems. Many people supplement their IS majors with minors in computer science or some other business area, such as accounting, finance, marketing, or operations management.<\/p>\r\n<p id=\"frank-ch15_s07_p03\" class=\"indent para editable block no-indent\">If you\u2019re starting out with an IS degree, you may choose to follow either a management path or a technical path. At Kraft Foods, for example, IS professionals can focus on one of two areas: applications development (a management focus) and information technology (a technology focus). \u201cApplications development,\u201d according to the company itself, \u201ccalls for an ability to analyze [Kraft\u2019s] clients\u2019 needs and translate them into systems applications. Information technology calls for the ability to convert business systems specifications into technical specifications and to provide guidance and technical counsel to other Kraft professionals\u201d.[footnote]Kraft Foods, \u201cCareers at Kraft: Information Systems,\u201d Kraft Foods, http:\/\/www.kraftfoods.com\/careers\/careers\/systems.htm (accessed June 2, 2006).[\/footnote] Despite the differences in focus, Kraft encourages IS specialists to develop expertise in both areas. After all, it\u2019s the ability to apply technical knowledge to business situations that makes IS professionals particularly valuable to organizations. (By the way, if you want a career in casinos, you can major in casino management at a number of business schools.)<\/p>\r\n\r\n<div class=\"bcc-box bcc-success\" id=\"frank-ch15_s07_n02\">\r\n<h3 class=\"title\">Key Takeaways<\/h3>\r\n<ul id=\"frank-ch15_s07_l02\" class=\"itemizedlist\">\r\n \t<li>The number and variety of opportunities in the information systems (IS) field have grown substantially as companies have expanded their use of information technology.<\/li>\r\n \t<li>The senior management team in large organizations includes a chief information officer who oversees information and a chief technology officer who oversees IT planning and implementation.<\/li>\r\n \t<li>Most entry-level IS jobs require a business degree with a major in information systems.<\/li>\r\n \t<li>Many supplement their IS majors with computer science or some other business area, such as accounting, finance, marketing, or operations management.<\/li>\r\n \t<li>Those entering organizations with IS degrees may choose to follow either a management or a technology path.<\/li>\r\n<\/ul>\r\n<\/div>\r\n<div class=\"bcc-box bcc-info\" id=\"frank-ch15_s07_n03\">\r\n<h3 class=\"title\">Exercise<\/h3>\r\n<p class=\"nonindent simpara\">(AACSB) Reflective Skills<\/p>\r\n<p id=\"frank-ch15_s07_p04\" class=\"indent para\">Why is studying IT important to you as a student? How will competency in this area help you get and keep a job in the future?<\/p>\r\n\r\n<\/div>\r\n<div class=\"chapter standard\" id=\"slug-15-8-cases-and-problems\">\r\n<div class=\"chapter-title-wrap\">\r\n<h1 class=\"chapter-title\" style=\"text-align: center\">Cases and Problems<\/h1>\r\n<\/div>\r\n<div class=\"ugc chapter-ugc\">\r\n<div class=\"bcc-box bcc-info\" id=\"frank-ch15_s08_n01\">\r\n<h3 class=\"title\">Learning on the Web<\/h3>\r\n<p id=\"frank-ch15_s08_p01\" class=\"nonindent para\"><strong class=\"emphasis bold\">Taking Care of Your Cyber Health<\/strong><\/p>\r\n<p id=\"frank-ch15_s08_p02\" class=\"indent para\">It seems that some people have nothing better to do than wreak havoc by spreading computer viruses, and as a computer user, you should know how to protect yourself from malicious tampering. One place to start is by reading the article \u201cHow Computer Viruses Work,\u201d by Marshall Brain, which you can access by going to the How Stuff Works Web site (<a class=\"link\" href=\"http:\/\/computer.howstuffworks.com\/virus.htm\">http:\/\/computer.howstuffworks.com\/virus.htm<\/a>). After reading the article, answer the following questions:<\/p>\r\n\r\n<ol id=\"frank-ch15_s08_l01\" class=\"orderedlist\">\r\n \t<li>Why do people create viruses?<\/li>\r\n \t<li>What can you do to protect yourself against viruses?<\/li>\r\n<\/ol>\r\n<\/div>\r\n<div class=\"bcc-box bcc-info\" id=\"frank-ch15_s08_n02\">\r\n<h3 class=\"title\">Career Opportunities<\/h3>\r\n<p id=\"frank-ch15_s08_p03\" class=\"nonindent para\"><strong class=\"emphasis bold\">Could You Manage a Job in IT or IS?<\/strong><\/p>\r\n<p id=\"frank-ch15_s08_p04\" class=\"indent para\">Do you have an aptitude for dealing with IT? Would you enjoy analyzing the information needs of an organization? Are you interested in directing a company\u2019s Internet operations or overseeing network security? If you answered yes to any of these questions, then a career in IT and IS might be for you. Go to the U.S. Department of Labor Web site (<a class=\"link\" href=\"http:\/\/www.bls.gov\/oco\/ocos258.htm\">http:\/\/www.bls.gov\/oco\/ocos258.htm<\/a>) and learn more about the nature of the work, qualifications, and job outlook in IT and IS management. Bearing in mind that many people who enter the IT field attain middle-management positions, look for answers to the following questions:<\/p>\r\n\r\n<ol id=\"frank-ch15_s08_l02\" class=\"orderedlist\">\r\n \t<li>What kinds of jobs do IT managers perform?<\/li>\r\n \t<li>What educational background, work experience, and skills are needed for positions in IT management?<\/li>\r\n \t<li>What\u2019s the current job outlook for IS and IT managers? What factors drive employment opportunities?<\/li>\r\n \t<li>What\u2019s the median annual income of a mid-level IT manager?<\/li>\r\n<\/ol>\r\n<\/div>\r\n<div class=\"bcc-box bcc-info\" id=\"frank-ch15_s08_n03\">\r\n<h3 class=\"title\">Ethics Angle (AACSB)<\/h3>\r\n<p id=\"frank-ch15_s08_p05\" class=\"nonindent para\"><strong class=\"emphasis bold\">Campus Commando or Common Criminal?<\/strong><\/p>\r\n<p id=\"frank-ch15_s08_p06\" class=\"indent para\">Do you want to be popular (or at least more prominent) on campus? You could set up a Web site that lets fellow students share music files over the campus network. All you have to do is seed the site with some of your own downloaded music and let the swapping begin. That\u2019s exactly what Daniel Peng did when he was a sophomore at Princeton. It was a good idea, except for one small hitch: it was illegal, and he got caught. Unimpressed with Peng\u2019s technological ingenuity, the Recording Industry Association of America (RIAA) sued him, and he was forced to settle for $15,000. Instead of delivering music, Peng\u2019s Web site now asks visitors to send money to help defray the $15,000 and another $8,000 in legal costs.<\/p>\r\n<p id=\"frank-ch15_s08_p07\" class=\"indent para\">To learn more about the case, read these articles from the Daily Princetonian: \u201cPeng, RIAA Settle Infringement Case\u201d (<a class=\"link\" target=\"_blank\" href=\"http:\/\/www.dailyprincetonian.com\/2003\/05\/02\/8154\" rel=\"noopener noreferrer\">http:\/\/www.dailyprincetonian.com\/2003\/05\/02\/8154\/<\/a>), and \u201cPeng \u201905 Sued by Recording Industry for \u2018Wake\u2019 Site\u201d (<a class=\"link\" target=\"_blank\" href=\"http:\/\/www.dailyprincetonian.com\/2003\/04\/04\/7791\" rel=\"noopener noreferrer\">http:\/\/www.dailyprincetonian.com\/2003\/04\/04\/7791<\/a>).<\/p>\r\n<p class=\"indent para\">After researching the topic, answer the following questions:<\/p>\r\n\r\n<ol id=\"frank-ch15_s08_l03\" class=\"orderedlist\">\r\n \t<li>The practice of sharing commercial music files is illegal. Do you think that it\u2019s also unethical? Why, or why not?<\/li>\r\n \t<li>What steps to curb the practice are being taken by the music industry? By college administrators? By the government? Do you approve of these steps? Have they been effective?<\/li>\r\n \t<li>What, ultimately, do you see as the solution to the problem?<\/li>\r\n<\/ol>\r\n<p class=\"indent para\">Source: Josh Brodie, \u201cPeng, RIAA Settle Infringement Case,\u201d <em class=\"emphasis\">The Daily Princetonian<\/em>, <a class=\"link\" target=\"_blank\" href=\"http:\/\/www.dailyprincetonian.com\/2003\/05\/02\/8154\" rel=\"noopener noreferrer\">http:\/\/www.dailyprincetonian.com\/2003\/05\/02\/8154\/<\/a> (accessed November 14, 2011); Zachary Goldfarb and Josh Brodie, \u201cPeng \u201905 Sued by Recording Industry for \u2018Wake\u2019 Site,\u201d <em class=\"emphasis\">The Daily Princetonian<\/em><a class=\"link\" target=\"_blank\" href=\"http:\/\/www.dailyprincetonian.com\/2003\/04\/04\/7791\" rel=\"noopener noreferrer\">http:\/\/www.dailyprincetonian.com\/2003\/04\/04\/7791\/<\/a> (accessed November 14, 2011).<\/p>\r\n\r\n<\/div>\r\n<div class=\"bcc-box bcc-info\" id=\"frank-ch15_s08_n04\">\r\n<h3 class=\"title\">Team-Building Skills (AACSB)<\/h3>\r\n<p id=\"frank-ch15_s08_p08\" class=\"nonindent para\"><strong class=\"emphasis bold\">CampusCupid.com<\/strong><\/p>\r\n<p id=\"frank-ch15_s08_p09\" class=\"indent para\">It\u2019s no secret that college can be fun. For one thing, you get to hang around with a bunch of people your own age. Occasionally, you want to spend time with just one special someone, but finding that special person on a busy campus can take some of the fun out of matriculating. Fortunately, you\u2019re in the same love boat with a lot of other people, so one possible solution\u2014one that meshes nicely with your desire to go into business\u2014is to start an online dating service that caters to your school. Inasmuch as online dating is nothing new, you can do some preliminary research. For example, go to the Internetnews Web site (<a class=\"link\" target=\"_blank\" href=\"http:\/\/www.internetnews.com\/ec-news\/article.php\/2228891\/Online+Personals+Big+Profits+Intense+Competition.htm\" rel=\"noopener noreferrer\">http:\/\/www.internetnews.com\/ec-news\/article.php\/2228891\/Online+Personals+Big+Profits+Intense+Competition.htm<\/a>) and read the article \u201cOnline Personals: Big Profits, Intense Competition.\u201d<\/p>\r\n<p id=\"frank-ch15_s08_p10\" class=\"indent para\">Next, you and several of your classmates should work as a team to create a business model for an online dating service at your school. After working out the details, submit a group report that covers the following issues:<\/p>\r\n<p class=\"indent\">1. <em class=\"emphasis\">Services<\/em>. How will you earn revenues? What services will you offer? How will you price these services? What forms of payment will you accept? Will you sell ads? If so, what kinds?\r\n2. <em class=\"emphasis\">Appearance<\/em>. What will your site look like? Will it have graphics? Sound? Video? What will your domain name be? What information will you collect from customers? What information will you provide to visitors?<\/p>\r\n<p class=\"indent para\">3. <em class=\"emphasis\">Operations<\/em>. What criteria will you use to match customers? How will your customers interface with the Web site? How will they connect with each other? Will you design your own software or buy or lease it from vendors? Before you answer, go to these vendors\u2019 Web sites and check out their dating software:<\/p>\r\n\r\n<ul id=\"frank-ch15_s08_l05\" class=\"itemizedlist\">\r\n \t<li>WebDate (<a class=\"link\" href=\"http:\/\/www.webscribble.com\/products\/webdate\/index.shtml\">http:\/\/www.webscribble.com\/products\/webdate\/index.shtml<\/a>)<\/li>\r\n \t<li>PG Dating (<a class=\"link\" href=\"http:\/\/www.datingpro.com\/dating\">http:\/\/www.datingpro.com\/dating<\/a>)<\/li>\r\n<\/ul>\r\n<p class=\"indent\">4. <em class=\"emphasis\">Attracting Customers<\/em>. How will you attract customers to the site? How will you monitor and analyze site activity?\r\n5. <em class=\"emphasis\">Security<\/em>. How will you guarantee confidentiality? How will you ensure that your site is secure? How will you limit access to students at your school?\r\n6. <em class=\"emphasis\">Opportunities and Challenges<\/em>. What opportunities do e-businesses offer? What challenges do they create? How would your business model change if you decided to run it as a traditional business rather than as an e-business?<\/p>\r\n\r\n<\/div>\r\n<div class=\"bcc-box bcc-info\" id=\"frank-ch15_s08_n05\">\r\n<h3 class=\"title\">The Global View (AACSB)<\/h3>\r\n<p id=\"frank-ch15_s08_p11\" class=\"nonindent para\"><strong class=\"emphasis bold\">\u201cHong Kong\u2014Traditional Chinese\u201d<\/strong><\/p>\r\n<p id=\"frank-ch15_s08_p12\" class=\"indent para\">Hewlett-Packard (HP) provides technology solutions to individuals, businesses, and institutions around the world. It generates annual revenues of $80 billion from the sale of IT products, including computers, printers, copiers, digital photography, and software. Anyone in the United States who wants to buy an HP product, get technical support, download software, learn about the company, or apply for a job can simply go to the HP Web site. But what if you live in Hong Kong? How would you get answers to your questions? You\u2019d do the same thing as people in this country do\u2014go to HP\u2019s Web site.<\/p>\r\n<p id=\"frank-ch15_s08_p13\" class=\"indent para\">Try to imagine, however, the complex process of developing and maintaining a Web site that serves the needs of customers in more than seventy countries. To get a better idea, go to the HP Web site (<a class=\"link\" href=\"http:\/\/www.hp.com\">http:\/\/www.hp.com<\/a>). Start by looking at HP\u2019s line of notebooks and checking its prices. Then, review the company information (click on \u201cAbout HP\u201d in the bottom right) that\u2019s posted on the site, and, finally, look for a job\u2014it\u2019s good practice (click on \u201cJobs\u201d in the bottom right).<\/p>\r\n<p id=\"frank-ch15_s08_p14\" class=\"indent para\">Now pretend that you live in Hong Kong and repeat the process. Start by going to the same HP Web site (<a class=\"link\" href=\"http:\/\/www.hp.com\">http:\/\/www.hp.com<\/a>). Click on the United States (next to U.S. flag in the bottom left) and then Asia and Oceania. If you can read Chinese, click on \u201cHong Kong\u2014Traditional Chinese.\u201d Otherwise, click on \u201cHong Kong\u2014English.\u201d Then, answer the following questions:<\/p>\r\n\r\n<ol id=\"frank-ch15_s08_l06\" class=\"orderedlist\">\r\n \t<li>How easy was it to navigate the site and to switch back and forth between the U.S. and Hong Kong sections of the site?<\/li>\r\n \t<li>Identify at least five differences between the two sections.<\/li>\r\n \t<li>Does HP\u2019s Web site meet the needs of customers in both the United States and Hong Kong? Why, or why not? How could it be improved?<\/li>\r\n<\/ol>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<\/div>","rendered":"<div class=\"part\" id=\"chapter-15-managing-information-and-technology\">\n<div class=\"part-title-wrap\">\n<p class=\"part-title\" style=\"text-align: left\"><span style=\"font-family: Roboto, Helvetica, Arial, sans-serif;font-size: 1.3rem;font-weight: bold;text-align: left\">Data versus Information<\/span><\/p>\n<\/div>\n<div class=\"ugc part-ugc\">\n<div class=\"chapter standard\" id=\"slug-15-1-data-versus-information\">\n<div class=\"ugc chapter-ugc\">\n<div class=\"bcc-box bcc-highlight\" id=\"frank-ch15_s01_n01\">\n<h3 class=\"title\">Learning Objectives<\/h3>\n<ol id=\"frank-ch15_s01_l01\" class=\"orderedlist\">\n<li>Distinguish between data and information.<\/li>\n<li>Define information system (IS) and identify the tasks of the information systems manager.<\/li>\n<\/ol>\n<\/div>\n<p id=\"frank-ch15_s01_p01\" class=\"nonindent para editable block\">By the time the company took the plunge and committed $100 million to marketing-related information technology (IT), Caesars had been collecting and storing data about customers for almost a decade. \u201cWhile the company thought it important to collect customer information,\u201d recalls a senior marketing executive, \u201cthe problem was we had millions of customers to collect information on, but we had no systematic way of turning it into a marketing decision. We didn\u2019t know what to do with it.\u201d In other words, Caesars was collecting a lot of <em class=\"emphasis\">data<\/em> but not necessarily any <em class=\"emphasis\">information<\/em>. So what\u2019s the difference?<\/p>\n<p id=\"frank-ch15_s01_p02\" class=\"indent para editable block no-indent\">As an example, suppose that you want to know how you\u2019re doing in a particular course. So far, you\u2019ve taken two 20-question multiple-choice tests. On the first, you got questions 8, 11, and 14 wrong; on the second, you did worse, missing items 7, 15, 16, and 19. The items that you got wrong are merely <a class=\"glossary-term\" aria-haspopup=\"dialog\" aria-describedby=\"definition\" href=\"#term_308_1461\"><strong>data<\/strong><\/a>\u2014unprocessed facts. What\u2019s important is your total score. You scored 85 on the first exam and 80 on the second. These two numbers constitute <a class=\"glossary-term\" aria-haspopup=\"dialog\" aria-describedby=\"definition\" href=\"#term_308_1462\"><strong>information<\/strong><\/a>\u2014data that have been processed, or turned into some useful form. Knowing the questions that you missed simply supplied you with some data for calculating your scores.<\/p>\n<p id=\"frank-ch15_s01_p03\" class=\"indent para editable block no-indent\">Now let\u2019s fast-forward to the end of the semester. At this point, in addition to taking the two tests, you\u2019ve written two papers and taken a final. You got a 90 and 95 on the papers and a 90 on the final. You now have more processed data, but you still want to organize them into more useful information. What you want to know is your average grade for the semester. To get the information you want, you need yet more data\u2014namely, the weight assigned to each graded item. Fortunately, you\u2019ve known from day one that each test counts 20 percent, each paper 10 percent, and the final exam 40 percent. A little math reveals an average grade of 87.<\/p>\n<p id=\"frank-ch15_s01_p04\" class=\"indent para editable block no-indent\">Though this is the information you\u2019re interested in, it may be mere data to your instructor, who may want different information: an instructor who intends to scale grades, for example, will want to know the average grade for the entire class. You\u2019re hoping that the class average is low enough to push your average of 87 up from a B+ to an A\u2013 (or maybe even an A\u2014it doesn\u2019t hurt to hope for the best). The moral of the story is that what constitutes <em class=\"emphasis\">information<\/em> at one stage can easily become <em class=\"emphasis\">data<\/em> at another: or, one person\u2019s information can be another person\u2019s data.<\/p>\n<p id=\"frank-ch15_s01_p05\" class=\"indent para editable block no-indent\">As a rule, you want information; data are good only for generating the information. So, how do you convert data into information that\u2019s useful in helping you make decisions and solve problems? That\u2019s the question we\u2019ll explore in the next section.<\/p>\n<div class=\"section\" id=\"frank-ch15_s01_s01\">\n<h2 class=\"title editable block\">Information Systems<\/h2>\n<p id=\"frank-ch15_s01_s01_p01\" class=\"nonindent para editable block\">To gather and process data into information and distribute it to people who need it, organizations develop an <a class=\"glossary-term\" aria-haspopup=\"dialog\" aria-describedby=\"definition\" href=\"#term_308_1463\">information system (IS)<\/a>\u2014the combination of technologies, procedures, and people who collect and distribute the information needed to make decisions and coordinate and control company-wide activities. In most large organizations, the IS is operated by a senior management team that includes a chief information officer (CIO) who oversees information and telecommunications systems. There may also be a chief technology officer who reports to the CIO and oversees IT planning and implementation. As for information managers, their tasks include the following:<\/p>\n<ul id=\"frank-ch15_s01_s01_l01\" class=\"itemizedlist editable block\">\n<li>Determining the information needs of members of the organization<\/li>\n<li>Collecting the appropriate data<\/li>\n<li>Applying technology to convert data into information<\/li>\n<li>Directing the flow of information to the right people<\/li>\n<\/ul>\n<div class=\"section\" id=\"frank-ch15_s01_s01_s01\">\n<h2 class=\"title editable block\">Differences in Information Needs<\/h2>\n<p id=\"frank-ch15_s01_s01_s01_p01\" class=\"nonindent para editable block\">The job is complicated by the fact that information needs vary according to different levels, operational units, and functional areas. Consider, for instance, the information needs of managers at several levels:<\/p>\n<ul id=\"frank-ch15_s01_s01_s01_l01\" class=\"itemizedlist editable block\">\n<li><em class=\"emphasis\">Top managers<\/em> need information for planning, setting objectives, and making major strategic decisions.<\/li>\n<li><em class=\"emphasis\">Middle managers<\/em> need information that helps them allocate resources and oversee the activities under their control.<\/li>\n<li><em class=\"emphasis\">First-line managers<\/em> require information that helps them supervise employees, oversee daily operations, and coordinate activities.<\/li>\n<\/ul>\n<p id=\"frank-ch15_s01_s01_s01_p02\" class=\"indent para editable block no-indent\"><a class=\"xref\" href=\"#frank-ch15_s01_s01_s01_f01\">Figure 15.1 \u201cInformation Needs and Flows\u201d<\/a> illustrates a hypothetical hierarchy of information needs at Caesars. The president, for example, needs information to determine whether profitability is up or down or if the organization is facing any new competitive threats. At the vice-presidential level, executives need information that will help them in controlling and planning for specific areas of operations. The VP of casino operations, for example, might need to know which operations are most profitable\u2014slots, table games, or other gaming activities. The VP of hotel operations might want to know whether room revenues are going up or down.<\/p>\n<h3 class=\"indent para editable block\"><span class=\"title-prefix\">Figure 15.1<\/span> Information Needs and Flows<\/h3>\n<h3 class=\"indent para editable block\"><a style=\"text-indent: 2em;font-size: 0.8em;font-family: Tinos, Georgia, serif;font-weight: normal\"><img decoding=\"async\" src=\"http:\/\/pressbooks.library.upei.ca\/smallbusinessmanagement\/wp-content\/uploads\/sites\/23\/2018\/12\/5b54a190896bc0f1d5bde16e07681ed8.jpg\" alt=\"Information Needs and Flows\" style=\"max-width: 497px\" \/><\/a><\/h3>\n<p id=\"frank-ch15_s01_s01_s01_p03\" class=\"indent para editable block no-indent\">The information needs of middle-level and lower-level managers are different still. The slot-machine manager might want to know whether the placement of machines on the casino floor affects profitability. The poker manager might want to know whether all table games comply with state regulations. At a lower level, the pit manager (who\u2019s in charge of table games in a particular area) needs to know whether there\u2019s a card-counter at his blackjack table or whether a dealer\u2019s activities are suspicious.<\/p>\n<p id=\"frank-ch15_s01_s01_s01_p04\" class=\"indent para editable block no-indent\">Even at a given level, information needs can vary. A manager on the hotel side of the business, for instance, doesn\u2019t care much about profitability at the poker tables, while a pit manager doesn\u2019t have much use for hotel housekeeping reports. The reports that an accountant needs would hardly be the same as those needed by a human resources manager.<\/p>\n<\/div>\n<div class=\"section\" id=\"frank-ch15_s01_s01_s02\">\n<h2 class=\"title editable block\">The Need to Share Information<\/h2>\n<p id=\"frank-ch15_s01_s01_s02_p01\" class=\"nonindent para editable block\">Having stressed the differences in information needs, we should pause to remind ourselves that the managerial levels, operations, and functions of every organization are intertwined, to a greater or lesser degree. If you\u2019ll glance again at <a class=\"xref\" href=\"#frank-ch15_s01_s01_s01_f01\">Figure 15.1 \u201cInformation Needs and Flows\u201d<\/a>, you\u2019ll be reminded that organizations need to share information, that information must flow, and that it must flow in both directions, bottom-up and top-down. At Caesars, for instance, both casino and hotel managers are concerned about security, which is also of interest to managers in different functional areas. Information supplied by the security group is obviously vital to managers in the gaming areas, but HR managers also need it to screen potential employees. Marketing information is clearly important to both casino and hotel operations: to maximize overall profits, the company uses marketing data to fill hotel rooms with customers who spend big in the casinos.<a class=\"footnote\" title=\"Kilby, J., Jim Fox, and Anthony F. Lucas, Casino Operations and Management, 2nd ed. (Hoboken, NJ: John Wiley &amp; Sons, 2005), 183\u201384.\" id=\"return-footnote-308-1\" href=\"#footnote-308-1\" aria-label=\"Footnote 1\"><sup class=\"footnote\">[1]<\/sup><\/a><\/p>\n<p id=\"frank-ch15_s01_s01_s02_p02\" class=\"indent para editable block no-indent\">Caesars\u2019s information needs entail more than allowing individuals in a given casino to share information; information has to be shared among all of Caesars\u2019s thirty-nine casinos. Thus, Caesars relies on an <em class=\"emphasis\">integrated IT system<\/em> that allows real-time communication among all its properties. Installing the system (in the mid-1990s) was complicated, and not everyone in the organization liked the idea. Some managers felt that information sharing threatened their independence. Others, including some in the IT group, doubted that a large number of separate IT systems could be adequately integrated. To get everyone on board, John Bushy, then senior VP of information technology, pledged that he wouldn\u2019t cut his hair until the system was up and running. By the time it was operational in 1997, Bushy had hair down to his shoulders, but it was worth it: Caesars\u2019s ability to share real-time information across all its properties has been a major factor in the company\u2019s success. Caesars\u2019s new system cut costs by $20 million a year, increased brand recognition, and increased the number of customers playing at more than one Caesars property by 72 percent.<a class=\"footnote\" title=\"LeVinson, M., \u201cJackpot! Harrah\u2019s Big Payoff Came from Using IT to Manage Customer Information,\u201d CIO Magazine, February 1, 2001, http:\/\/www.cio.com\/archive\/020101\/harrah.html (accessed June 2, 2006).\" id=\"return-footnote-308-2\" href=\"#footnote-308-2\" aria-label=\"Footnote 2\"><sup class=\"footnote\">[2]<\/sup><\/a><a class=\"footnote\" title=\"Global Supply Chain Management Forum, \u201cHarrah\u2019s Entertainment Inc.: Real-Time CRM in a Service Supply Chain,\u201d Global Supply Chain Management Forum, Stanford Graduate School of Business, http:\/\/www.gsb.stanford.edu\/scforum\/login\/pdfs\/Harrah.pdf (accessed November 14, 2011).\" id=\"return-footnote-308-3\" href=\"#footnote-308-3\" aria-label=\"Footnote 3\"><sup class=\"footnote\">[3]<\/sup><\/a><\/p>\n<\/div>\n<div class=\"section\" id=\"frank-ch15_s01_s01_s03\">\n<h2 class=\"title editable block\">Enterprise Systems<\/h2>\n<p id=\"frank-ch15_s01_s01_s03_p01\" class=\"nonindent para editable block\">Many large and mid-size companies rely on a highly integrated system called an <a class=\"glossary-term\" aria-haspopup=\"dialog\" aria-describedby=\"definition\" href=\"#term_308_1465\"><strong>enterprise resource planning (ERP) system<\/strong><\/a> to channel information to multiple users. To understand what an ERP system does, forget about the P for <em class=\"emphasis\">planning<\/em> (it really doesn\u2019t have much to do with planning) and the R for <em class=\"emphasis\">resource<\/em> (it\u2019s an imprecise term).<a class=\"footnote\" title=\"Koch, C., \u201cThe ABCs of ERP,\u201d CIO.com, http:\/\/wikifab.dimf.etsii.upm.es\/wikifab\/images\/d\/da\/The_ABCs_of_ERP.pdf (accessed November 14, 2011).\" id=\"return-footnote-308-4\" href=\"#footnote-308-4\" aria-label=\"Footnote 4\"><sup class=\"footnote\">[4]<\/sup><\/a> Focus on the E for <em class=\"emphasis\">enterprise<\/em>. An ERP system integrates the computer needs of all activities <em class=\"emphasis\">across the enterprise<\/em> into a single system that serves all users. Such broad integration isn\u2019t a simple task, and you wouldn\u2019t be the first person to wonder whether it wouldn\u2019t be easier to give each department its own computer system. Salespeople, for example, need a system that tracks sales and generates sales reports. Meanwhile, manufacturing personnel don\u2019t need to track sales but do need to track inventory. What\u2019s the problem with stand-alone computer systems? Quite simply, users in various departments can\u2019t share information or communicate with each other.<\/p>\n<\/div>\n<div class=\"section\" id=\"frank-ch15_s01_s01_s04\">\n<h2 class=\"title editable block\">What If You Don\u2019t Have ERP?<\/h2>\n<p id=\"frank-ch15_s01_s01_s04_p01\" class=\"nonindent para editable block\">Imagine that you\u2019re a sales manager for a fairly large manufacturing company that produces and sells treadmills. Like every other department in the organization, you have your own computer system. A local sporting-goods store orders one hundred treadmills through a regional sales representative. It\u2019s your job to process the order. It wouldn\u2019t be much of a problem for you to go into your computer and place the order. But how would you know if the treadmills were actually in stock and when they could be delivered? How would you know if the customer\u2019s credit was any good? You could call the warehouse and ask if the treadmills are in stock. If they are, you\u2019d tell the warehouse manager that you\u2019re placing an order and hope that the treadmills are still in stock by the time your order gets there two days later. While you\u2019re at it, you\u2019d better ask for an expected delivery date. As a final precaution, you should probably call the finance department and ask about your customer\u2019s credit rating. So now you\u2019ve done your job, and it can hardly be your fault that because the cost of manufacturing treadmills has gone up, accounting has recommended an immediate price increase that hasn\u2019t shown up in your computer system yet.<\/p>\n<\/div>\n<div class=\"section\" id=\"frank-ch15_s01_s01_s05\">\n<h2 class=\"title editable block\">What If You Do Have ERP?<\/h2>\n<p id=\"frank-ch15_s01_s01_s05_p01\" class=\"nonindent para editable block\">Wouldn\u2019t it be easier if you had an ERP system like the one illustrated in <a class=\"xref\" href=\"#frank-ch15_s01_s01_s05_f01\">Figure 15.2 \u201cERP System\u201d<\/a>\u2014one that lets you access the same information as every other department? Then you could find out if there were one hundred treadmills in stock, the expected delivery date, your customer\u2019s credit rating, and the current selling price\u2014without spending most of the day exchanging phone calls, e-mails, text messages, and faxes. You\u2019d be in a better position to decide whether you can give your customer credit, and you could promise delivery (at a correct price) on a specified date. <em class=\"emphasis\">Then<\/em>, you\u2019d enter the order into the system. The information that you entered would be immediately available to everyone else. The warehouse would know what needs to be shipped, to whom, and when. The accounting department would know that a sale had been made, the dollar amount, and where to send the bill. In short, everyone would have up-to-date information, and no one would have to reinput any data.<\/p>\n<div class=\"figure full large-height editable block\" id=\"frank-ch15_s01_s01_s05_f01\">\n<h3 class=\"nonindent title\"><span class=\"title-prefix\">Figure 15.2<\/span> ERP System<\/h3>\n<p class=\"indent\"><a><br \/>\n<img decoding=\"async\" src=\"http:\/\/pressbooks.library.upei.ca\/smallbusinessmanagement\/wp-content\/uploads\/sites\/23\/2018\/12\/adda2ce207c76b75e7d01f7e894a4922.jpg\" alt=\"The ERP System: manages information flow among all database applications. Finance: reports customer's credit rating and current selling prices; Human resources: recruits, trains, evaluates, and compensates salespeople; Marketing: coordinates sales activities and handles customer-relationship management; Operations: controls inventory throughout the supply chain, from procurement to distribution; Accounting: records sales and payments and tracks business performance.\" style=\"max-width: 497px\" \/><br \/>\n<\/a><\/p>\n<\/div>\n<div class=\"bcc-box bcc-success\" id=\"frank-ch15_s01_s01_s05_n01\">\n<h3 class=\"title\">Key Takeaways<\/h3>\n<ul id=\"frank-ch15_s01_s01_s05_l01\" class=\"itemizedlist\">\n<li><strong class=\"emphasis bold\">Data<\/strong> are unprocessed facts. <strong class=\"emphasis bold\">Information<\/strong> is data that have been processed or turned into some useful form.<\/li>\n<li>To gather and process data into information and distribute it to people who need it, an organization develops an <strong class=\"emphasis bold\">information system (IS)<\/strong>\u2014the combination of technologies, procedures, and people who collect and distribute the information needed to make decisions and to coordinate and control company-wide activities.<\/li>\n<li>In most large organizations, the information system is operated by a senior management team that includes a <strong class=\"emphasis bold\">chief information officer (CIO)<\/strong> who oversees information and telecommunications systems.<\/li>\n<li>There may also be a <strong class=\"emphasis bold\">chief technology officer<\/strong> who reports to the CIO and oversees IT planning and implementation.<\/li>\n<li>\n<p class=\"nonindent para\">The tasks of <strong class=\"emphasis bold\">information managers<\/strong> include:<\/p>\n<ol id=\"frank-ch15_s01_s01_s05_l02\" class=\"orderedlist\">\n<li>Determining the information needs of people in the organization<\/li>\n<li>Collecting the appropriate data<\/li>\n<li>Applying technology to convert data into information<\/li>\n<li>Directing the flow of information to the right people<\/li>\n<\/ol>\n<\/li>\n<li>The job is complicated by the fact that information needs vary according to different levels, operational units, and functional areas.<\/li>\n<li>In addition, information must be shared. To channel information to multiple users, large and mid-size companies often rely on a highly integrated system called an <strong class=\"emphasis bold\">enterprise resource planning (ERP) system<\/strong>.<\/li>\n<li>An ERP system integrates the computer needs of all business activities <em class=\"emphasis\">across the enterprise<\/em> into a single computer system that serves all users.<\/li>\n<\/ul>\n<\/div>\n<div class=\"bcc-box bcc-info\" id=\"frank-ch15_s01_s01_s05_n02\">\n<h3 class=\"title\">Exercises<\/h3>\n<ol id=\"frank-ch15_s01_s01_s05_l03\" class=\"orderedlist\">\n<li>Using the college-application process as an example, explain the difference between <em class=\"emphasis\">data<\/em> and <em class=\"emphasis\">information<\/em>. Identify the categories of data that you supplied on your college application and the information generated from them by the admissions department.<\/li>\n<li>\n<p class=\"nonindent simpara\"><strong class=\"emphasis bold\">(AACSB) Analysis<\/strong><\/p>\n<p id=\"frank-ch15_s01_s01_s05_p02\" class=\"indent para\">Consider these three positions at Starbucks: retail store manager (in charge of the day-to-day operations at one store), district manager (responsible for the operations at multiple stores), and president of Starbucks North America (in charge of operations throughout the United States, Canada, and Mexico). Identify the information needs of managers at each level.<\/p>\n<\/li>\n<li>\n<p class=\"nonindent simpara\"><strong class=\"emphasis bold\">(AACSB) Analysis<\/strong><\/p>\n<p id=\"frank-ch15_s01_s01_s05_p03\" class=\"indent para\">In what ways could a large automobile dealership, with a service shop and a body shop, benefit from an ERP system?<\/p>\n<\/li>\n<\/ol>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"chapter standard\" id=\"slug-15-2-managing-data\">\n<div class=\"chapter-title-wrap\">\n<h1 class=\"chapter-title\" style=\"text-align: center\">Managing Data<\/h1>\n<\/div>\n<div class=\"ugc chapter-ugc\">\n<div id=\"frank-ch15_s02_n01\" class=\"bcc-box bcc-highlight\">\n<h3 class=\"title\">Learning Objective<\/h3>\n<ol id=\"frank-ch15_s02_l01\" class=\"orderedlist\">\n<li>Explain how IS managers capture, store, and analyze data.<\/li>\n<\/ol>\n<\/div>\n<p id=\"frank-ch15_s02_p01\" class=\"indent para editable block no-indent\">Did you ever think about how much data you yourself generate? Just remember what you went through to start college. First, you had to fill out application forms asking you about test scores, high school grades, extracurricular activities, and finances, plus demographic data about you and your family. Once you\u2019d picked a college, you had to supply data on your housing preferences, the curriculum you wanted to follow, and the party who\u2019d be responsible for paying your tuition. When you registered for classes, you gave more data to the registrar\u2019s office. When you arrived on campus, you gave out still more data to have your ID picture taken, to get your computer and phone hooked up, to open a bookstore account, and to buy an on-campus food-charge card. Once you started classes, data generation continued on a daily basis: your food card and bookstore account, for example, tracked your various purchases, and your ID tracked your coming and going all over campus. And you generated grades.<\/p>\n<p id=\"frank-ch15_s02_p02\" class=\"indent para editable block no-indent\">And all these data apply to just one aspect of your life. You also generated data every time you used your credit card and your cell phone. Who uses all these data? How are they collected, stored, analyzed, and distributed in organizations that have various reasons for keeping track of you?<\/p>\n<div id=\"frank-ch15_s02_s01\" class=\"section\">\n<h2 class=\"title editable block no-indent\">Data and Databases<\/h2>\n<p id=\"frank-ch15_s02_s01_p01\" class=\"nonindent para editable block no-indent\">To answer such questions, let\u2019s go back to our Caesars example. As we\u2019ve seen, Caesars collects a vast amount of data. Its hotel system generates data when customers make reservations, check in, buy food and beverages, purchase stuff at shops, attend entertainment events, and even relax at the spa. In the casino, customers apply for rewards programs, convert cash to chips (and occasionally chips back to cash), try their luck at the tables and slots, and get complimentary drinks. Then, there are the data generated by the activities of the company itself: employees, for instance, generate payroll and benefits data, and retail operations generate data every time they buy or sell something. Moreover, if we added up all these data, we\u2019d have only a fraction of the amount generated by the company\u2019s gaming operations.<\/p>\n<p id=\"frank-ch15_s02_s01_p02\" class=\"indent para editable block no-indent\">How does Caesars handle all these data? First of all, it captures and stores them in several <a class=\"glossary-term\" aria-haspopup=\"dialog\" aria-describedby=\"definition\" href=\"#term_308_1466\"><strong>databases<\/strong><\/a>\u2014 electronic collections of related data that can be accessed by various members of the organization. Think of databases as filing cabinets that can hold massive amounts of organized information, such as revenues and costs from hotel activities, casino activities, and events reservations at each of Caesars facilities.<\/p>\n<div id=\"frank-ch15_s02_s01_s01\" class=\"section\">\n<h2 class=\"title editable block\">Warehousing and Mining Data<\/h2>\n<p id=\"frank-ch15_s02_s01_s01_p01\" class=\"nonindent para editable block\">What if Caesars wants to target customers who generate a lot of revenue, by using a program designed to entice return visits? How would it identify and contact these people? Theoretically, it could search through the relevant databases\u2014those that hold customer-contact information (such as name and address) and information about customer activity in the company\u2019s hotels, casinos, and entertainment venues. It would be a start, perhaps, but it wouldn\u2019t be very efficient. First of all, it would be time-consuming. Plus, what if the same data weren\u2019t stored in a similar fashion in each database? In that case, it would be quite hard to combine the data in a meaningful way. To address this problem, Caesars managers will rely on a system like the one illustrated in <a class=\"xref\" href=\"#frank-ch15_s02_s01_s01_f01\">Figure 15.3 \u201cThe Data Mining Process\u201d<\/a>, which calls for moving all the relevant data into a <a class=\"glossary-term\" aria-haspopup=\"dialog\" aria-describedby=\"definition\" href=\"#term_308_1467\"><strong>data warehouse<\/strong><\/a>\u2014a centralized database in which data from several databases are consolidated and organized so that they can be easily analyzed.<\/p>\n<h3><span class=\"title-prefix\">Figure 15.3<\/span> The Data Mining Process<\/h3>\n<div id=\"frank-ch15_s02_s01_s01_f01\" class=\"caption\" style=\"text-align: center;font-size: .8em\">\n<p class=\"indent\"><a><img decoding=\"async\" style=\"max-width: 497px\" src=\"http:\/\/pressbooks.library.upei.ca\/smallbusinessmanagement\/wp-content\/uploads\/sites\/23\/2018\/12\/fcf140f3e8e4d0fb4ef09e8e5507e4b0.jpg\" alt=\"image\" \/> <\/a><\/p>\n<h4 class=\"indent\"><a>Data transformation -&gt; Data warehouse -&gt; Data mining&#8221;&gt;<br \/>\n<\/a><\/h4>\n<\/div>\n<\/div>\n<div id=\"frank-ch15_s02_s01_s02\" class=\"section\">\n<h2 class=\"title editable block\">Data Mining<\/h2>\n<p id=\"frank-ch15_s02_s01_s02_p01\" class=\"nonindent para editable block\">With the data in one central location, management can find out everything it needs to about a particular group of customers. It can also use the data to address some pretty interesting questions. Why do people come to our casinos? How can we keep customers coming back? How can we increase the number of visits per customer? How can we increase the amount they spend on each visit? What incentives (such as free dinners, hotel rooms, or show tickets) do our customers like most? To come up with answers to these questions, they\u2019ll perform a technique called <a class=\"glossary-term\" aria-haspopup=\"dialog\" aria-describedby=\"definition\" href=\"#term_308_1470\"><strong>data mining<\/strong><\/a>\u2014the process of searching and analyzing large amounts of data to reveal patterns and trends that can be used to predict future behavior.<\/p>\n<\/div>\n<div id=\"frank-ch15_s02_s01_s03\" class=\"section\">\n<h2 class=\"title editable block\">Data Mining and Customer Behavior<\/h2>\n<p id=\"frank-ch15_s02_s01_s03_p01\" class=\"nonindent para editable block\">By data-mining its customer-based data warehouse, Caesars\u2019s management can discover previously unknown relationships between the general behavior of its customers and that of a certain group of customers (namely, the most profitable ones). Then, it can design incentives to appeal specifically to those people who will generate the most profit for the company.<\/p>\n<p id=\"frank-ch15_s02_s01_s03_p02\" class=\"indent para editable block no-indent\">To get a better idea of how data mining works, let\u2019s simplify a description of the process at Caesars. First, we need to know how the casino gathered the data to conduct its preliminary analysis. Most customers who play the slots use a Caesars player\u2019s card that offers incentives based on the amount of money that they wager on slot machines, video poker, and table games.<a class=\"footnote\" title=\"Caesars, \u201cTotal Rewards,\u201d https:\/\/www.totalrewards.com\/TotalRewards\/RewardsAndBenefits.do?page=overview (accessed November 14, 2011).\" id=\"return-footnote-308-5\" href=\"#footnote-308-5\" aria-label=\"Footnote 5\"><sup class=\"footnote\">[5]<\/sup><\/a> To get the card, a customer must supply some personal information, such as name, address, and phone number. From Caesars\u2019s standpoint, the card is extremely valuable because it can reveal a lot about the user\u2019s betting behavior: actual wins and losses, length of time played, preferred machines and coin denominations, average amount per bet, and\u2014most important\u2014the speed with which coins are deposited and buttons pushed.<a class=\"footnote\" title=\"Shook, R. L., Jackpot! Harrah\u2019s Winning Secrets for Customer Loyalty (Hoboken, NJ: John Wiley &amp; Sons, 2003), 228\u201329.\" id=\"return-footnote-308-6\" href=\"#footnote-308-6\" aria-label=\"Footnote 6\"><sup class=\"footnote\">[6]<\/sup><\/a> As you can see from <a class=\"xref\" href=\"#frank-ch15_s02_s01_s01_f01\">Figure 15.3 \u201cThe Data Mining Process\u201d<\/a>, Caesars\u2019s primary data source was <em class=\"emphasis\">internal<\/em>\u2014generated by the company itself rather than provided by an outside source\u2014and drew on a marketing database developed for <em class=\"emphasis\">customer relationship management<\/em> (CRM).<\/p>\n<h3><span class=\"title-prefix\">Figure 15.4\u00a0Caesars Resort<\/span><\/h3>\n<div id=\"frank-ch15_s02_s01_s03_f01\" class=\"caption\" style=\"text-align: center;font-size: .8em;max-width: 500px\">\n<div class=\"wp-nocaption size-full wp-image-1482\"><a><img decoding=\"async\" class=\"size-full wp-image-1482\" src=\"http:\/\/pressbooks.library.upei.ca\/smallbusinessmanagement\/wp-content\/uploads\/sites\/23\/2018\/12\/15.2.0.jpg\" alt=\"A view of the Caesar's Palace Forum Shops just after sunrise. Sunrise and night are very different in Las Vegas, as one would expect. There's nobody on the street at sunrise, except for a few people who are just calling it a night. The building is beautifully lit with purple light.\" width=\"500\" \/><\/a><\/div>\n<\/div>\n<p>Caesars collects data on its customers by using players\u2019 cards to gather information and to track betting behavior.\u00a0<a class=\"footnote\" title=\"zhouxuan12345678 \u2013 Caesar\u2019s Palace, Las Vegas \u2013 CC BY-SA 2.0.\" id=\"return-footnote-308-7\" href=\"#footnote-308-7\" aria-label=\"Footnote 7\"><sup class=\"footnote\">[7]<\/sup><\/a><\/p>\n<p id=\"frank-ch15_s02_s01_s03_p03\" class=\"indent para editable block no-indent\">What does the casino do with the data that it\u2019s mined? Caesars was most interested in \u201c<a class=\"glossary-term\" aria-haspopup=\"dialog\" aria-describedby=\"definition\" href=\"#term_308_1473\">first trippers<\/a>\u201d\u2014first-time casino customers. In particular, it wanted to know which of these customers should be enticed to return. By analyzing the data collected from player\u2019s-card applications and from customer\u2019s actual play at the casino (even if for no more than an hour), Caesars could develop a profile of a profitable customer. Now, when a first-timer comes into any of its casinos and plays for a while, Caesars can instantly tell whether he or she fits the profitable-customer profile. To lure these people back for return visits, it makes generous offers of free or reduced-rate rooms, meals, entertainment, or free chips (the incentive of choice for Caesars\u2019s preferred customers). These customers make up 26 percent of all Caesars\u2019s customers and generate 82 percent of its revenues. Surprisingly, they\u2019re not the wealthy high rollers to whom Caesars had been catering for years. Most of them are regular working people or retirees with available time and income and a fondness for slots. They generally stop at the casino on the way home from work or on a weekend night and don\u2019t stay overnight. They enjoy the thrill of gambling, and you can recognize them because they\u2019re the ones who can\u2019t push the button or pump tokens in fast enough.<a class=\"footnote\" title=\"Loveman, G., \u201cDiamonds in the Data Mine,\u201d Harvard Business Review, May 2003, 3.\" id=\"return-footnote-308-8\" href=\"#footnote-308-8\" aria-label=\"Footnote 8\"><sup class=\"footnote\">[8]<\/sup><\/a><\/p>\n<div id=\"frank-ch15_s02_s01_s03_n01\" class=\"bcc-box bcc-success\">\n<h3 class=\"title\">Key Takeaways<\/h3>\n<ul id=\"frank-ch15_s02_s01_s03_l01\" class=\"itemizedlist\">\n<li>Organizations capture and store data in <strong class=\"emphasis bold\">databases<\/strong>\u2014electronic collections of related data that can be accessed by various people in the organization.<\/li>\n<li>To facilitate data analysis, IS managers may move data from various databases into a <strong class=\"emphasis bold\">data warehouse<\/strong>\u2014a centralized database in which data are consolidated and organized for efficient analysis.<\/li>\n<li>To come up with answers to a huge range of questions, managers perform a technique called <strong class=\"emphasis bold\">data mining<\/strong>\u2014the process of searching and analyzing large amounts of data to reveal patterns and trends that can be used to predict future behavior.<\/li>\n<\/ul>\n<\/div>\n<div id=\"frank-ch15_s02_s01_s03_n02\" class=\"bcc-box bcc-info\">\n<h3 class=\"title\">Exercise<\/h3>\n<p class=\"nonindent simpara\">(AACSB) Analysis<\/p>\n<p id=\"frank-ch15_s02_s01_s03_p04\" class=\"indent para\">Caesars uses data mining to identify its most profitable customers and predict their future behavior. It then designs incentives to appeal specifically to these customers. Do you see any ethical problems with this process? Is it ethical to encourage people to gamble? Explain your answer.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"chapter standard\" id=\"slug-15-3-types-of-information-systems\">\n<div class=\"chapter-title-wrap\">\n<h1 class=\"chapter-title\" style=\"text-align: center\">Types of Information Systems<\/h1>\n<\/div>\n<div class=\"ugc chapter-ugc\">\n<div class=\"bcc-box bcc-highlight\" id=\"frank-ch15_s03_n01\">\n<h3 class=\"title\">Learning Objective<\/h3>\n<ol id=\"frank-ch15_s03_l01\" class=\"orderedlist\">\n<li>Discuss ways in which an IS can be designed to meet the needs of individuals at various organizational levels.<\/li>\n<\/ol>\n<\/div>\n<p id=\"frank-ch15_s03_p01\" class=\"nonindent para editable block\">As we saw earlier, different managers, operational units, and functional areas have different information needs. That\u2019s why organizations often tailor information systems to meet particular needs. Caesars\u2019s IT group, for example, developed the Player Contact System <a class=\"footnote\" title=\"Dunn, D., \u201cClient-Tracking System Helps Harrah\u2019s Tailor Sales Efforts for Frequent Visitors,\u201d Information Week, November 4, 2003, http:\/\/www.informationweek.com\/story\/showArticle.jhtml?articleID=16000115 (accessed June 2, 2006).\" id=\"return-footnote-308-9\" href=\"#footnote-308-9\" aria-label=\"Footnote 9\"><sup class=\"footnote\">[9]<\/sup><\/a><a class=\"footnote\" title=\"Dunn, D., \u201cPersonal Touch For VIPs,\u201d Information Week, November 4, 2003, http:\/\/www.informationweek.com\/news\/16000115 (accessed November 14, 2011).\" id=\"return-footnote-308-10\" href=\"#footnote-308-10\" aria-label=\"Footnote 10\"><sup class=\"footnote\">[10]<\/sup><\/a> to help its casino salespeople connect to top customers on a more personal basis. Working from a prioritized list of customer names displayed on a computer screen, the salesperson clicks on a name to view relevant information about the customer, such as background and preferred casino activities. There\u2019s even a printed script that can be used to guide the conversation. Such a system isn\u2019t very helpful, however, to middle or top-level managers, who need systems to help them carry out their oversight and planning responsibilities. To design marketing programs, for instance, marketing managers rely on summary information gleaned from a dedicated customer-relationship management system. Let\u2019s look at some of the widely available information systems designed to support people at the operational and upper-management levels.<\/p>\n<div class=\"section\" id=\"frank-ch15_s03_s01\">\n<h2 class=\"title editable block\">Operations Support Systems<\/h2>\n<p id=\"frank-ch15_s03_s01_p01\" class=\"nonindent para editable block\">Operations support systems are generally used by managers at lower levels of the organization\u2014those who run day-to-day business operations and make fairly routine decisions. They may be <em class=\"emphasis\">transaction processing systems, process control systems<\/em>, or <em class=\"emphasis\">design and production systems<\/em>.<\/p>\n<div class=\"section\" id=\"frank-ch15_s03_s01_s01\">\n<h2 class=\"title editable block\">Transaction Processing Systems<\/h2>\n<p id=\"frank-ch15_s03_s01_s01_p01\" class=\"nonindent para editable block\">Most of an organization\u2019s daily activities are recorded and processed by its transaction processing system, which receives input data and converts them into output\u2014information\u2014intended for various users. Input data are called transactions\u2014events that affect a business. A <em class=\"emphasis\">financial transaction<\/em> is an economic event: it affects the firm\u2019s assets, is reflected in its accounting statements, and is measured in monetary terms. Sales of goods to customers, purchases of inventory from suppliers, and salaries paid to employees are all financial transactions. Everything else is a <em class=\"emphasis\">nonfinancial transaction<\/em>. The marketing department, for example, might add some demographic data to its customer database. The information would be processed by the firm\u2019s transaction processing system, but it wouldn\u2019t be a financial transaction.<\/p>\n<p id=\"frank-ch15_s03_s01_s01_p02\" class=\"indent para editable block no-indent\"><a class=\"xref\" href=\"#frank-ch15_s03_s01_s01_f01\">Figure 15.5 \u201cTransaction Processing System\u201d<\/a> illustrates a transaction processing system in which the transaction is a customer\u2019s electronic payment of a bill. As you can see, transaction processing system output can consist not only of documents sent to outside parties (in this case, notification of payment received), but also of information circulated internally (in the form of reports), as well as of information entered into the database for updating.<\/p>\n<h3><span class=\"title-prefix\">Figure 15.5<\/span> Transaction Processing System<\/h3>\n<div class=\"caption\" style=\"text-align: center;font-size: .8em\" id=\"frank-ch15_s03_s01_s01_f01\">\n<p class=\"indent\"><a><img decoding=\"async\" src=\"http:\/\/pressbooks.library.upei.ca\/smallbusinessmanagement\/wp-content\/uploads\/sites\/23\/2018\/12\/d942d45e597ad6259e2b66a97c36ec91.jpg\" alt=\"Transaction Processing System\" style=\"max-width: 497px\" \/><br \/>\n<\/a><\/p>\n<\/div>\n<\/div>\n<div class=\"section\" id=\"frank-ch15_s03_s01_s02\">\n<h2 class=\"title editable block\">Process Control Systems<\/h2>\n<p id=\"frank-ch15_s03_s01_s02_p01\" class=\"nonindent para editable block\">Process control refers to the application of technology to monitor and control physical processes. It\u2019s useful, for example, in testing the temperature of food as it\u2019s being prepared or gauging the moisture content of paper as it\u2019s being manufactured. Typically, it depends on sensors to collect data periodically. The data are then analyzed by a computer programmed either to make adjustments or to signal an operator.<\/p>\n<p id=\"frank-ch15_s03_s01_s02_p02\" class=\"indent para editable block no-indent\">Caesars uses process-control technology to keep customers happy. At any given point, some slot machines are down, whether because a machine broke or ran out of money or somebody hit the jackpot. All these contingencies require immediate attention by a service attendant. In the past, service personnel strolled around looking for machines in need of fixing. Now, however, a downed slot machine sends out an \u201cI need attention\u201d signal, which is instantly picked up by a monitoring and paging system called MessengerPlus and sent to a service attendant.<\/p>\n<\/div>\n<div class=\"section\" id=\"frank-ch15_s03_s01_s03\">\n<h2 class=\"title editable block\">Design and Production Systems<\/h2>\n<p id=\"frank-ch15_s03_s01_s03_p01\" class=\"nonindent para editable block\">Modern companies rely heavily on technology to design and make products. Computer-aided design (CAD) software, for instance, enables designers to test computer models digitally before moving new products into the prototype stage. Many companies link CAD systems to the manufacturing process through computer-aided manufacturing (CAM) systems that not only determine the steps needed to produce components but also instruct machines to do the necessary work. A CAD\/CAM system can be expanded by means of computer-integrated manufacturing (CIM), which integrates various operations (from design through manufacturing) with functional activities ranging from order taking to final shipment. The CIM system may also control <a class=\"glossary-term\" aria-haspopup=\"dialog\" aria-describedby=\"definition\" href=\"#term_308_1474\"><strong>industrial robots<\/strong><\/a>\u2014computer-run machines that can perform repetitive or dangerous tasks. A CIM system is a common element in a flexible manufacturing system, which makes it possible to change equipment setups by reprogramming computer-controlled machines that can be adapted to produce a variety of goods. Such flexibility is particularly valuable to makers of customized products.<\/p>\n<\/div>\n<\/div>\n<div class=\"section\" id=\"frank-ch15_s03_s02\">\n<h2 class=\"title editable block\">Management Support Systems<\/h2>\n<p id=\"frank-ch15_s03_s02_p01\" class=\"nonindent para editable block\">Mid- and upper-level managers rely on a variety of information systems to support decision-making activities, including <em class=\"emphasis\">management information systems, decision support systems, executive support systems<\/em>, and <em class=\"emphasis\">expert systems<\/em>.<\/p>\n<div class=\"section\" id=\"frank-ch15_s03_s02_s01\">\n<h2 class=\"title editable block\">Management Information Systems<\/h2>\n<p id=\"frank-ch15_s03_s02_s01_p01\" class=\"nonindent para editable block\">A management information system extracts data from a database to compile reports, such as sales analyses, inventory-level reports, and financial statements, to help managers make routine decisions. The type and form of the report depend on the information needs of a particular manager. At Caesars, for example, several reports are available each day to a games manager (who\u2019s responsible for table-game operations and personnel): a customer-analysis report, a profitability report, and a labor-analysis report.<a class=\"footnote\" title=\"Shook, R. L., Jackpot! Harrah\u2019s Winning Secrets for Customer Loyalty (Hoboken, NJ: John Wiley &amp; Sons, 2003), 248\u201352.\" id=\"return-footnote-308-11\" href=\"#footnote-308-11\" aria-label=\"Footnote 11\"><sup class=\"footnote\">[11]<\/sup><\/a><\/p>\n<\/div>\n<div class=\"section\" id=\"frank-ch15_s03_s02_s02\">\n<h2 class=\"title editable block\">Decision Support Systems<\/h2>\n<p id=\"frank-ch15_s03_s02_s02_p01\" class=\"nonindent para editable block\">A decision support system is an interactive system that collects, displays, and integrates data from multiple sources to help managers make nonroutine decisions. For example, suppose that a gaming company is considering a new casino in Pennsylvania (which has recently legalized slot machines). To decide whether it would be a wise business move, management could use a decision support system like the one illustrated in <a class=\"xref\" href=\"#frank-ch15_s03_s02_s02_f01\">Figure 15.6 \u201cDecision Support System\u201d<\/a>. The first step is to extract data from internal sources to decide whether the company has the financial strength to expand its operations. From external sources (such as industry data and Pennsylvania demographics), managers might find the data needed to determine whether there\u2019s sufficient demand for a casino in the state. The decision support system will apply both types of data as variables in a quantitative <em class=\"emphasis\">model<\/em> that managers can analyze and interpret. People must make the final decision, but in making sense of the relevant data, the decision support system makes the decision-making process easier\u2014and more reliable.<a class=\"footnote\" title=\"Webopedia, \u201cDecision Support System,\u201d Webopedia, http:\/\/www.webopedia.com\/TERM\/D\/decision_support_system.html (accessed November 14, 2011).\" id=\"return-footnote-308-12\" href=\"#footnote-308-12\" aria-label=\"Footnote 12\"><sup class=\"footnote\">[12]<\/sup><\/a><\/p>\n<h3><span class=\"title-prefix\">Figure 15.6<\/span> Decision Support System<\/h3>\n<div class=\"caption\" style=\"text-align: center;font-size: .8em\" id=\"frank-ch15_s03_s02_s02_f01\">\n<p class=\"indent\"><a><img decoding=\"async\" src=\"http:\/\/pressbooks.library.upei.ca\/smallbusinessmanagement\/wp-content\/uploads\/sites\/23\/2018\/12\/0d7e93e7f4fe3381f7bd4d1b2b3b2d56.jpg\" alt=\"Decision Support System\" style=\"max-width: 497px\" \/><br \/>\n<\/a><\/p>\n<\/div>\n<\/div>\n<div class=\"section\" id=\"frank-ch15_s03_s02_s03\">\n<h2 class=\"title editable block\">Executive Information Systems<\/h2>\n<p id=\"frank-ch15_s03_s02_s03_p01\" class=\"nonindent para editable block\">Senior managers spend a good deal of their time planning and making major decisions. They set performance targets, determine whether they\u2019re being met, and routinely scan the external environment for opportunities and threats. To accomplish these tasks, they need relevant, timely, easily understood information. Often, they can get it through an executive information system, which provides ready access to strategic information that\u2019s customized to their needs and presented in a convenient format. Using an executive information system, for example, a gaming-company executive might simply touch a screen to view key summary information that highlights in graphical form a critical area of corporate performance, such as revenue trends. After scanning this summary, our executive can \u201cdrill down\u201d to retrieve more detailed information\u2014for example, revenue trends by resort or revenue trends from various types of activities, such as gaming, hotel, retail, restaurant, or entertainment operations.<\/p>\n<\/div>\n<div class=\"section\" id=\"frank-ch15_s03_s02_s04\">\n<h2 class=\"title editable block\">Artificial Intelligence<\/h2>\n<p id=\"frank-ch15_s03_s02_s04_p01\" class=\"nonindent para editable block\">Artificial intelligence is the science of developing computer systems that can mimic human behavior. Ever since the term was coined in 1956, artificial intelligence has always seemed on the verge of being \u201cthe next big thing.\u201d Unfortunately, optimistic predictions eventually collided with underwhelming results, and many experts began to doubt that it would ever have profitable applications.<a class=\"footnote\" title=\"Webopedia, \u201cArtificial Intelligence,\u201d Webopedia, http:\/\/www.webopedia.com\/TERM\/A\/artificial_intelligence.html (accessed November 14, 2011).\" id=\"return-footnote-308-13\" href=\"#footnote-308-13\" aria-label=\"Footnote 13\"><sup class=\"footnote\">[13]<\/sup><\/a> In the last decade, however, some significant advances have been made in artificial intelligence\u2014albeit in the area of game playing, where activities are generally governed by small sets of well-defined rules. But even the game-playing environment is sometimes complex enough to promote interesting developments. In 1997, for example, IBM\u2019s Deep Blue\u2014a specialized computer with an advanced chess-playing program\u2014defeated the world\u2019s highest-ranked player.<a class=\"footnote\" title=\"Webopedia, \u201cDecision Support System,\u201d Webopedia, http:\/\/www.webopedia.com\/TERM\/D\/decision_support_system.html (accessed November 14, 2011).\" id=\"return-footnote-308-14\" href=\"#footnote-308-14\" aria-label=\"Footnote 14\"><sup class=\"footnote\">[14]<\/sup><\/a><\/p>\n<p id=\"frank-ch15_s03_s02_s04_p02\" class=\"indent para editable block no-indent\">More recently, several artificial intelligence applications have been successfully put to commercial use. Let\u2019s take a brief look at two of these: <em class=\"emphasis\">expert systems<\/em> and <em class=\"emphasis\">face-recognition technology<\/em>.<\/p>\n<\/div>\n<div class=\"section\" id=\"frank-ch15_s03_s02_s05\">\n<h2 class=\"title editable block\">Expert Systems<\/h2>\n<p id=\"frank-ch15_s03_s02_s05_p01\" class=\"nonindent para editable block\">Expert systems are programs that mimic the judgment of experts by following sets of rules that experts would follow. They\u2019re useful in such diverse areas as medical diagnosis, portfolio management, and credit assessment. For example, you\u2019ve called the customer-service department of your credit-card company because you want to increase your credit line. Don\u2019t expect to talk to some financial expert who\u2019s authorized to say yes or no. You\u2019ll be talking to a service representative with no financial expertise whatsoever. He or she will, however, have access to an expert system, which will give you an answer in a few seconds. How does it work? The expert system will prompt the representative to ask you certain questions about your salary and living expenses. It will also check internal corporate data to analyze your purchases and payment behavior, and, based on the results, it will determine whether you get an increase and, if so, how much.<\/p>\n<p id=\"frank-ch15_s03_s02_s05_p02\" class=\"indent para editable block no-indent\">At Caesars, an expert system called the Revenue Management System helps to optimize the overall profitability of both hotel and casino operations. When a customer requests a room, the program accesses his or her profile in the database and consults certain \u201crules\u201d for assessing the application.<a class=\"footnote\" title=\"Goff, J., \u201cHead Games: Businesses Deploying Analytical Software to Get a Better Fix on Customer Behavior,\u201d CFO Magazine for Senior Financial Executives 20:9, July 1, 2004, http:\/\/www.cfo.com\/article.cfm\/3014815 (accessed November 14, 2011).\" id=\"return-footnote-308-15\" href=\"#footnote-308-15\" aria-label=\"Footnote 15\"><sup class=\"footnote\">[15]<\/sup><\/a> One rule, for example, might be, \u201cIf the customer has wagered more than $100,000 in the past year, add 10 points.\u201d Eventually, the system decides whether your application will be accepted (and at what rate) by adding up points determined by the rules. While a tightwad may not get a room even when there are vacancies, a high roller may get a good rate on a luxury suite even if the hotel is nearly full.<\/p>\n<\/div>\n<div class=\"section\" id=\"frank-ch15_s03_s02_s06\">\n<h2 class=\"title editable block\">Face-Recognition Technology<\/h2>\n<p id=\"frank-ch15_s03_s02_s06_p01\" class=\"nonindent para editable block\">Caesars uses another particularly interesting, and sophisticated, application of artificial intelligence. In the hotel-casino business, it\u2019s crucial to identify and turn away undesirable visitors. One tool for this task is a digital camera-surveillance system that uses <em class=\"emphasis\">face-recognition technology<\/em>. Using this technology, a program classifies a person\u2019s face according to the presence\/absence or extent of certain unique features, such as dimpled chins, receding jaws, overbites, and long or short noses. If there\u2019s a match on, for example, fifteen features between a person being scanned and someone in the company database, a staff member decides whether the two people are the same. If a security manager then concludes that the face belongs to a skilled card-counter, the customer will be discouraged from playing blackjack; if it belongs to a known cheater, the individual will be escorted out of the casino. The system, however, does more than spot undesirables. It can also identify high rollers and send information about customers to managers on the floor. That\u2019s why a Caesars manager can greet a preferred customer at the door with his favorite drink and a personalized greeting, such as \u201cHi, Bill! How\u2019s Karen? Did you ever get that vintage Corvette? Here, have a gin rickey on the house\u201d.<a class=\"footnote\" title=\"Duffy, D., \u201cTechnology\u2019s Winning Hand,\u201d CSO.online, October 1, 2003, http:\/\/www.csoonline.com\/article\/218574\/catching-casino-cheats-technology-s-winning-hand (accessed November 14, 2011).\" id=\"return-footnote-308-16\" href=\"#footnote-308-16\" aria-label=\"Footnote 16\"><sup class=\"footnote\">[16]<\/sup><\/a><a class=\"footnote\" title=\"Gallagher, L. B., and Sean Gallagher, \u201cNORA and ANNA: Non-Obvious Relationship Awareness,\u201d Baseline, April 4, 2004, http:\/\/www.baselinemag.com\/c\/a\/Past-News\/NORA-and-ANNA\/ (accessed November 14, 2011).\" id=\"return-footnote-308-17\" href=\"#footnote-308-17\" aria-label=\"Footnote 17\"><sup class=\"footnote\">[17]<\/sup><\/a><\/p>\n<div class=\"bcc-box bcc-success\" id=\"frank-ch15_s03_s02_s06_n01\">\n<h3 class=\"title\">Key Takeaways<\/h3>\n<ul id=\"frank-ch15_s03_s02_s06_l01\" class=\"itemizedlist\">\n<li>Information needs vary according to managerial level (top, middle, or first-line).<\/li>\n<li>\n<p class=\"nonindent para\">An IS, or information system, can be divided into two categories:<\/p>\n<ol id=\"frank-ch15_s03_s02_s06_l02\" class=\"orderedlist\">\n<li>Those that meet the needs of low-level managers<\/li>\n<li>Those that meet the needs of middle- and upper-level managers<\/li>\n<\/ol>\n<\/li>\n<li>\n<p class=\"nonindent para\">Low-level managers\u2014those who run day-to-day operations and make routine decisions\u2014use <strong class=\"emphasis bold\">operations support systems<\/strong>, which usually fall into three categories: transaction processing systems, process control systems, and computer-aided design software.<\/p>\n<ol id=\"frank-ch15_s03_s02_s06_l03\" class=\"orderedlist\">\n<li>Most daily activities are recorded and processed by a <strong class=\"emphasis bold\">transaction processing system<\/strong>, which receives input data and converts them into output\u2014information\u2014intended for various users.<\/li>\n<li><strong class=\"emphasis bold\">Process control<\/strong> refers to the application of technology to monitor and control physical processes, such as food preparation. The system depends on sensors to collect data for analysis by a computer programmed either to make adjustments or to signal an operator.<\/li>\n<li>Technology can be used to design and make products. <strong class=\"emphasis bold\">Computer-aided design (CAD)<\/strong> software, for instance, enables designers to test computer models digitally before moving new products into the prototype stage.<\/li>\n<\/ol>\n<\/li>\n<li>\n<p class=\"nonindent para\">Mid- and upper-level managers may use one of four types of <strong class=\"emphasis bold\">management support system<\/strong> to assist in decision-making activities: management information systems, decision support systems, executive information systems, and expert systems.<\/p>\n<ol id=\"frank-ch15_s03_s02_s06_l04\" class=\"orderedlist\">\n<li>A <strong class=\"emphasis bold\">management information system<\/strong> extracts data from a database to compile reports, such as sales analyses, needed for making routine decisions.<\/li>\n<li>A <strong class=\"emphasis bold\">decision support system<\/strong> is an interactive system that collects and integrates data from multiple sources to assist in making nonroutine decisions.<\/li>\n<li>To develop plans and make major decisions, managers may gather relevant, timely, easily understood information through an <strong class=\"emphasis bold\">executive information system<\/strong>; an EIS provides ready access to strategic information that\u2019s customized to their needs and presented in a convenient format.<\/li>\n<li>An <strong class=\"emphasis bold\">expert system<\/strong> mimics expert judgment by following sets of rules that experts would follow; it relies on <strong class=\"emphasis bold\"><a class=\"glossary-term\" aria-haspopup=\"dialog\" aria-describedby=\"definition\" href=\"#term_308_1475\">artificial intelligence<\/a><\/strong>\u2014the science of developing computer systems that can mimic human behavior.<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n<\/div>\n<div class=\"bcc-box bcc-info\" id=\"frank-ch15_s03_s02_s06_n02\">\n<h3 class=\"title\">Exercise<\/h3>\n<p class=\"nonindent simpara\">(AACSB) Analysis<\/p>\n<p id=\"frank-ch15_s03_s02_s06_p02\" class=\"indent para\">For each of the following situations, select the appropriate management support system to aid the user: decision support system, executive support system, or expert system. In each case, describe the management support system that you recommend.<\/p>\n<ul id=\"frank-ch15_s03_s02_s06_l05\" class=\"itemizedlist\">\n<li>You\u2019re trying to identify a rash on your arm.<\/li>\n<li>You own two golf courses in the Northeast, and you\u2019re thinking about building one in Florida. You need to gather and analyze information about your current operations in the Northeast, as well as external information about the golf industry in Florida.<\/li>\n<li>You own three McDonald\u2019s franchises. Every morning, you want to know the revenues and costs at each store. You\u2019re also interested in a breakdown of revenues by product and costs by category of expense (salaries, food and ingredients, maintenance, and so on).<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"chapter standard\" id=\"slug-15-4-computer-networks-and-cloud-computing\">\n<div class=\"chapter-title-wrap\">\n<h1 class=\"chapter-title\" style=\"text-align: center\">Computer Networks and Cloud Computing<\/h1>\n<\/div>\n<div class=\"ugc chapter-ugc\">\n<div class=\"bcc-box bcc-highlight\" id=\"frank-ch15_s04_n01\">\n<h3 class=\"title\">Learning Objectives<\/h3>\n<ol id=\"frank-ch15_s04_l01\" class=\"orderedlist\">\n<li>Describe the main systems for sharing information through networked computers.<\/li>\n<li>Define cloud computing and identify its advantages and disadvantages.<\/li>\n<\/ol>\n<\/div>\n<p id=\"frank-ch15_s04_p01\" class=\"nonindent para editable block\">Once it\u2019s grown beyond just a handful of employees, an organization needs a way of sharing information. Imagine a flower shop with twenty employees. The person who takes phone orders needs access to the store\u2019s customer list, as do the delivery person and the bookkeeper. Now, the store may have one computer and everyone could share it. It\u2019s more likely, however, that there are a number of computers (several for salespeople, one for delivery, and one for bookkeeping). In this case, everyone needs to be sure that customer records have been updated on all computers every time that a change is required.<\/p>\n<div class=\"section\" id=\"frank-ch15_s04_s99\">\n<h2 class=\"title editable block\">Networks<\/h2>\n<p id=\"frank-ch15_s04_p02\" class=\"nonindent para editable block\">Likewise, many companies want their personal computers to run their own software and process data independently. But they also want people to share databases, files, and printers, and they want them to share applications software that performs particular tasks, including word processing, creating and managing spreadsheets, designing graphical presentations, and producing high-quality printed documents (<em class=\"emphasis\">desktop publishing<\/em>).<\/p>\n<p id=\"frank-ch15_s04_p03\" class=\"indent para editable block no-indent\">The solution in both cases is <em class=\"emphasis\"><a class=\"glossary-term\" aria-haspopup=\"dialog\" aria-describedby=\"definition\" href=\"#term_308_1476\"><strong>networking<\/strong><\/a><\/em>\u2014linking computers to one another. The two major types of networks are distinguished according to geographical coverage:<\/p>\n<ul id=\"frank-ch15_s04_l02\" class=\"itemizedlist editable block\">\n<li>A local area network (LAN) links computers that are in <a class=\"glossary-term\" aria-haspopup=\"dialog\" aria-describedby=\"definition\" href=\"#term_308_1478\">close proximity<\/a>\u2014in the same building or office complex. They can be connected by cables or by wireless technology. Your university might have a LAN system that gives you access to resources, such as registration information, software packages, and printers. <a class=\"xref\" href=\"#frank-ch15_s04_f01\">Figure 15.7 \u201cLocal Area Network (LAN)\u201d<\/a> illustrates a LAN that\u2019s connected to another network by means of a <em class=\"emphasis\"><a class=\"glossary-term\" aria-haspopup=\"dialog\" aria-describedby=\"definition\" href=\"#term_308_1477\">gateway<\/a><\/em>\u2014a processor that allows dissimilar networks to communicate with one another.<\/li>\n<\/ul>\n<h3><span class=\"title-prefix\">Figure 15.7<\/span> Local Area Network (LAN)<\/h3>\n<div class=\"caption\" style=\"text-align: center;font-size: .8em;max-width: 500px\">\n<div class=\"figure full large-height editable block\" id=\"frank-ch15_s04_f01\">\n<p class=\"indent\"><a><img decoding=\"async\" src=\"http:\/\/pressbooks.library.upei.ca\/smallbusinessmanagement\/wp-content\/uploads\/sites\/23\/2018\/12\/7cc9211e1efdbf1c8465dd25d64a877e.jpg\" alt=\"Local Area Network (LAN)\" style=\"max-width: 497px\" \/><br \/>\n<\/a><\/p>\n<\/div>\n<\/div>\n<ul id=\"frank-ch15_s04_l03\" class=\"itemizedlist editable block\">\n<li>Because a wide area network (WAN) covers a relatively large geographical area, its computers are connected by telephone lines, wireless technology, or even satellite.<\/li>\n<\/ul>\n<p id=\"frank-ch15_s04_p04\" class=\"indent para editable block no-indent\">Like the one in <a class=\"xref\" href=\"#frank-ch15_s04_f01\">Figure 15.7 \u201cLocal Area Network (LAN)\u201d<\/a>, some networks are client-server systems, which include a number of client machines (the ones used by employees for data input and retrieval) and a server (which stores the database and the programs used to process the data). Such a setup saves time and money and circulates more-accurate information.<\/p>\n<\/div>\n<div class=\"section\" id=\"frank-ch15_s04_s01\">\n<h2 class=\"title editable block\">Cloud Computing<\/h2>\n<p id=\"frank-ch15_s04_s01_s99_p99\" class=\"nonindent para editable block\">A cloud is a \u201cvisible mass of condensed water vapor floating in the atmosphere, typically high above the ground\u201d.<a class=\"footnote\" title=\"Dictionary.com, \u201cCloud,\u201d Dictionary.com, http:\/\/dictionary.reference.com\/browse\/cloud (accessed November 15, 2011).\" id=\"return-footnote-308-18\" href=\"#footnote-308-18\" aria-label=\"Footnote 18\"><sup class=\"footnote\">[18]<\/sup><\/a> The term \u201ccloud computing\u201d means performing computer tasks using services provided over the Internet.<a class=\"footnote\" title=\"Pinola, M., \u201cWhat Is Cloud Computing?,\u201d About.com, http:\/\/mobileoffice.about.com\/od\/workingontheroad\/f\/cloudcomputing.htm (accessed November 15, 2011).\" id=\"return-footnote-308-19\" href=\"#footnote-308-19\" aria-label=\"Footnote 19\"><sup class=\"footnote\">[19]<\/sup><\/a> So how do you connect the two definitions? When IT professionals diagrammed computer systems, they used a cloud symbol to represent the Internet. So when you hear or read that an individual or company is using the \u201ccloud\u201d or technology firms, such as IBM, Hewlett-Packard, and Salesforce.com, are offering cloud services, just substitute the word \u201cInternet\u201d for \u201ccloud\u201d and things will make sense.<\/p>\n<p id=\"frank-ch15_s04_s01_s99_p98\" class=\"indent para editable block no-indent\">You might be surprised to learn that you\u2019re already using the cloud\u2014that is if you use Facebook (which is very likely\u2014in fact, just mentioning Facebook here might prompt you to stop studying and check out your friends\u2019 pages). How do you know that Facebook is a cloud application? Remember the trick: just substitute the word \u201cInternet\u201d for \u201ccloud.\u201d The Facebook computer application lets you store information about yourself and share it with others using the Internet.<\/p>\n<div class=\"section\" id=\"frank-ch15_s04_s02\">\n<h2 class=\"title editable block no-indent\">Business Applications<\/h2>\n<p id=\"frank-ch15_s04_s01_s99_p97\" class=\"nonindent para editable block no-indent\">Think about the functional areas of business you\u2019ve explored in this text: accounting, finance, human resources, management, marketing, operations, and product design. Now imagine you\u2019re Katrina Lane, senior vice president and chief technology officer for Caesars Entertainment, who is responsible for the information technology needed to handle multiple tasks in all these functional areas. You\u2019re sitting at your desk when Gary Loveman, chief executive officer of Caesars, walks in and gives you the news. Caesars just purchased the Planet Hollywood Casino and Resort in Las Vegas and will open up two new casinos in Ohio in 2012. This is good news for the company, but it means a lot of work for you and your staff.<\/p>\n<p id=\"frank-ch15_s04_s01_s96_p96\" class=\"indent para editable block no-indent\">You wonder whether this might be the time to outsource some of your computing tasks to a technology firm specializing in cloud computing. You remember an example that really makes sense:<a class=\"footnote\" title=\"Gil, P., \u201cWhat Is Cloud Computing?,\u201d About.com, http:\/\/netforbeginners.about.com\/od\/c\/f\/cloudcomputing.htm (accessed November 15, 2011).\" id=\"return-footnote-308-20\" href=\"#footnote-308-20\" aria-label=\"Footnote 20\"><sup class=\"footnote\">[20]<\/sup><\/a> Right now, whenever Microsoft comes out with a new version of Word, Caesars has to pay $350 per PC for the latest version. Wouldn\u2019t it make more sense to rent the use of the Microsoft Word program from a cloud vendor for say $5 a month (or $60 a year)? Given that the average time between new releases of Word is two years, your total cost per PC would be $120 (2 \u00d7 $60)\u2014a savings of about $230 per PC ($350 \u2212 $120). Your employees wouldn\u2019t mind; instead of working offline, they would just login to the Internet and work with their online version using the files that were saved for them. And the members of your IT staff would be pleased that they wouldn\u2019t need to install the new version of Word on all your PCs.<\/p>\n<\/div>\n<div class=\"section\" id=\"frank-ch15_s04_s02_s01\">\n<h2 class=\"title editable block\">The As-A-Service Group<\/h2>\n<p id=\"frank-ch15_s04_s01_s99_p95\" class=\"nonindent para editable block\">Companies can contract for various cloud computing services. The Microsoft Word example discussed previously is classified as software as a service (SaaS). This type of service gives companies access to a large assortment of software packages without having to invest in hardware or install and maintain software on its own computers. The available software, which includes e-mail and collaboration systems and customer relationship management programs, can be customized and used by an individual client or shared among several clients. A second type of service is called infrastructure as a service (IaaS). Instead of providing users with software, a technology firm offering infrastructure as a service provides hardware, including servers, central processing units, network equipment, and disk space.<a class=\"footnote\" title=\"Thrive Networks, \u201cSoftware as a Service\/ Infrastructure as a Service,\u201d Thrive Networks, March 2009, http:\/\/www.thrivenetworks.com\/resources\/march-2009-software-as-a-service.html (accessed November 15, 2011).\" id=\"return-footnote-308-21\" href=\"#footnote-308-21\" aria-label=\"Footnote 21\"><sup class=\"footnote\">[21]<\/sup><\/a> The most successful IaaS provider is Amazon Web Services.<a class=\"footnote\" title=\"Best Price Computers, \u201cInfrastructure as a Service,\u201d Best Price Computers, http:\/\/www.bestpricecomputers.co.uk\/glossary\/infrastructure-as-a-service.htm (accessed November 15, 2011).\" id=\"return-footnote-308-22\" href=\"#footnote-308-22\" aria-label=\"Footnote 22\"><sup class=\"footnote\">[22]<\/sup><\/a> The company rents computer power and storage to users who access their data via the Internet. The last as-a-service model is called platform as a service (PaaS). Those offering platform as a service provide services that enable users to develop customized web applications. Because they don\u2019t have to start from scratch but rather build on existing platforms made available by the service provider, the web applications can be developed quickly.<\/p>\n<div class=\"video editable block\" id=\"frank-ch15_s04_s01_s99_p94\">\n<h3 class=\"title\">Video Clip 15.1 Cloud Computing<\/h3>\n<p>\u201cTraditional business applications and platforms are too complicated and expensive. They need a data center, a complex software stack, and a team of experts to run them.\u201d<\/p>\n<p><iframe loading=\"lazy\" id=\"oembed-1\" title=\"What is Cloud Computing?\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/ae_DKNwK_ms?feature=oembed&#38;rel=0\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<\/div>\n<\/div>\n<div class=\"section\" id=\"frank-ch15_s04_s03\">\n<h2 class=\"title editable block\">Advantages and Disadvantages of Cloud Computing<\/h2>\n<p id=\"frank-ch15_s04_s01_s99_p93\" class=\"nonindent para editable block\">In making your final decision (as the pretend chief technology officer for Caesars) you should consider these advantages and disadvantages of cloud computing:<\/p>\n<div class=\"section\" id=\"frank-ch15_s04_s03_s01\">\n<h2 class=\"title editable block\">Advantages<\/h2>\n<p id=\"frank-ch15_s04_s01_s99_p92\" class=\"nonindent para editable block\">Shifting some of Caesars\u2019s IT functions to the cloud would produce a number of advantages:<\/p>\n<ol id=\"frank-ch15_s04_s01_s99_p91\" class=\"orderedlist editable block\">\n<li><em class=\"emphasis\">Cost Savings<\/em>\u2014By \u201crenting\u201d software rather than buying it, Caesars can reduce its costs. The monthly fee to \u201cuse\u201d the software is generally less than the combined cost of buying, installing, and maintaining the software internally. On the hardware site, housing Caesars\u2019s data in a service provider\u2019s facilities, rather than in-house, reduces the large outlay of cash needed to build and maintain data centers.<\/li>\n<li><em class=\"emphasis\">Speed of Delivery<\/em>\u2014Purchasing and installing software and data processing equipment can be time consuming. A cloud computing service provider could get Caesars\u2019s applications up and running in only a few weeks.<\/li>\n<li><em class=\"emphasis\">Scalable<\/em>\u2014Caesars is constantly expanding both in the number of casinos it owns and geographically. In this ever-changing environment, it\u2019s difficult to gauge the level of our technology needs. If we overestimate our requirements, we end up paying for technology we don\u2019t need. If we underestimate, efficiency goes down, and the experience for our customers diminishes. By using cloud computing we are able to have exactly what we need at our disposal at any point in time.<\/li>\n<li><em class=\"emphasis\">Employees Can Be Mobile<\/em>\u2014The use of cloud computing will free workers from their desks and allow them to work wherever they are. As applications move to the cloud, all that is needed for our employees to connect to their \u201coffices\u201d is the Internet. This mobility benefit also makes it easier for employees to collaborate on projects and connect with others in the company.<\/li>\n<li><em class=\"emphasis\">Information Technology Staff<\/em>\u2014Although our current staff is extremely qualified and dedicated, finding experienced and knowledgeable staff is a continuing problem particularly in the casino industry which suffers from historically high turnover. By using cloud computing, we reduce our human resource needs by shifting some of our work to outside vendors who are able to hire and keep well qualified individuals (in part because IT professionals enjoy working for technology companies).<\/li>\n<\/ol>\n<\/div>\n<div class=\"section\" id=\"frank-ch15_s04_s03_s02\">\n<h2 class=\"title editable block\">Disadvantages<\/h2>\n<p id=\"frank-ch15_s04_s01_s99_p90\" class=\"nonindent para editable block\">Although the advantages of moving to a cloud environment outnumber the disadvantages, the following disadvantages are cause for concern:<\/p>\n<ol id=\"frank-ch15_s04_s01_s99_p89\" class=\"orderedlist editable block\">\n<li><em class=\"emphasis\">Disruption in Internet Service<\/em>\u2014If Caesars moves some of its applications to the cloud, its employees can work on these applications on any device and in any location as long as they have an Internet connection. But what if the Internet is unavailable because of a disruption? Depending on the length of the disruption, this could create serious problems for Caesars.<\/li>\n<li><em class=\"emphasis\">Security<\/em>\u2014Many companies are reluctant to trust cloud service providers with their data because they\u2019re afraid it might become available to unauthorized individuals or criminals. This is a particular problem for Caesars, which collects and stores sensitive client information and has to constantly be on the lookout for fraudulent activity of staff and customers.<a class=\"footnote\" title=\"Eve, J., \u201cCloud Computing as a Security Asset,\u201d Indian Gaming, www.indiangaming.com\/istore\/Apr11_JosephEve.pdf (accessed November 16, 2011), 60-61.\" id=\"return-footnote-308-23\" href=\"#footnote-308-23\" aria-label=\"Footnote 23\"><sup class=\"footnote\">[23]<\/sup><\/a><\/li>\n<li><em class=\"emphasis\">Service Provider System Crash<\/em>\u2014Organizations considering moving to the cloud are justifiably concerned about the possibility of a computer service crash at their service providers\u2019 facilities. It looks like this concern was warranted. In April of 2011, Amazon Web Service (a leading cloud services provider) experienced an outage in one of its large web-connected data centers. The outage crashed its system and brought down the Web sites of a number of companies, including the location-based social network, Foursquare.<a class=\"footnote\" title=\"Lohr, S., \u201cAmazon\u2019s Trouble Raises Cloud Computing Doubts,\u201d The New York Times, April 22, 2011, http:\/\/www.nytimes.com\/2011\/04\/23\/technology\/23cloud.html?_r=1 (accessed November 16, 2011).\" id=\"return-footnote-308-24\" href=\"#footnote-308-24\" aria-label=\"Footnote 24\"><sup class=\"footnote\">[24]<\/sup><\/a> It took more than thirty-six hours to get all seventy or so of the crashed sites up and running.<\/li>\n<\/ol>\n<\/div>\n<\/div>\n<div class=\"section\" id=\"frank-ch15_s04_s03_s03\">\n<h2 class=\"title editable block\">Go or No Go?<\/h2>\n<p id=\"frank-ch15_s04_s01_s99_p88\" class=\"nonindent para editable block\">So, pretend chief technology officer for Caesars, what\u2019s your decision: will you get on the cloud or stay on the ground? If you are curious about what the real chief technology officer did, she took the high road and transferred a number of applications to <a class=\"link\" target=\"_blank\" href=\"http:\/\/salesforce.com\" rel=\"noopener noreferrer\">Salesforce.com<\/a>\u2019s Web-based <a class=\"link\" target=\"_blank\" href=\"http:\/\/force.com\" rel=\"noopener noreferrer\">Force.com<\/a>\u2019s cloud applications service.<a class=\"footnote\" title=\"Salesforce.com, \u201cCaesars Entertainment Hits the Efficiency Jackpot with Force.com,\u201d Salesforce.com, http:\/\/www.salesforce.com\/showcase\/stories\/caesars.jsp (accessed November 16, 2011).\" id=\"return-footnote-308-25\" href=\"#footnote-308-25\" aria-label=\"Footnote 25\"><sup class=\"footnote\">[25]<\/sup><\/a><\/p>\n<div class=\"bcc-box bcc-success\" id=\"frank-ch15_s04_s03_s03_n01\">\n<h3 class=\"title\">Key Takeaways<\/h3>\n<ul id=\"frank-ch15_s04_l04\" class=\"itemizedlist\">\n<li>Once an organization has grown to more than a few employees, it needs to network individual computers to allow them to share information and technologies.<\/li>\n<li>A <strong class=\"emphasis bold\">client-server system<\/strong> links a number of client machines (for data input and retrieval) with a server (for storing the database and the programs that process data).<\/li>\n<li>Many companies want personal computers to run their own software and process data independently.<\/li>\n<li>But they also want individuals to share databases, files, printers, and <strong class=\"emphasis bold\">applications software<\/strong> that perform particular types of work (word processing, creating and managing spreadsheets, and so forth).<\/li>\n<li>\n<p class=\"nonindent para\">There are two systems that can satisfy both needs.<\/p>\n<ol id=\"frank-ch15_s04_l05\" class=\"orderedlist\">\n<li>A <strong class=\"emphasis bold\">local area network (LAN)<\/strong> links computers in close proximity, connecting them by cables or by wireless technology.<\/li>\n<li>A <strong class=\"emphasis bold\">wide area network (WAN)<\/strong> covers a relatively large geographical area and connects computers by telephone lines, wireless technology, or satellite.<\/li>\n<\/ol>\n<\/li>\n<li>The term \u201c<strong class=\"emphasis bold\">cloud computing<\/strong>\u201d means performing computer tasks using services provided over the Internet.<\/li>\n<li>The <strong class=\"emphasis bold\">software as a service (SaaS)<\/strong> category of cloud computing gives companies access to a large assortment of software packages without having to invest in hardware or install and maintain software on its own computers.<\/li>\n<li>A technology firm offering <strong class=\"emphasis bold\">infrastructure as a service<\/strong> provides users with hardware, including servers, central processing units, network equipment, and disk space.<\/li>\n<li>Those offering the <strong class=\"emphasis bold\">platform as a service<\/strong> category of cloud computing provide services that enable users to develop customized web applications.<\/li>\n<li>Shifting IT functions to the cloud produces a number of advantages, including cost savings, speedy delivery of software, scalability (you pay for only what you need), employee mobility, and a reduction in information technology staff.<\/li>\n<li>The following disadvantages of cloud computing are cause for concern: disruption in internet service, security issues, and unreliability of service provider systems.<\/li>\n<\/ul>\n<\/div>\n<div class=\"bcc-box bcc-info\" id=\"frank-ch15_s04_s03_s03_n02\">\n<h3 class=\"title\">Exercises<\/h3>\n<ol id=\"frank-ch15_s04_l06\" class=\"orderedlist\">\n<li>What\u2019s the difference between a LAN and a WAN? Give an example of the use to which each type of system can be put. Does your college maintain either type of computer network?<\/li>\n<li>In what ways could your college benefit from cloud computing? In responding, consider the three types of services offered by cloud service providers: software as a service, infrastructure as a service, and platform as a service. What type of security issues might your college administrators be concerned with?<\/li>\n<\/ol>\n<\/div>\n<\/div>\n<\/div>\n<h2><\/h2>\n<div class=\"chapter standard\" id=\"slug-15-5-data-communications-networks\">\n<div class=\"chapter-title-wrap\">\n<h1 class=\"chapter-title\" style=\"text-align: center\">Data Communications Networks<\/h1>\n<\/div>\n<div class=\"ugc chapter-ugc\">\n<div class=\"bcc-box bcc-highlight\" id=\"frank-ch15_s05_n01\">\n<h3 class=\"title\">Learning Objective<\/h3>\n<ol id=\"frank-ch15_s05_l01\" class=\"orderedlist\">\n<li>Explain how four networking technologies\u2014the Internet, the World Wide Web, intranets, and extranets\u2014make data communication possible.<\/li>\n<\/ol>\n<\/div>\n<p id=\"frank-ch15_s05_p01\" class=\"nonindent para editable block\">In addition to using networks for information sharing within the organization, companies use networks to communicate and share information with those outside the organization. All this is made possible by data communication networks, which transmit digital data (numeric data, text, graphics, photos, video, and voice) from one computer to another using a variety of wired and wireless communication channels. Let\u2019s take a closer look at the networking technologies that make possible all this electronic communication\u2014in particular, the <em class=\"emphasis\">Internet<\/em> (including the <em class=\"emphasis\">World Wide Web<\/em>), <em class=\"emphasis\">intranets<\/em>, and <em class=\"emphasis\">extranets<\/em>.<\/p>\n<div class=\"section\" id=\"frank-ch15_s05_s01\">\n<h2 class=\"title editable block\">The Internet and the World Wide Web<\/h2>\n<p id=\"frank-ch15_s05_s01_p01\" class=\"nonindent para editable block\">Though we often use the terms <em class=\"emphasis\">Internet<\/em> and <em class=\"emphasis\">World Wide Web<\/em> interchangeably, they\u2019re not the same thing.<a class=\"footnote\" title=\"Webopedia, \u201cThe Difference Between the Internet and the World Wide Web,\u201d Webopedia, http:\/\/www.webopedia.com\/DidYouKnow\/Internet\/2002\/Web_vs_Internet.asp (accessed November 14, 2011)\" id=\"return-footnote-308-26\" href=\"#footnote-308-26\" aria-label=\"Footnote 26\"><sup class=\"footnote\">[26]<\/sup><\/a> The Internet is an immense global network comprising smaller interconnected networks linking millions of computers around the world. Originally developed for the U.S. military and later adapted for use in academic and government research, the Internet experienced rapid growth in the 1990s, when companies called Internet service providers were allowed to link into the Internet infrastructure in order to connect paying subscribers. Today, Internet service providers, such as CompuServe, America Online (AOL), MSN, and Comcast, enable us to use the Internet to communicate with others through e-mail, texting, instant messaging, online conferencing, and so on. These services also connect us with third-party providers of information, including news stories, stock quotes, and magazine articles.<\/p>\n<p id=\"frank-ch15_s05_s01_p02\" class=\"indent para editable block no-indent\">The World Wide Web (or simply \u201cthe Web\u201d) is just a portion of the Internet\u2014albeit a large portion. The Web is a subsystem of computers that can be accessed on the Internet using a special protocol, or language, known as <em class=\"emphasis\">hypertext transfer protocol<\/em> (HTTP). What\u2019s the difference between the Internet and the Web? According to Tim Berners-Lee (one of the small team of scientists who developed the concept for the Web in 1989), the Internet is a network of networks composed of cables and computers. You can use it to send \u201cpackets\u201d of information from one computer to another, much like sending a postcard. If the address on the packet is accurate, it will arrive at the correct destination in much less than a second. Thus, the Internet is a packet-delivery <em class=\"emphasis\">service<\/em> that delivers such items as e-mail messages all over the globe. The Web, by contrast, is composed of <em class=\"emphasis\">information<\/em>\u2014documents, pictures, sounds, streaming videos, and so on. It\u2019s connected not through cables, but rather through <em class=\"emphasis\">hypertext links<\/em> that allow users to navigate between resources on the Internet.<a class=\"footnote\" title=\"Griffiths, R. T., \u201cChapter Two: The World Wide Web (WWW),\u201d The History of the Internet, http:\/\/www.let.leidenuniv.nl\/history\/ivh\/chap2.htm (accessed November 14, 2011).\" id=\"return-footnote-308-27\" href=\"#footnote-308-27\" aria-label=\"Footnote 27\"><sup class=\"footnote\">[27]<\/sup><\/a><\/p>\n<p id=\"frank-ch15_s05_s01_p03\" class=\"indent para editable block no-indent\">Because it\u2019s driven by programs that communicate between computers connected to the Internet, the Web couldn\u2019t exist without the Internet. The Internet, on the other hand, could exist without the Web, but it wouldn\u2019t be nearly as useful. The Internet itself is enormous, but it\u2019s difficult to navigate, and it has no pictures, sounds, or streamed videos. They exist on computers connected to the Web, which also makes it much easier to retrieve information. The creation of <a class=\"glossary-term\" aria-haspopup=\"dialog\" aria-describedby=\"definition\" href=\"#term_308_1479\">Web browsers<\/a>\u2014software, such as Microsoft\u2019s Internet Explorer and Netscape Navigator, that locates and displays Web pages\u2014opened up the Internet to a vast range of users. Almost 80 percent of individuals in the United States use the Internet regularly.<a class=\"footnote\" title=\"Internet World Stats, \u201cTop 20 Countries with the Highest Number of Internet Users,\u201d Internet World Stats, June 30, 2011, http:\/\/www.internetworldstats.com\/top20.htm (accessed November 14, 2011).\" id=\"return-footnote-308-28\" href=\"#footnote-308-28\" aria-label=\"Footnote 28\"><sup class=\"footnote\">[28]<\/sup><\/a><a class=\"footnote\" title=\"Kessler, S., \u201cStudy: 80 Percent of Children under 5 Use Internet Weekly,\u201d Mashable, March 15, 2011, http:\/\/content.usatoday.com\/communities\/technologylive\/post\/2011\/03\/study-80-percent-of-children-under-5-use-internet-weekly\/1 (accessed November 14, 2011).\" id=\"return-footnote-308-29\" href=\"#footnote-308-29\" aria-label=\"Footnote 29\"><sup class=\"footnote\">[29]<\/sup><\/a> So, who\u2019s in charge of the Web? No one owns it, but an organization called the World Wide Web Consortium (W3C) oversees the development and maintenance of standards governing the way information is stored, displayed, and retrieved on it.<a class=\"footnote\" title=\"Wikipedia, \u201cWorld Wide Web,\u201d Wikipedia, http:\/\/en.wikipedia.org\/wiki\/World_Wide_Web (accessed November 14, 2011).\" id=\"return-footnote-308-30\" href=\"#footnote-308-30\" aria-label=\"Footnote 30\"><sup class=\"footnote\">[30]<\/sup><\/a><\/p>\n<div class=\"section\" id=\"frank-ch15_s05_s01_s01\">\n<h2 class=\"title editable block\">The Technology of the Web<\/h2>\n<h3><span class=\"title-prefix\">Figure 15.8<\/span> Google<\/h3>\n<div class=\"caption\" style=\"text-align: center;font-size: .8em;max-width: 500px\" id=\"frank-ch15_s05_s01_s01_f01\">\n<p class=\"indent\"><a><img decoding=\"async\" src=\"http:\/\/pressbooks.library.upei.ca\/smallbusinessmanagement\/wp-content\/uploads\/sites\/23\/2018\/12\/15.5-1024x342.png\" alt=\"Google\" class=\"aligncenter size-large wp-image-1485\" width=\"500\" \/><br \/>\n<\/a><\/p>\n<\/div>\n<p id=\"frank-ch15_s05_s01_s01_p01\" class=\"indent para editable block no-indent\">Let\u2019s look a little more closely at some of the technologies that enable us to transmit and receive data over the Web. Documents on the Web are called <em class=\"emphasis\">Web pages<\/em>, and they\u2019re stored on <em class=\"emphasis\">Web sites<\/em>. Each site is maintained by a <em class=\"emphasis\">Webmaster<\/em> and opens with a <em class=\"emphasis\">home page<\/em>. Each Web page is accessed through a unique address called a <em class=\"emphasis\">uniform resource locator (URL)<\/em>. For example, if you want to find statistics on basketball star LeBron James, you could type in the URL address <a class=\"link\" target=\"_blank\" href=\"http:\/\/www.nba.com\/home\/playerfile\/lebron_james\" rel=\"noopener noreferrer\">http:\/\/www.nba.com\/home\/playerfile\/lebron_james<\/a>. The prefix <em class=\"emphasis\">http:\/\/<\/em> is the protocol name, <em class=\"emphasis\">http:\/\/www.nba.com<\/em> the domain name, <em class=\"emphasis\">playerfile<\/em> the subdirectory name, and <em class=\"emphasis\">lebron_james<\/em> the document name (or Web page). A computer that retrieves Web pages is called a Web server. A search engine is a software program that scans Web pages containing specified keywords and provides a list of documents containing them. The most popular search engine is Google; others include Bing, Yahoo!, Ask, and AOL.<\/p>\n<\/div>\n<\/div>\n<div class=\"section\" id=\"frank-ch15_s05_s02\">\n<h2 class=\"title editable block no-indent\">Intranets and Extranets<\/h2>\n<p id=\"frank-ch15_s05_s02_p01\" class=\"nonindent para editable block no-indent\">What\u2019s the difference among the Internet, an intranet, and an extranet? It depends on who can and can\u2019t access the information on the network. The Internet is a public network that anyone can use. A company\u2019s intranet, on the other hand, is a private network using Internet technologies that\u2019s available only to employees; access is controlled by a software program called a firewall. The information available on an intranet varies by company but may include internal job postings, written company policies, and proprietary information, such as price lists meant for internal use only.<\/p>\n<p id=\"frank-ch15_s05_s02_p02\" class=\"indent para editable block no-indent\">An extranet is an intranet that\u2019s partially available to certain parties outside the organization. Say, for example, you\u2019ve posted the following information on your intranet: company policies, payroll and benefit information, training programs, parts specifications and inventories, and production schedules. To allow suppliers to bid on contracts, you might give them access to sections of the site disclosing parts specifications, inventories, and production schedules. All other sections would be off limits. You\u2019d control access to employee-only and supplier-accessible sections by means of usernames and passwords. As you can see from <a class=\"xref\" href=\"#frank-ch15_s05_s02_f01\">Figure 15.9 \u201cHow an Extranet Works\u201d<\/a>, which illustrates some of the connections made possible by an extranet, access can be made available to customers and business partners, as well.<\/p>\n<h3><span class=\"title-prefix\">Figure 15.9<\/span> How an Extranet Works<\/h3>\n<div class=\"caption\" style=\"text-align: center;font-size: .8em\" id=\"frank-ch15_s05_s02_f01\">\n<p class=\"indent\"><a><img decoding=\"async\" src=\"http:\/\/pressbooks.library.upei.ca\/smallbusinessmanagement\/wp-content\/uploads\/sites\/23\/2018\/12\/25c37c3c86aa2a2d67cf63052c2f7008.jpg\" alt=\"How an Extranet Works\" style=\"max-width: 497px\" \/><br \/>\n<\/a><\/p>\n<\/div>\n<\/div>\n<div class=\"section\" id=\"frank-ch15_s05_s03\">\n<h2 class=\"title editable block\">E-Commerce<\/h2>\n<p id=\"frank-ch15_s05_s03_p01\" class=\"nonindent para editable block\">The level of <a class=\"glossary-term\" aria-haspopup=\"dialog\" aria-describedby=\"definition\" href=\"#term_308_764\">e-commerce<\/a>\u2014conducting business over the Internet\u2014varies by company. Some companies, such as Amazon.com, rely on the Internet for their existence. Others, especially smaller firms, have yet to incorporate the Internet into their business models, but these companies belong to a dwindling group: about half of small companies and 90 percent of large companies have Web sites, and a third of the companies that maintain Web sites sell products through them.<a class=\"footnote\" title=\"Marketing Charts, March 15, 2011, http:\/\/www.marketingcharts.com\/direct\/less-than-half-of-small-biz-have-sites-16575\/, (accessed November 14, 2011).\" id=\"return-footnote-308-31\" href=\"#footnote-308-31\" aria-label=\"Footnote 31\"><sup class=\"footnote\">[31]<\/sup><\/a><a class=\"footnote\" title=\"Cambell, A., \u201cOver 70% of the Largest Small Businesses Have a Website\u201d, Selling to Small Businesses, http:\/\/www.sellingtosmallbusinesses.com\/70-percent-largest-small-businesses-have-website\/ (accessed November 14, 2011).\" id=\"return-footnote-308-32\" href=\"#footnote-308-32\" aria-label=\"Footnote 32\"><sup class=\"footnote\">[32]<\/sup><\/a> Larger companies now find that they must do business over the Internet, including selling and buying goods.<\/p>\n<div class=\"section\" id=\"frank-ch15_s05_s03_s01\">\n<h2 class=\"title editable block\">Why Business Uses the Internet<\/h2>\n<p id=\"frank-ch15_s05_s03_s01_p01\" class=\"nonindent para editable block\">Businesses use the Internet for four purposes: <em class=\"emphasis\">presenting information, selling products, distributing digital products<\/em>, and <em class=\"emphasis\">acquiring goods and services<\/em>.<\/p>\n<div class=\"section\" id=\"frank-ch15_s05_s03_s01_s01\">\n<h2 class=\"title editable block\">Presenting Information<\/h2>\n<p id=\"frank-ch15_s05_s03_s01_s01_p01\" class=\"nonindent para editable block\">By posting a Web site, a company can tell people about itself, its products, and its activities. Customers can also check the status of orders or account balances. Information should always be current, complete, and accurate. Customers should be able to find and navigate the site, which should be able to accommodate them during high-use periods.<\/p>\n<\/div>\n<div class=\"section\" id=\"frank-ch15_s05_s03_s01_s02\">\n<h2 class=\"title editable block\">Selling Products<\/h2>\n<p id=\"frank-ch15_s05_s03_s01_s02_p01\" class=\"nonindent para editable block\">Selling over the Internet\u2014whether to individuals or to other businesses\u2014enables a business to enlarge its customer base by reaching buyers outside its geographical area. A company selling over the Internet must attract customers to its site, make the buying process simple, assure customers that the site is secure, and provide helpful information.<\/p>\n<\/div>\n<div class=\"section\" id=\"frank-ch15_s05_s03_s01_s03\">\n<h2 class=\"title editable block\">Distributing Digital Products<\/h2>\n<p id=\"frank-ch15_s05_s03_s01_s03_p01\" class=\"nonindent para editable block\">Some companies use the Internet to sell and deliver such digital products as subscriptions to online news services, software products and upgrades, and music and video products. In these businesses, the timely delivery of products is crucial. Sales of digital products over the Internet are expected to increase substantially in the future, particularly sales of digital music.<a class=\"footnote\" title=\"Sisario, B., \u201cDigital Music Leads Boost in Record Sales,\u201d The New York Times, July 6, 2011, http:\/\/artsbeat.blogs.nytimes.com\/2011\/07\/06\/digital-music-leads-boost-in-record-sales\/ (accessed November 14, 2011).\" id=\"return-footnote-308-33\" href=\"#footnote-308-33\" aria-label=\"Footnote 33\"><sup class=\"footnote\">[33]<\/sup><\/a><a class=\"footnote\" title=\"Phillips, M., \u201cDigital Music Services Hit First Major Milestone as Downloads Outsell Physical Formats for the First Time,\u201d Head-Fi, September 2, 2004, http:\/\/www.head-fi.org\/t\/59174\/legal-downloads-outselling-other-formats (accessed November 14, 2011).\" id=\"return-footnote-308-34\" href=\"#footnote-308-34\" aria-label=\"Footnote 34\"><sup class=\"footnote\">[34]<\/sup><\/a><\/p>\n<\/div>\n<div class=\"section\" id=\"frank-ch15_s05_s03_s01_s04\">\n<h2 class=\"title editable block\">Acquiring Goods and Services<\/h2>\n<p id=\"frank-ch15_s05_s03_s01_s04_p01\" class=\"nonindent para editable block\"><em class=\"emphasis\">E-purchasing<\/em> (which was introduced in <a class=\"xref\" href=\"https:\/\/umn.pressbooks.network\/exploringbusiness\/?p=904\">Chapter 11 \u201cOperations Management in Manufacturing and Service Industries\u201d<\/a>) saves time, speeds up delivery, reduces administrative costs, and fosters better communications between a firm and its suppliers. Most importantly, it cuts the costs of purchased products because it\u2019s now feasible for buyers to request competitive bids and do comparative shopping. Many companies now use a technology called electronic data interchange to process transactions and transmit purchasing documents directly from one IS to another. <a class=\"xref\" href=\"#frank-ch15_s05_s03_s01_s04_f01\">Figure 15.10 \u201cElectronic Data Interchange System and Value-Added Networks\u201d<\/a> shows an electronic data interchange system at a company that subscribes to a <em class=\"emphasis\"><a class=\"glossary-term\" aria-haspopup=\"dialog\" aria-describedby=\"definition\" href=\"#term_308_1480\">value-added network<\/a><\/em>\u2014a private system supplied by a third-party firm\u2014over which it conducts a variety of transactions.<\/p>\n<h3 class=\"nonindent para editable block\"><span class=\"title-prefix\">Figure 15.10<\/span> Electronic Data Interchange System and Value-Added Networks<\/h3>\n<div class=\"caption\" style=\"text-align: center;font-size: .8em\" id=\"frank-ch15_s05_s03_s01_s04_f01\">\n<p class=\"indent\"><a><img decoding=\"async\" src=\"http:\/\/pressbooks.library.upei.ca\/smallbusinessmanagement\/wp-content\/uploads\/sites\/23\/2018\/12\/17469b03ca9383931d675f4b706f2196.jpg\" alt=\"Electronic Data Interchange System and Value-Added Networks\" style=\"max-width: 497px\" \/><br \/>\n<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"section\" id=\"frank-ch15_s05_s03_s02\">\n<h2 class=\"title editable block\">The Virtual Company<\/h2>\n<p id=\"frank-ch15_s05_s03_s02_p01\" class=\"nonindent para editable block\">Imagine a company that retails products for schoolteachers over the Internet\u2014for example, books, software, and teaching supplies purchased from various manufacturers and distributors. It would need facilities to store inventories and personnel to handle inventories and fill customer orders. But what if this company decided to get out of the traditional retail business? What if it decided instead to team up with three trading partners\u2014a book publisher, a software developer, and a manufacturer of office supplies? Our original company could re-create itself as a Web site for marketing the books, software, and supplies provided by its partners, without taking physical possession of them. It would become a virtual company. Its partners would warehouse their own products and furnish product descriptions, prices, and delivery times. Meanwhile, the virtual company, besides promoting all three lines of products, would verify customer orders and forward them to its partners, who would ship their own products directly to customers. All four partners would be better off, because they\u2019d be competing in a business in which none of them could compete by itself. This business approach has allowed <a class=\"link\" target=\"_blank\" href=\"http:\/\/spun.com\" rel=\"noopener noreferrer\">Spun.com<\/a>, a CD, DVD, and game Internet retailer, to avoid carrying the $8 million inventory that it would have needed to support its sales. Rather than hold its own inventory, Spun.com merely passes the orders on to Alliance Entertainment (a home entertainment products wholesale distributor), which ships them directly to customers.<a class=\"footnote\" title=\"Research at Penn, \u201cCan E-Tailers Find Fulfillment with Drop Shipping?\u201d Research at Penn, http:\/\/www.upenn.edu\/researchatpenn\/article.php?21&amp;bus (accessed November 14, 2011).\" id=\"return-footnote-308-35\" href=\"#footnote-308-35\" aria-label=\"Footnote 35\"><sup class=\"footnote\">[35]<\/sup><\/a><\/p>\n<div class=\"bcc-box bcc-success\" id=\"frank-ch15_s05_s03_s02_n01\">\n<h3 class=\"title\">Key Takeaways<\/h3>\n<ul id=\"frank-ch15_s05_s03_s02_l01\" class=\"itemizedlist\">\n<li><strong class=\"emphasis bold\">Data communication networks<\/strong> transmit digital data from one computer to another computer using a variety of wired and wireless communication channels.<\/li>\n<li>One such network, the <strong class=\"emphasis bold\">Internet<\/strong>, is an immense global network of smaller interconnected networks linking millions of computers.<\/li>\n<li>By connecting paying subscribers into the Internet infrastructure, a company called an <strong class=\"emphasis bold\">Internet service provider<\/strong> provides services, such as e-mail, online conferencing, and instant messaging.<\/li>\n<li>A large portion of the Internet, the <strong class=\"emphasis bold\">World Wide Web<\/strong> (\u201cthe Web\u201d), is a subsystem of computers that can be accessed by means of a special protocol known as <em class=\"emphasis\">hypertext transfer protocol (HTTP)<\/em>.<\/li>\n<li>Computers on the Web are connected with <strong class=\"emphasis bold\">hypertext links<\/strong> that permit users to navigate among Internet resources.<\/li>\n<li>A Web <strong class=\"emphasis bold\">browser<\/strong> is software that locates and displays Web pages.<\/li>\n<li>Though the Web couldn\u2019t exist without the Internet, it\u2019s the Web that provides such multimedia material as pictures, sounds, and streaming videos.<\/li>\n<li>Businesses use the Internet for four purposes: presenting information, selling products, acquiring goods and services, and distributing digital products.<\/li>\n<li>While the Internet is a public network that anyone can use, a company\u2019s <strong class=\"emphasis bold\">intranet<\/strong> is a private network that\u2019s available only to its employees; access is controlled by a software program called a <em class=\"emphasis\">firewall<\/em>.<\/li>\n<li>An <strong class=\"emphasis bold\">extranet<\/strong> is an intranet that\u2019s partially available to certain outside parties, such as suppliers.<\/li>\n<\/ul>\n<\/div>\n<div class=\"bcc-box bcc-info\" id=\"frank-ch15_s05_s03_s02_n02\">\n<h3 class=\"title\">Exercises<\/h3>\n<ol id=\"frank-ch15_s05_s03_s02_l02\" class=\"orderedlist\">\n<li>If asked by your instructor, how would you explain the difference between the Internet and the World Wide Web?<\/li>\n<li>\n<p class=\"nonindent simpara\"><strong class=\"emphasis bold\">(AACSB) Analysis<\/strong><\/p>\n<p id=\"frank-ch15_s05_s03_s02_p02\" class=\"indent para\">Identify ten specific ways in which your college uses the Internet.<\/p>\n<\/li>\n<\/ol>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"chapter standard\" id=\"slug-15-6-security-issues-in-electronic-communication\">\n<div class=\"chapter-title-wrap\">\n<h1 class=\"chapter-title\" style=\"text-align: center\">Security Issues in Electronic Communication<\/h1>\n<\/div>\n<div class=\"ugc chapter-ugc\">\n<div class=\"bcc-box bcc-highlight\" id=\"frank-ch15_s06_n01\">\n<h3 class=\"title\">Learning Objective<\/h3>\n<ol id=\"frank-ch15_s06_l01\" class=\"orderedlist\">\n<li>Identify and discuss challenges faced by companies engaged in e-commerce.<\/li>\n<\/ol>\n<\/div>\n<p id=\"frank-ch15_s06_p01\" class=\"nonindent para editable block\">E-commerce has presented businesses with opportunities undreamt of only a couple of decades ago. But it also has introduced some unprecedented challenges. For one thing, companies must now earmark more than 5 percent of their annual IT budgets for protecting themselves against disrupted operations and theft due to computer crime and sabotage.<a class=\"footnote\" title=\"Alexander, S., \u201cFeds Take Up Arms as Computer Crime Becomes Multibillion-Dollar Problem,\u201d Minneapolis Star Tribune, Computer Crime Research Center, http:\/\/www.crime-research.org\/news\/2003\/10\/Mess0601.html (accessed November 14, 2011).\" id=\"return-footnote-308-36\" href=\"#footnote-308-36\" aria-label=\"Footnote 36\"><sup class=\"footnote\">[36]<\/sup><\/a> The costs resulting from <a class=\"glossary-term\" aria-haspopup=\"dialog\" aria-describedby=\"definition\" href=\"#term_308_1481\">cyber crimes<\/a>\u2014criminal activity done using computers or the Internet\u2014are substantial and increasing at an alarming rate. A 2010 study of forty-five large U.S. companies revealed that the median cost of cybercrime for the companies in the study was $3.8 million a year.<a class=\"footnote\" title=\"Ponemon Institute, \u201cFirst Annual Cost of Cyber Crime Study: Benchmark Study of U.S. Companies,\u201d Ponemon Institute, July 2010, http:\/\/www.riskandinsurancechalkboard.com\/uploads\/file\/Ponemon%20Study%281%29.pdf (accessed November 14, 2011).\" id=\"return-footnote-308-37\" href=\"#footnote-308-37\" aria-label=\"Footnote 37\"><sup class=\"footnote\">[37]<\/sup><\/a> And some cybercrimes involve viruses that can spread rapidly from computer to computer creating enormous damage. It\u2019s estimated, for example, that damage to 50,000 personal computers and corporate networks from the so-called Blaster worm in August 2003 totaled $2 billion, including $1.2 billion paid by Microsoft to correct the problem.<a class=\"footnote\" title=\"Shukovsky, P., \u201cBlaster Worm Attacker Gets 18 Months,\u201d Seattle Post-Intelligencer, http:\/\/www.seattlepi.com\/local\/article\/Blaster-worm-attacker-gets-18-months-1165231.php (accessed November 14, 2011).\" id=\"return-footnote-308-38\" href=\"#footnote-308-38\" aria-label=\"Footnote 38\"><sup class=\"footnote\">[38]<\/sup><\/a> The battle against technology crime is near the top of the FBI\u2019s list of priorities, behind only the war against terrorism and espionage.<a class=\"footnote\" title=\"Alexander, S., \u201cFeds Take Up Arms as Computer Crime Becomes Multibillion-Dollar Problem,\u201d Minneapolis Star Tribune, Computer Crime Research Center, http:\/\/www.crime-research.org\/news\/2003\/10\/Mess0601.html (accessed November 14, 2011).\" id=\"return-footnote-308-39\" href=\"#footnote-308-39\" aria-label=\"Footnote 39\"><sup class=\"footnote\">[39]<\/sup><\/a> In addition to protecting their own operations from computer crime, companies engaged in e-commerce must clear another hurdle: they must convince consumers that it\u2019s safe to buy things over the Internet\u2014that credit-card numbers, passwords, and other personal information are protected from theft or misuse. In this section, we\u2019ll explore some of these challenges and describe a number of the efforts being made to meet them.<\/p>\n<div class=\"section\" id=\"frank-ch15_s06_s01\">\n<h2 class=\"title editable block\">Data Security<\/h2>\n<p id=\"frank-ch15_s06_s01_p01\" class=\"nonindent para editable block\">In some ways, life was simpler for business-people before computers. Records were produced by hand and stored on paper. As long as you were careful to limit access to your records (and remembered to keep especially valuable documents in a safe), you faced little risk of someone altering or destroying your records. In some ways, storing and transmitting data electronically is a little riskier. Let\u2019s look at two data-security risks associated with electronic communication: <em class=\"emphasis\">malicious programs<\/em> and <em class=\"emphasis\">spoofing<\/em>.<\/p>\n<div class=\"section\" id=\"frank-ch15_s06_s01_s01\">\n<h2 class=\"title editable block\">Malicious Programs<\/h2>\n<p id=\"frank-ch15_s06_s01_s01_p01\" class=\"nonindent para editable block\">Some people get a kick out of wreaking havoc with computer systems by spreading a variety of destructive programs. Once they\u2019re discovered, they can be combated with antivirus programs that are installed on most computers and that can be updated daily. In the meantime, unfortunately, they can do a lot of damage, bringing down computers or entire networks by corrupting operating systems or databases.<\/p>\n<div class=\"section\" id=\"frank-ch15_s06_s01_s01_s01\">\n<h2 class=\"title editable block\">Viruses, Worms, and Trojan Horses<\/h2>\n<p id=\"frank-ch15_s06_s01_s01_s01_p01\" class=\"nonindent para editable block\">The cyber vandal\u2019s repertory includes \u201cviruses,\u201d \u201cworms,\u201d and \u201cTrojan horses.\u201d Viruses and worms are particularly dangerous because they can copy themselves over and over again, eventually using up all available memory and closing down the system. Trojan horses are viruses that enter your computer by posing as some type of application. Some sneak in by pretending to be virus-scanning programs designed to rid your computer of viruses. Once inside, they do just the opposite.<\/p>\n<\/div>\n<\/div>\n<div class=\"section\" id=\"frank-ch15_s06_s01_s02\">\n<h2 class=\"title editable block\">Spoofing<\/h2>\n<p id=\"frank-ch15_s06_s01_s02_p01\" class=\"nonindent para editable block\">It\u2019s also possible for unauthorized parties to gain access to restricted company Web sites\u2014usually for the purpose of doing something illegal. Using a technique called \u201cspoofing,\u201d culprits disguise their identities by modifying the address of the computer from which the scheme has been launched. Typically, the point is to make it look as if an incoming message has originated from an authorized source. Then, once the site\u2019s been accessed, the perpetrator can commit fraud, spy, or destroy data. You could, for example, spoof a manufacturing firm with a false sales order that seems to have come from a legitimate customer. If the spoof goes undetected, the manufacturer will incur the costs of producing and delivering products that were never ordered (and will certainly never be paid for).<\/p>\n<p id=\"frank-ch15_s06_s01_s02_p02\" class=\"indent para editable block no-indent\">Every day, technically savvy thieves (and dishonest employees) steal large sums of money from companies by means of spoofing or some other computer scheme. It\u2019s difficult to estimate the dollar amount because many companies don\u2019t even know how much they\u2019ve lost.<\/p>\n<\/div>\n<\/div>\n<div class=\"section\" id=\"frank-ch15_s06_s02\">\n<h2 class=\"title editable block\">Revenue Theft<\/h2>\n<p id=\"frank-ch15_s06_s02_p01\" class=\"nonindent para editable block\">In addition to the problems of data security faced by every company that stores and transmits information electronically, companies that sell goods or provide services online are also vulnerable to activities that threaten their revenue sources. Two of the most important forms of computer crime are <em class=\"emphasis\">denial of service<\/em> and <em class=\"emphasis\">piracy<\/em>.<\/p>\n<div class=\"section\" id=\"frank-ch15_s06_s02_s01\">\n<h2 class=\"title editable block\">Denial of Service<\/h2>\n<p id=\"frank-ch15_s06_s02_s01_p01\" class=\"nonindent para editable block\">A denial-of-service attack does exactly what the term suggests: it prevents a Web server from servicing authorized users. Consider the following scenario. Dozens of computers are whirring away at an online bookmaker in the offshore gambling haven of Costa Rica. Suddenly a mass of blank incoming messages floods the company\u2019s computers, slowing operations to a trickle. No legitimate customers can get through to place their bets. A few hours later, the owner gets an e-mail that reads, \u201cIf you want your computers to stay up and running through the football season, wire $40,000 to each of 10 numbered bank accounts in Eastern Europe.\u201d<\/p>\n<p id=\"frank-ch15_s06_s02_s01_p02\" class=\"indent para editable block no-indent\">You\u2019re probably thinking that our choice of online gambling as an example of this scheme is a little odd, but we chose it because it\u2019s real: many companies in the online-gambling industry suffer hundreds of such attacks each year.<a class=\"footnote\" title=\"Baker, S., and Brian Grow, \u201cGambling Sites, This Is a Holdup,\u201d BusinessWeek Online, August 9, 2004, http:\/\/www.businessweek.com\/magazine\/content\/04_32\/b3895106_mz063.htm (accessed November 14, 2011).\" id=\"return-footnote-308-40\" href=\"#footnote-308-40\" aria-label=\"Footnote 40\"><sup class=\"footnote\">[40]<\/sup><\/a> Because most gambling operations opt to pay the ransom and get back to business as usual, denial of service to businesses in the industry has become a very lucrative enterprise.<\/p>\n<p id=\"frank-ch15_s06_s02_s01_p03\" class=\"indent para editable block no-indent\">Online gambling operations are good targets because they\u2019re illegal in the United States, where they can\u2019t get any help from law-enforcement authorities. But extortionists have been known to hit other targets, including Microsoft and the Recording Industry Association of America. The problem could become much more serious if they start going after e-commerce companies and others that depend on incoming orders to stay afloat.<\/p>\n<\/div>\n<div class=\"section\" id=\"frank-ch15_s06_s02_s02\">\n<h2 class=\"title editable block\">Piracy<\/h2>\n<p id=\"frank-ch15_s06_s02_s02_p01\" class=\"nonindent para editable block\">Technology makes it easier to create and sell intellectual property, but it also makes it easier to steal it. Because digital products can be downloaded and copied almost instantly over the Internet, it\u2019s a simple task to make perfect replicas of your favorite copyright-protected songs, movies, TV shows, and computer software, whether for personal use or further distribution. When you steal such materials, you\u2019re cheating the countless musicians, technicians, actors, programmers, and others involved in creating and selling them. Theft cuts into sales and shrinks corporate profits, often by staggering amounts. Entertainment-industry analysts estimate that $30 billion worth of songs were illegally downloaded in the five year period ending in 2009.<a class=\"footnote\" title=\"Recording Industry Association of America, \u201cFor Students Doing Reports,\u201d Recording Industry Association of America, http:\/\/www.riaa.com\/faq.php (accessed November 14, 2011).\" id=\"return-footnote-308-41\" href=\"#footnote-308-41\" aria-label=\"Footnote 41\"><sup class=\"footnote\">[41]<\/sup><\/a> The software industry estimates that the global market for pirated software reached $59 billion in 2010.<a class=\"footnote\" title=\"Epstein, Z., \u201cGlobal Market for Pirated Software Reaches $59 billion,\u201d BGR Innovation, http:\/\/www.bgr.com\/2011\/05\/12\/global-market-for-pirated-software-reaches-59-billion\/ (accessed November 14, 2011).\" id=\"return-footnote-308-42\" href=\"#footnote-308-42\" aria-label=\"Footnote 42\"><sup class=\"footnote\">[42]<\/sup><\/a><\/p>\n<p id=\"frank-ch15_s06_s02_s02_p02\" class=\"indent para editable block no-indent\">So, what\u2019s being done to protect the victimized companies? Actually, quite a lot, even though it\u2019s a daunting task, both in the United States and abroad.<a class=\"footnote\" title=\"AudioMicro, \u201cCan\u2019t Stop Piracy,\u201d AudioMicro, May 20, 2010, http:\/\/www.audiomicro.com\/royalty-free-music-blog\/2010\/05\/can%E2%80%99t-stop-piracy\/ (accessed November 14, 2011).\" id=\"return-footnote-308-43\" href=\"#footnote-308-43\" aria-label=\"Footnote 43\"><sup class=\"footnote\">[43]<\/sup><\/a> In 1998, Congress passed the Digital Millennium Copyright Act, which outlaws the copying of copyright-protected music (unless you\u2019re copying legally acquired music for your own use). The penalties are fairly stiff: up to three years in prison and $250,000 in fines.<a class=\"footnote\" title=\"Recording Industry Association of America, \u201cThe Law,\u201d Recording Industry Association of America, http:\/\/www.riaa.com\/physicalpiracy.php?content_selector=piracy_online_the_law (accessed November 14, 2011).\" id=\"return-footnote-308-44\" href=\"#footnote-308-44\" aria-label=\"Footnote 44\"><sup class=\"footnote\">[44]<\/sup><\/a><a class=\"footnote\" title=\"World Law Direct, \u201cIs Downloading Music Illegal?,\u201d World Law Direct, http:\/\/www.worldlawdirect.com\/article\/1395\/downloading-music-legal.html (accessed November 14, 2011).\" id=\"return-footnote-308-45\" href=\"#footnote-308-45\" aria-label=\"Footnote 45\"><sup class=\"footnote\">[45]<\/sup><\/a> To show that it means business, the music industry is also hauling offenders into court, but legal action is costly and prosecuting teenage music lovers doesn\u2019t accomplish much. Some observers believe that the best solution is for the industry to accelerate its own efforts to offer its products online.<a class=\"footnote\" title=\"Green, H., \u201cDigital Media: Don\u2019t Clamp Down Too Hard,\u201d BusinessWeek Online, October 14, 2002, http:\/\/www.businessweek.com\/magazine\/content\/02_41\/b3803121.htm (accessed November 14, 2011).\" id=\"return-footnote-308-46\" href=\"#footnote-308-46\" aria-label=\"Footnote 46\"><sup class=\"footnote\">[46]<\/sup><\/a> Initial attempts seem to be working: people who are willing to obey copyright laws have downloaded more than ten billion songs from the iTunes site alone.<a class=\"footnote\" title=\"Apple, \u201cApple\u2019s App Store Downloads Top 10 Billion,\u201d Apple, http:\/\/www.apple.com\/pr\/library\/2011\/01\/22Apples-App-Store-Downloads-Top-10-Billion.html (accessed November 14, 2011).\" id=\"return-footnote-308-47\" href=\"#footnote-308-47\" aria-label=\"Footnote 47\"><sup class=\"footnote\">[47]<\/sup><\/a><\/p>\n<div class=\"section\" id=\"frank-ch15_s06_s02_s02_s01\">\n<h2 class=\"title editable block\">Firewalls<\/h2>\n<p id=\"frank-ch15_s06_s02_s02_s01_p01\" class=\"nonindent para editable block\">Builders install firewalls (or fireproof walls) in structures to keep a fire that starts in one part of a building from entering another part. Companies do something similar to protect their computer systems from outside intruders: they install virtual <a class=\"glossary-term\" aria-haspopup=\"dialog\" aria-describedby=\"definition\" href=\"#term_308_1482\">firewalls<\/a>\u2014software and hardware systems that prevent unauthorized users from accessing their computer networks.<\/p>\n<p id=\"frank-ch15_s06_s02_s02_s01_p02\" class=\"indent para editable block no-indent\">You can think of the firewall as a gatekeeper that stands at the entry point of the company\u2019s network and monitors incoming and outgoing traffic. The firewall system inspects and screens all incoming messages to prevent unwanted intruders from entering the system and causing damage. It also regulates outgoing traffic to prevent employees from inappropriately sending out confidential data that shouldn\u2019t leave the organization.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"section\" id=\"frank-ch15_s06_s03\">\n<h2 class=\"title editable block\">Risks to Customers<\/h2>\n<p id=\"frank-ch15_s06_s03_p01\" class=\"nonindent para editable block\">Many people still regard the Internet as an unsafe place to do business. They worry about the security of credit-card information and passwords and the confidentiality of personal data. Are any of these concerns valid? Are you really running risks when you shop electronically? If so, what\u2019s being done to make the Internet a safer place to conduct transactions? Let\u2019s look a little more closely at the sort of things that tend to bother some Internet users (or, as the case may be, nonusers), as well as some of the steps that companies are taking to convince people that e-commerce is safe.<\/p>\n<div class=\"section\" id=\"frank-ch15_s06_s03_s01\">\n<h2 class=\"title editable block\">Credit-Card Theft<\/h2>\n<p id=\"frank-ch15_s06_s03_s01_p01\" class=\"nonindent para editable block\">One of the more serious barriers to the growth of e-commerce is the perception of many people that credit-card numbers can be stolen when they\u2019re given out over the Internet. Though virtually every company takes considerable precautions, they\u2019re not entirely wrong. Cyber criminals, unfortunately, seem to be tirelessly creative. One popular scheme involves setting up a fraudulent Internet business operation to collect credit-card information. The bogus company will take orders to deliver goods\u2014say, Mother\u2019s Day flowers\u2014but when the day arrives, it will have disappeared from cyberspace. No flowers will get delivered, but even worse, the perpetrator can sell or use all the collected credit-card information.<\/p>\n<\/div>\n<div class=\"section\" id=\"frank-ch15_s06_s03_s02\">\n<h2 class=\"title editable block\">Password Theft<\/h2>\n<p id=\"frank-ch15_s06_s03_s02_p01\" class=\"nonindent para editable block\">Many people also fear that Internet passwords\u2014which can be valuable information to cyber criminals\u2014are vulnerable to theft. Again, they\u2019re not altogether wrong. There are schemes dedicated entirely to stealing passwords. In one, the cyber thief sets up a Web site that you can access only if you register, provide an e-mail address, and select a password. The cyber criminal is betting that the site will attract a certain percentage of people who use the same password for just about everything\u2014ATM accounts, e-mail, employer networks. Having finagled a password, the thief can try accessing other accounts belonging to the victim. So, one day you have a nice cushion in your checking account, and the next you\u2019re dead broke.<\/p>\n<\/div>\n<div class=\"section\" id=\"frank-ch15_s06_s03_s03\">\n<h2 class=\"title editable block\">Invasion of Privacy<\/h2>\n<p id=\"frank-ch15_s06_s03_s03_p01\" class=\"nonindent para editable block\">If you apply for a life-insurance policy online, you may be asked to supply information about your health. If you apply for a mortgage online, you may be asked questions about your personal finances. Some people shy away from Internet transactions because they\u2019re afraid that such personal information can be stolen or shared with unauthorized parties. Once again, they\u2019re right: it does happen.<\/p>\n<div class=\"section\" id=\"frank-ch15_s06_s03_s03_s01\">\n<h2 class=\"title editable block\">How Do \u201cCookies\u201d Work?<\/h2>\n<p id=\"frank-ch15_s06_s03_s03_s01_p01\" class=\"nonindent para editable block\">In addition to data that you supply willingly, information about you can be gathered online without your knowledge or consent.<a class=\"footnote\" title=\"Reputation.com, \u201cAre Cookies Jeopardizing Your Online Privacy?,\u201d Reputation.com, http:\/\/www.reputation.com\/how_to\/are-cookies-jeopardizing-your-online-privacy\/ (accessed November 14, 2011).\" id=\"return-footnote-308-48\" href=\"#footnote-308-48\" aria-label=\"Footnote 48\"><sup class=\"footnote\">[48]<\/sup><\/a> Your online activities, for example, can be captured by something called a <em class=\"emphasis\">cookie<\/em>. The process is illustrated in <a class=\"xref\" href=\"#frank-ch15_s06_s03_s03_s01_f01\">Figure 15.11 \u201cHow Cookies Work\u201d<\/a>. When you access a certain Web site, it sends back a unique piece of information to your browser, which proceeds to save it on your hard drive. When you go back to the same site, your browser returns the information, telling the site who you are and confirming that you\u2019ve been there before. The problem is not that the cookie can identify you in the same way as a name or an address. It is, however, linked to other information about you\u2014such as the goods you\u2019ve bought or the services you\u2019ve ordered online. Before long, someone will have compiled a profile of your buying habits. The result? You\u2019ll soon be bombarded with advertisements targeted to your interests. For example, let\u2019s suppose you check out the Web site for an online diet program. You furnish some information but decide that the program is not for you. The next time you log on, you may be greeted by a pop-up pushing the latest miracle diet.<\/p>\n<div class=\"figure full editable block\" id=\"frank-ch15_s06_s03_s03_s01_f01\">\n<h3 class=\"nonindent title\"><span class=\"title-prefix\">Figure 15.11<\/span> How Cookies Work<\/h3>\n<p class=\"indent\"><a><br \/>\n<img decoding=\"async\" src=\"http:\/\/pressbooks.library.upei.ca\/smallbusinessmanagement\/wp-content\/uploads\/sites\/23\/2018\/12\/e78d14c2bcab42cc1ff79e651b63d462.jpg\" alt=\"How Cookies Work: 1) You get on the Web...; 2) ...and request information from a Web site.; 3) When the Web site server replies, it sends a cookie...; 4) ...which your computer puts on your hard drive.; 5) When you get online to return to the Web site...; 6) ...your computer sends the cookie back...; 7) ...where the Web site server identifies you and records data that can be shared with other online sellers.\" style=\"max-width: 497px\" \/><br \/>\n<\/a><\/p>\n<\/div>\n<p id=\"frank-ch15_s06_s03_s03_s01_p02\" class=\"indent para editable block no-indent\">Cookies aren\u2019t the only form of online espionage. Your own computer, for example, monitors your Internet activities and keeps track of the URLs that you access.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"section\" id=\"frank-ch15_s06_s04\">\n<h2 class=\"title editable block\">Shoring Up Security and Building Trust<\/h2>\n<p id=\"frank-ch15_s06_s04_p01\" class=\"nonindent para editable block\">So, what can companies do to ease concerns about the safety of Internet transactions? First, businesses must implement internal controls for ensuring adequate security and privacy. Then, they must reassure customers that they\u2019re competent to safeguard credit-card numbers, passwords, and other personal information. Among the most common controls and assurance techniques, let\u2019s look at <em class=\"emphasis\">encryption<\/em> and <em class=\"emphasis\">seals of assurance<\/em>.<\/p>\n<div class=\"section\" id=\"frank-ch15_s06_s04_s01\">\n<h2 class=\"title editable block\">Encryption<\/h2>\n<p id=\"frank-ch15_s06_s04_s01_p01\" class=\"nonindent para editable block\">The most effective method of ensuring that sensitive computer-stored information can\u2019t be accessed or altered by unauthorized parties is <span class=\"margin_term\"><a class=\"glossary-term\" aria-haspopup=\"dialog\" aria-describedby=\"definition\" href=\"#term_308_1483\">encryption<\/a>\u2014the process of encoding data so that only individuals (or computers) armed with a secret code (or key) can decode it. Here\u2019s a simplified example: You want to send a note to a friend on the other side of the classroom, but you don\u2019t want anyone else to know what it says. You and your friend could devise a code in which you substitute each letter in the message with the letter that\u2019s two places before it in the alphabet. So you write A as C and B as D and so on. Your friend can decode the message, but it\u2019ll look like nonsense to anyone else. This is an oversimplification of the process. In the real world, it\u2019s much more complicated: data are scrambled using a complex code, the key for unlocking it is an algorithm, and you need certain computer hardware to perform the encryption\/decryption process.<\/span><\/p>\n<div class=\"section\" id=\"frank-ch15_s06_s04_s01_s01\">\n<h2 class=\"title editable block\">Certificate Authorities<\/h2>\n<p id=\"frank-ch15_s06_s04_s01_s01_p01\" class=\"nonindent para editable block\">The most commonly used encryption system for transmitting data over the Internet is called <em class=\"emphasis\">secure sockets layer<\/em> (SSL). You can tell whether a Web site uses SSL if its URL begins with <em class=\"emphasis\">https<\/em> instead of <em class=\"emphasis\">http<\/em>. SSL also provides another important security measure: when you connect to a site that uses SSL (for example, your bank\u2019s site), your browser will ask the site to authenticate itself\u2014prove that it is who it says it is. You can be confident that the response is correct if it\u2019s verified by a <a class=\"glossary-term\" aria-haspopup=\"dialog\" aria-describedby=\"definition\" href=\"#term_308_1484\">certificate authority<\/a>\u2014a third-party (such as VeriSign) that verifies the identify of the responding computer and sends you a digital certificate of authenticity stating that it trusts the site.<\/p>\n<div class=\"bcc-box bcc-success\" id=\"frank-ch15_s06_s04_s01_s01_n01\">\n<h3 class=\"title\">Key Takeaways<\/h3>\n<ul id=\"frank-ch15_s06_s04_s01_s01_l01\" class=\"itemizedlist\">\n<li>\n<p class=\"nonindent para\">Though a source of vast opportunities, <strong class=\"emphasis bold\">e-commerce<\/strong>\u2014conducting business over the Internet\u2014also presents some unprecedented challenges, particularly in the area of security.<\/p>\n<ol id=\"frank-ch15_s06_s04_s01_s01_l02\" class=\"orderedlist\">\n<li><em class=\"emphasis\">Malicious programs<\/em>, such as viruses and worms, can wreak havoc with computer systems.<\/li>\n<li>Unauthorized parties may gain access to restricted company Web sites in order to steal funds or goods.<\/li>\n<li><strong class=\"emphasis bold\">Firewalls<\/strong>\u2014software and hardware systems that prevent unauthorized users from accessing computer networks\u2014help to reduce the risks of doing business online.<\/li>\n<\/ol>\n<\/li>\n<li>\n<p class=\"nonindent para\">Companies that do business online are also vulnerable to illegal activities.<\/p>\n<ol id=\"frank-ch15_s06_s04_s01_s01_l03\" class=\"orderedlist\">\n<li>A <em class=\"emphasis\">denial-of-service attack<\/em>, for example, prevents a Web server from servicing authorized users; the culprit demands a ransom to stop the attack.<\/li>\n<li>Companies that use the Internet to create and sell intellectual property (such as songs, movies, and software) face the problem of <em class=\"emphasis\">piracy<\/em>.<\/li>\n<li>The theft of digital products, which can be downloaded and copied almost instantly over the Internet, not only cheats the individuals and organizations that create them, but also reduces sales and shrinks corporate profits.<\/li>\n<\/ol>\n<\/li>\n<li>Finally, online businesses must convince consumers that it\u2019s safe to buy things over the Internet\u2014that credit-card numbers, passwords, and other personal information are protected from theft.<\/li>\n<li>\n<p class=\"nonindent para\">One effective method for protecting computer-stored information is <strong class=\"emphasis bold\">encryption<\/strong>\u2014the process of encoding data so that only individuals (or computers) armed with a secret code (or key) can decode it.<\/p>\n<ol id=\"frank-ch15_s06_s04_s01_s01_l04\" class=\"orderedlist\">\n<li>A commonly used encryption scheme is a <em class=\"emphasis\">secure sockets layer<\/em> (SSL), which directs the user\u2019s browser to ask a site to authenticate itself.<\/li>\n<li>Often, the user receives a digital certificate of authenticity, verifying that a third-party security provider called a <strong class=\"emphasis bold\">certificate authority<\/strong> has identified a computer.<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n<\/div>\n<div class=\"bcc-box bcc-info\" id=\"frank-ch15_s06_s04_s01_s01_n02\">\n<h3 class=\"title\">Exercise<\/h3>\n<p class=\"nonindent simpara\">(AACSB) Reflective Skills<\/p>\n<p id=\"frank-ch15_s06_s04_s01_s01_p02\" class=\"indent para\">Are you, or is someone you know, hesitant to buy things over the Internet? What risks concern you? What are companies doing to ease consumers\u2019 concerns about the safety of Internet transactions?<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"chapter standard\" id=\"slug-15-7-careers-in-information-management\">\n<div class=\"chapter-title-wrap\">\n<h1 class=\"chapter-title\" style=\"text-align: center\">Careers in Information Management<\/h1>\n<\/div>\n<div class=\"ugc chapter-ugc\">\n<div class=\"bcc-box bcc-highlight\" id=\"frank-ch15_s07_n01\">\n<h3 class=\"title\">Learning Objective<\/h3>\n<ol id=\"frank-ch15_s07_l01\" class=\"orderedlist\">\n<li>Identify career opportunities in information management.<\/li>\n<\/ol>\n<\/div>\n<p id=\"frank-ch15_s07_p01\" class=\"nonindent para editable block\">The number and variety of opportunities in the IS field have grown substantially as organizations have expanded their use of IT. In most large organizations, the senior management team includes a <em class=\"emphasis\">chief information officer (CIO)<\/em> who oversees information and telecommunications systems. A large organization might also have a <em class=\"emphasis\">chief technology officer<\/em> who reports to the CIO and oversees IT planning and implementation.<\/p>\n<p id=\"frank-ch15_s07_p02\" class=\"indent para editable block no-indent\">Most entry-level IS jobs require a business degree with a major in information systems. Many people supplement their IS majors with minors in computer science or some other business area, such as accounting, finance, marketing, or operations management.<\/p>\n<p id=\"frank-ch15_s07_p03\" class=\"indent para editable block no-indent\">If you\u2019re starting out with an IS degree, you may choose to follow either a management path or a technical path. At Kraft Foods, for example, IS professionals can focus on one of two areas: applications development (a management focus) and information technology (a technology focus). \u201cApplications development,\u201d according to the company itself, \u201ccalls for an ability to analyze [Kraft\u2019s] clients\u2019 needs and translate them into systems applications. Information technology calls for the ability to convert business systems specifications into technical specifications and to provide guidance and technical counsel to other Kraft professionals\u201d.<a class=\"footnote\" title=\"Kraft Foods, \u201cCareers at Kraft: Information Systems,\u201d Kraft Foods, http:\/\/www.kraftfoods.com\/careers\/careers\/systems.htm (accessed June 2, 2006).\" id=\"return-footnote-308-49\" href=\"#footnote-308-49\" aria-label=\"Footnote 49\"><sup class=\"footnote\">[49]<\/sup><\/a> Despite the differences in focus, Kraft encourages IS specialists to develop expertise in both areas. After all, it\u2019s the ability to apply technical knowledge to business situations that makes IS professionals particularly valuable to organizations. (By the way, if you want a career in casinos, you can major in casino management at a number of business schools.)<\/p>\n<div class=\"bcc-box bcc-success\" id=\"frank-ch15_s07_n02\">\n<h3 class=\"title\">Key Takeaways<\/h3>\n<ul id=\"frank-ch15_s07_l02\" class=\"itemizedlist\">\n<li>The number and variety of opportunities in the information systems (IS) field have grown substantially as companies have expanded their use of information technology.<\/li>\n<li>The senior management team in large organizations includes a chief information officer who oversees information and a chief technology officer who oversees IT planning and implementation.<\/li>\n<li>Most entry-level IS jobs require a business degree with a major in information systems.<\/li>\n<li>Many supplement their IS majors with computer science or some other business area, such as accounting, finance, marketing, or operations management.<\/li>\n<li>Those entering organizations with IS degrees may choose to follow either a management or a technology path.<\/li>\n<\/ul>\n<\/div>\n<div class=\"bcc-box bcc-info\" id=\"frank-ch15_s07_n03\">\n<h3 class=\"title\">Exercise<\/h3>\n<p class=\"nonindent simpara\">(AACSB) Reflective Skills<\/p>\n<p id=\"frank-ch15_s07_p04\" class=\"indent para\">Why is studying IT important to you as a student? How will competency in this area help you get and keep a job in the future?<\/p>\n<\/div>\n<div class=\"chapter standard\" id=\"slug-15-8-cases-and-problems\">\n<div class=\"chapter-title-wrap\">\n<h1 class=\"chapter-title\" style=\"text-align: center\">Cases and Problems<\/h1>\n<\/div>\n<div class=\"ugc chapter-ugc\">\n<div class=\"bcc-box bcc-info\" id=\"frank-ch15_s08_n01\">\n<h3 class=\"title\">Learning on the Web<\/h3>\n<p id=\"frank-ch15_s08_p01\" class=\"nonindent para\"><strong class=\"emphasis bold\">Taking Care of Your Cyber Health<\/strong><\/p>\n<p id=\"frank-ch15_s08_p02\" class=\"indent para\">It seems that some people have nothing better to do than wreak havoc by spreading computer viruses, and as a computer user, you should know how to protect yourself from malicious tampering. One place to start is by reading the article \u201cHow Computer Viruses Work,\u201d by Marshall Brain, which you can access by going to the How Stuff Works Web site (<a class=\"link\" href=\"http:\/\/computer.howstuffworks.com\/virus.htm\">http:\/\/computer.howstuffworks.com\/virus.htm<\/a>). After reading the article, answer the following questions:<\/p>\n<ol id=\"frank-ch15_s08_l01\" class=\"orderedlist\">\n<li>Why do people create viruses?<\/li>\n<li>What can you do to protect yourself against viruses?<\/li>\n<\/ol>\n<\/div>\n<div class=\"bcc-box bcc-info\" id=\"frank-ch15_s08_n02\">\n<h3 class=\"title\">Career Opportunities<\/h3>\n<p id=\"frank-ch15_s08_p03\" class=\"nonindent para\"><strong class=\"emphasis bold\">Could You Manage a Job in IT or IS?<\/strong><\/p>\n<p id=\"frank-ch15_s08_p04\" class=\"indent para\">Do you have an aptitude for dealing with IT? Would you enjoy analyzing the information needs of an organization? Are you interested in directing a company\u2019s Internet operations or overseeing network security? If you answered yes to any of these questions, then a career in IT and IS might be for you. Go to the U.S. Department of Labor Web site (<a class=\"link\" href=\"http:\/\/www.bls.gov\/oco\/ocos258.htm\">http:\/\/www.bls.gov\/oco\/ocos258.htm<\/a>) and learn more about the nature of the work, qualifications, and job outlook in IT and IS management. Bearing in mind that many people who enter the IT field attain middle-management positions, look for answers to the following questions:<\/p>\n<ol id=\"frank-ch15_s08_l02\" class=\"orderedlist\">\n<li>What kinds of jobs do IT managers perform?<\/li>\n<li>What educational background, work experience, and skills are needed for positions in IT management?<\/li>\n<li>What\u2019s the current job outlook for IS and IT managers? What factors drive employment opportunities?<\/li>\n<li>What\u2019s the median annual income of a mid-level IT manager?<\/li>\n<\/ol>\n<\/div>\n<div class=\"bcc-box bcc-info\" id=\"frank-ch15_s08_n03\">\n<h3 class=\"title\">Ethics Angle (AACSB)<\/h3>\n<p id=\"frank-ch15_s08_p05\" class=\"nonindent para\"><strong class=\"emphasis bold\">Campus Commando or Common Criminal?<\/strong><\/p>\n<p id=\"frank-ch15_s08_p06\" class=\"indent para\">Do you want to be popular (or at least more prominent) on campus? You could set up a Web site that lets fellow students share music files over the campus network. All you have to do is seed the site with some of your own downloaded music and let the swapping begin. That\u2019s exactly what Daniel Peng did when he was a sophomore at Princeton. It was a good idea, except for one small hitch: it was illegal, and he got caught. Unimpressed with Peng\u2019s technological ingenuity, the Recording Industry Association of America (RIAA) sued him, and he was forced to settle for $15,000. Instead of delivering music, Peng\u2019s Web site now asks visitors to send money to help defray the $15,000 and another $8,000 in legal costs.<\/p>\n<p id=\"frank-ch15_s08_p07\" class=\"indent para\">To learn more about the case, read these articles from the Daily Princetonian: \u201cPeng, RIAA Settle Infringement Case\u201d (<a class=\"link\" target=\"_blank\" href=\"http:\/\/www.dailyprincetonian.com\/2003\/05\/02\/8154\" rel=\"noopener noreferrer\">http:\/\/www.dailyprincetonian.com\/2003\/05\/02\/8154\/<\/a>), and \u201cPeng \u201905 Sued by Recording Industry for \u2018Wake\u2019 Site\u201d (<a class=\"link\" target=\"_blank\" href=\"http:\/\/www.dailyprincetonian.com\/2003\/04\/04\/7791\" rel=\"noopener noreferrer\">http:\/\/www.dailyprincetonian.com\/2003\/04\/04\/7791<\/a>).<\/p>\n<p class=\"indent para\">After researching the topic, answer the following questions:<\/p>\n<ol id=\"frank-ch15_s08_l03\" class=\"orderedlist\">\n<li>The practice of sharing commercial music files is illegal. Do you think that it\u2019s also unethical? Why, or why not?<\/li>\n<li>What steps to curb the practice are being taken by the music industry? By college administrators? By the government? Do you approve of these steps? Have they been effective?<\/li>\n<li>What, ultimately, do you see as the solution to the problem?<\/li>\n<\/ol>\n<p class=\"indent para\">Source: Josh Brodie, \u201cPeng, RIAA Settle Infringement Case,\u201d <em class=\"emphasis\">The Daily Princetonian<\/em>, <a class=\"link\" target=\"_blank\" href=\"http:\/\/www.dailyprincetonian.com\/2003\/05\/02\/8154\" rel=\"noopener noreferrer\">http:\/\/www.dailyprincetonian.com\/2003\/05\/02\/8154\/<\/a> (accessed November 14, 2011); Zachary Goldfarb and Josh Brodie, \u201cPeng \u201905 Sued by Recording Industry for \u2018Wake\u2019 Site,\u201d <em class=\"emphasis\">The Daily Princetonian<\/em><a class=\"link\" target=\"_blank\" href=\"http:\/\/www.dailyprincetonian.com\/2003\/04\/04\/7791\" rel=\"noopener noreferrer\">http:\/\/www.dailyprincetonian.com\/2003\/04\/04\/7791\/<\/a> (accessed November 14, 2011).<\/p>\n<\/div>\n<div class=\"bcc-box bcc-info\" id=\"frank-ch15_s08_n04\">\n<h3 class=\"title\">Team-Building Skills (AACSB)<\/h3>\n<p id=\"frank-ch15_s08_p08\" class=\"nonindent para\"><strong class=\"emphasis bold\">CampusCupid.com<\/strong><\/p>\n<p id=\"frank-ch15_s08_p09\" class=\"indent para\">It\u2019s no secret that college can be fun. For one thing, you get to hang around with a bunch of people your own age. Occasionally, you want to spend time with just one special someone, but finding that special person on a busy campus can take some of the fun out of matriculating. Fortunately, you\u2019re in the same love boat with a lot of other people, so one possible solution\u2014one that meshes nicely with your desire to go into business\u2014is to start an online dating service that caters to your school. Inasmuch as online dating is nothing new, you can do some preliminary research. For example, go to the Internetnews Web site (<a class=\"link\" target=\"_blank\" href=\"http:\/\/www.internetnews.com\/ec-news\/article.php\/2228891\/Online+Personals+Big+Profits+Intense+Competition.htm\" rel=\"noopener noreferrer\">http:\/\/www.internetnews.com\/ec-news\/article.php\/2228891\/Online+Personals+Big+Profits+Intense+Competition.htm<\/a>) and read the article \u201cOnline Personals: Big Profits, Intense Competition.\u201d<\/p>\n<p id=\"frank-ch15_s08_p10\" class=\"indent para\">Next, you and several of your classmates should work as a team to create a business model for an online dating service at your school. After working out the details, submit a group report that covers the following issues:<\/p>\n<p class=\"indent\">1. <em class=\"emphasis\">Services<\/em>. How will you earn revenues? What services will you offer? How will you price these services? What forms of payment will you accept? Will you sell ads? If so, what kinds?<br \/>\n2. <em class=\"emphasis\">Appearance<\/em>. What will your site look like? Will it have graphics? Sound? Video? What will your domain name be? What information will you collect from customers? What information will you provide to visitors?<\/p>\n<p class=\"indent para\">3. <em class=\"emphasis\">Operations<\/em>. What criteria will you use to match customers? How will your customers interface with the Web site? How will they connect with each other? Will you design your own software or buy or lease it from vendors? Before you answer, go to these vendors\u2019 Web sites and check out their dating software:<\/p>\n<ul id=\"frank-ch15_s08_l05\" class=\"itemizedlist\">\n<li>WebDate (<a class=\"link\" href=\"http:\/\/www.webscribble.com\/products\/webdate\/index.shtml\">http:\/\/www.webscribble.com\/products\/webdate\/index.shtml<\/a>)<\/li>\n<li>PG Dating (<a class=\"link\" href=\"http:\/\/www.datingpro.com\/dating\">http:\/\/www.datingpro.com\/dating<\/a>)<\/li>\n<\/ul>\n<p class=\"indent\">4. <em class=\"emphasis\">Attracting Customers<\/em>. How will you attract customers to the site? How will you monitor and analyze site activity?<br \/>\n5. <em class=\"emphasis\">Security<\/em>. How will you guarantee confidentiality? How will you ensure that your site is secure? How will you limit access to students at your school?<br \/>\n6. <em class=\"emphasis\">Opportunities and Challenges<\/em>. What opportunities do e-businesses offer? What challenges do they create? How would your business model change if you decided to run it as a traditional business rather than as an e-business?<\/p>\n<\/div>\n<div class=\"bcc-box bcc-info\" id=\"frank-ch15_s08_n05\">\n<h3 class=\"title\">The Global View (AACSB)<\/h3>\n<p id=\"frank-ch15_s08_p11\" class=\"nonindent para\"><strong class=\"emphasis bold\">\u201cHong Kong\u2014Traditional Chinese\u201d<\/strong><\/p>\n<p id=\"frank-ch15_s08_p12\" class=\"indent para\">Hewlett-Packard (HP) provides technology solutions to individuals, businesses, and institutions around the world. It generates annual revenues of $80 billion from the sale of IT products, including computers, printers, copiers, digital photography, and software. Anyone in the United States who wants to buy an HP product, get technical support, download software, learn about the company, or apply for a job can simply go to the HP Web site. But what if you live in Hong Kong? How would you get answers to your questions? You\u2019d do the same thing as people in this country do\u2014go to HP\u2019s Web site.<\/p>\n<p id=\"frank-ch15_s08_p13\" class=\"indent para\">Try to imagine, however, the complex process of developing and maintaining a Web site that serves the needs of customers in more than seventy countries. To get a better idea, go to the HP Web site (<a class=\"link\" href=\"http:\/\/www.hp.com\">http:\/\/www.hp.com<\/a>). Start by looking at HP\u2019s line of notebooks and checking its prices. Then, review the company information (click on \u201cAbout HP\u201d in the bottom right) that\u2019s posted on the site, and, finally, look for a job\u2014it\u2019s good practice (click on \u201cJobs\u201d in the bottom right).<\/p>\n<p id=\"frank-ch15_s08_p14\" class=\"indent para\">Now pretend that you live in Hong Kong and repeat the process. Start by going to the same HP Web site (<a class=\"link\" href=\"http:\/\/www.hp.com\">http:\/\/www.hp.com<\/a>). Click on the United States (next to U.S. flag in the bottom left) and then Asia and Oceania. If you can read Chinese, click on \u201cHong Kong\u2014Traditional Chinese.\u201d Otherwise, click on \u201cHong Kong\u2014English.\u201d Then, answer the following questions:<\/p>\n<ol id=\"frank-ch15_s08_l06\" class=\"orderedlist\">\n<li>How easy was it to navigate the site and to switch back and forth between the U.S. and Hong Kong sections of the site?<\/li>\n<li>Identify at least five differences between the two sections.<\/li>\n<li>Does HP\u2019s Web site meet the needs of customers in both the United States and Hong Kong? Why, or why not? How could it be improved?<\/li>\n<\/ol>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<hr class=\"before-footnotes clear\" \/><div class=\"footnotes\"><ol><li id=\"footnote-308-1\">Kilby, J., Jim Fox, and Anthony F. Lucas, Casino Operations and Management, 2nd ed. (Hoboken, NJ: John Wiley &amp; Sons, 2005), 183\u201384. <a href=\"#return-footnote-308-1\" class=\"return-footnote\" aria-label=\"Return to footnote 1\">&crarr;<\/a><\/li><li id=\"footnote-308-2\">LeVinson, M., \u201cJackpot! Harrah\u2019s Big Payoff Came from Using IT to Manage Customer Information,\u201d CIO Magazine, February 1, 2001, <a target=\"_blank\" href=\"http:\/\/www.cio.com\/archive\/020101\/harrah.html\" rel=\"noopener noreferrer\">http:\/\/www.cio.com\/archive\/020101\/harrah.html<\/a> (accessed June 2, 2006). <a href=\"#return-footnote-308-2\" class=\"return-footnote\" aria-label=\"Return to footnote 2\">&crarr;<\/a><\/li><li id=\"footnote-308-3\">Global Supply Chain Management Forum, \u201cHarrah\u2019s Entertainment Inc.: Real-Time CRM in a Service Supply Chain,\u201d Global Supply Chain Management Forum, Stanford Graduate School of Business, http:\/\/www.gsb.stanford.edu\/scforum\/login\/pdfs\/Harrah.pdf (accessed November 14, 2011). <a href=\"#return-footnote-308-3\" class=\"return-footnote\" aria-label=\"Return to footnote 3\">&crarr;<\/a><\/li><li id=\"footnote-308-4\">Koch, C., \u201cThe ABCs of ERP,\u201d CIO.com, http:\/\/wikifab.dimf.etsii.upm.es\/wikifab\/images\/d\/da\/The_ABCs_of_ERP.pdf (accessed November 14, 2011). <a href=\"#return-footnote-308-4\" class=\"return-footnote\" aria-label=\"Return to footnote 4\">&crarr;<\/a><\/li><li id=\"footnote-308-5\">Caesars, \u201cTotal Rewards,\u201d https:\/\/www.totalrewards.com\/TotalRewards\/RewardsAndBenefits.do?page=overview (accessed November 14, 2011). <a href=\"#return-footnote-308-5\" class=\"return-footnote\" aria-label=\"Return to footnote 5\">&crarr;<\/a><\/li><li id=\"footnote-308-6\">Shook, R. L., Jackpot! Harrah\u2019s Winning Secrets for Customer Loyalty (Hoboken, NJ: John Wiley &amp; Sons, 2003), 228\u201329. <a href=\"#return-footnote-308-6\" class=\"return-footnote\" aria-label=\"Return to footnote 6\">&crarr;<\/a><\/li><li id=\"footnote-308-7\">zhouxuan12345678 \u2013 <a href=\"https:\/\/www.flickr.com\/photos\/andrewbain\/3899715321\">Caesar\u2019s Palace, Las Vegas<\/a> \u2013 CC BY-SA 2.0. <a href=\"#return-footnote-308-7\" class=\"return-footnote\" aria-label=\"Return to footnote 7\">&crarr;<\/a><\/li><li id=\"footnote-308-8\">Loveman, G., \u201cDiamonds in the Data Mine,\u201d Harvard Business Review, May 2003, 3. <a href=\"#return-footnote-308-8\" class=\"return-footnote\" aria-label=\"Return to footnote 8\">&crarr;<\/a><\/li><li id=\"footnote-308-9\">Dunn, D., \u201cClient-Tracking System Helps Harrah\u2019s Tailor Sales Efforts for Frequent Visitors,\u201d Information Week, November 4, 2003, http:\/\/www.informationweek.com\/story\/showArticle.jhtml?articleID=16000115 (accessed June 2, 2006). <a href=\"#return-footnote-308-9\" class=\"return-footnote\" aria-label=\"Return to footnote 9\">&crarr;<\/a><\/li><li id=\"footnote-308-10\">Dunn, D., \u201cPersonal Touch For VIPs,\u201d Information Week, November 4, 2003, http:\/\/www.informationweek.com\/news\/16000115 (accessed November 14, 2011). <a href=\"#return-footnote-308-10\" class=\"return-footnote\" aria-label=\"Return to footnote 10\">&crarr;<\/a><\/li><li id=\"footnote-308-11\">Shook, R. L., Jackpot! Harrah\u2019s Winning Secrets for Customer Loyalty (Hoboken, NJ: John Wiley &amp; Sons, 2003), 248\u201352. <a href=\"#return-footnote-308-11\" class=\"return-footnote\" aria-label=\"Return to footnote 11\">&crarr;<\/a><\/li><li id=\"footnote-308-12\">Webopedia, \u201cDecision Support System,\u201d Webopedia, http:\/\/www.webopedia.com\/TERM\/D\/decision_support_system.html (accessed November 14, 2011). <a href=\"#return-footnote-308-12\" class=\"return-footnote\" aria-label=\"Return to footnote 12\">&crarr;<\/a><\/li><li id=\"footnote-308-13\">Webopedia, \u201cArtificial Intelligence,\u201d Webopedia, http:\/\/www.webopedia.com\/TERM\/A\/artificial_intelligence.html (accessed November 14, 2011). <a href=\"#return-footnote-308-13\" class=\"return-footnote\" aria-label=\"Return to footnote 13\">&crarr;<\/a><\/li><li id=\"footnote-308-14\">Webopedia, \u201cDecision Support System,\u201d Webopedia, <a href=\"http:\/\/www.webopedia.com\/TERM\/D\/decision_support_system.html\">http:\/\/www.webopedia.com\/TERM\/D\/decision_support_system.html<\/a> (accessed November 14, 2011). <a href=\"#return-footnote-308-14\" class=\"return-footnote\" aria-label=\"Return to footnote 14\">&crarr;<\/a><\/li><li id=\"footnote-308-15\">Goff, J., \u201cHead Games: Businesses Deploying Analytical Software to Get a Better Fix on Customer Behavior,\u201d CFO Magazine for Senior Financial Executives 20:9, July 1, 2004, http:\/\/www.cfo.com\/article.cfm\/3014815 (accessed November 14, 2011). <a href=\"#return-footnote-308-15\" class=\"return-footnote\" aria-label=\"Return to footnote 15\">&crarr;<\/a><\/li><li id=\"footnote-308-16\">Duffy, D., \u201cTechnology\u2019s Winning Hand,\u201d CSO.online, October 1, 2003, http:\/\/www.csoonline.com\/article\/218574\/catching-casino-cheats-technology-s-winning-hand (accessed November 14, 2011). <a href=\"#return-footnote-308-16\" class=\"return-footnote\" aria-label=\"Return to footnote 16\">&crarr;<\/a><\/li><li id=\"footnote-308-17\">Gallagher, L. B., and Sean Gallagher, \u201cNORA and ANNA: Non-Obvious Relationship Awareness,\u201d Baseline, April 4, 2004, http:\/\/www.baselinemag.com\/c\/a\/Past-News\/NORA-and-ANNA\/ (accessed November 14, 2011). <a href=\"#return-footnote-308-17\" class=\"return-footnote\" aria-label=\"Return to footnote 17\">&crarr;<\/a><\/li><li id=\"footnote-308-18\">Dictionary.com, \u201cCloud,\u201d Dictionary.com, http:\/\/dictionary.reference.com\/browse\/cloud (accessed November 15, 2011). <a href=\"#return-footnote-308-18\" class=\"return-footnote\" aria-label=\"Return to footnote 18\">&crarr;<\/a><\/li><li id=\"footnote-308-19\">Pinola, M., \u201cWhat Is Cloud Computing?,\u201d About.com, http:\/\/mobileoffice.about.com\/od\/workingontheroad\/f\/cloudcomputing.htm (accessed November 15, 2011). <a href=\"#return-footnote-308-19\" class=\"return-footnote\" aria-label=\"Return to footnote 19\">&crarr;<\/a><\/li><li id=\"footnote-308-20\">Gil, P., \u201cWhat Is Cloud Computing?,\u201d About.com, http:\/\/netforbeginners.about.com\/od\/c\/f\/cloudcomputing.htm (accessed November 15, 2011). <a href=\"#return-footnote-308-20\" class=\"return-footnote\" aria-label=\"Return to footnote 20\">&crarr;<\/a><\/li><li id=\"footnote-308-21\">Thrive Networks, \u201cSoftware as a Service\/ Infrastructure as a Service,\u201d Thrive Networks, March 2009, http:\/\/www.thrivenetworks.com\/resources\/march-2009-software-as-a-service.html (accessed November 15, 2011). <a href=\"#return-footnote-308-21\" class=\"return-footnote\" aria-label=\"Return to footnote 21\">&crarr;<\/a><\/li><li id=\"footnote-308-22\">Best Price Computers, \u201cInfrastructure as a Service,\u201d Best Price Computers, http:\/\/www.bestpricecomputers.co.uk\/glossary\/infrastructure-as-a-service.htm (accessed November 15, 2011). <a href=\"#return-footnote-308-22\" class=\"return-footnote\" aria-label=\"Return to footnote 22\">&crarr;<\/a><\/li><li id=\"footnote-308-23\">Eve, J., \u201cCloud Computing as a Security Asset,\u201d Indian Gaming, www.indiangaming.com\/istore\/Apr11_JosephEve.pdf (accessed November 16, 2011), 60-61. <a href=\"#return-footnote-308-23\" class=\"return-footnote\" aria-label=\"Return to footnote 23\">&crarr;<\/a><\/li><li id=\"footnote-308-24\">Lohr, S., \u201cAmazon\u2019s Trouble Raises Cloud Computing Doubts,\u201d The New York Times, April 22, 2011, http:\/\/www.nytimes.com\/2011\/04\/23\/technology\/23cloud.html?_r=1 (accessed November 16, 2011). <a href=\"#return-footnote-308-24\" class=\"return-footnote\" aria-label=\"Return to footnote 24\">&crarr;<\/a><\/li><li id=\"footnote-308-25\">Salesforce.com, \u201cCaesars Entertainment Hits the Efficiency Jackpot with Force.com,\u201d Salesforce.com, http:\/\/www.salesforce.com\/showcase\/stories\/caesars.jsp (accessed November 16, 2011). <a href=\"#return-footnote-308-25\" class=\"return-footnote\" aria-label=\"Return to footnote 25\">&crarr;<\/a><\/li><li id=\"footnote-308-26\">Webopedia, \u201cThe Difference Between the Internet and the World Wide Web,\u201d Webopedia, http:\/\/www.webopedia.com\/DidYouKnow\/Internet\/2002\/Web_vs_Internet.asp (accessed November 14, 2011) <a href=\"#return-footnote-308-26\" class=\"return-footnote\" aria-label=\"Return to footnote 26\">&crarr;<\/a><\/li><li id=\"footnote-308-27\">Griffiths, R. T., \u201cChapter Two: The World Wide Web (WWW),\u201d The History of the Internet, http:\/\/www.let.leidenuniv.nl\/history\/ivh\/chap2.htm (accessed November 14, 2011). <a href=\"#return-footnote-308-27\" class=\"return-footnote\" aria-label=\"Return to footnote 27\">&crarr;<\/a><\/li><li id=\"footnote-308-28\">Internet World Stats, \u201cTop 20 Countries with the Highest Number of Internet Users,\u201d Internet World Stats, June 30, 2011, http:\/\/www.internetworldstats.com\/top20.htm (accessed November 14, 2011). <a href=\"#return-footnote-308-28\" class=\"return-footnote\" aria-label=\"Return to footnote 28\">&crarr;<\/a><\/li><li id=\"footnote-308-29\">Kessler, S., \u201cStudy: 80 Percent of Children under 5 Use Internet Weekly,\u201d Mashable, March 15, 2011, http:\/\/content.usatoday.com\/communities\/technologylive\/post\/2011\/03\/study-80-percent-of-children-under-5-use-internet-weekly\/1 (accessed November 14, 2011). <a href=\"#return-footnote-308-29\" class=\"return-footnote\" aria-label=\"Return to footnote 29\">&crarr;<\/a><\/li><li id=\"footnote-308-30\">Wikipedia, \u201cWorld Wide Web,\u201d Wikipedia, http:\/\/en.wikipedia.org\/wiki\/World_Wide_Web (accessed November 14, 2011). <a href=\"#return-footnote-308-30\" class=\"return-footnote\" aria-label=\"Return to footnote 30\">&crarr;<\/a><\/li><li id=\"footnote-308-31\">Marketing Charts, March 15, 2011, http:\/\/www.marketingcharts.com\/direct\/less-than-half-of-small-biz-have-sites-16575\/, (accessed November 14, 2011). <a href=\"#return-footnote-308-31\" class=\"return-footnote\" aria-label=\"Return to footnote 31\">&crarr;<\/a><\/li><li id=\"footnote-308-32\">Cambell, A., \u201cOver 70% of the Largest Small Businesses Have a Website\u201d, Selling to Small Businesses, http:\/\/www.sellingtosmallbusinesses.com\/70-percent-largest-small-businesses-have-website\/ (accessed November 14, 2011). <a href=\"#return-footnote-308-32\" class=\"return-footnote\" aria-label=\"Return to footnote 32\">&crarr;<\/a><\/li><li id=\"footnote-308-33\">Sisario, B., \u201cDigital Music Leads Boost in Record Sales,\u201d The New York Times, July 6, 2011, http:\/\/artsbeat.blogs.nytimes.com\/2011\/07\/06\/digital-music-leads-boost-in-record-sales\/ (accessed November 14, 2011). <a href=\"#return-footnote-308-33\" class=\"return-footnote\" aria-label=\"Return to footnote 33\">&crarr;<\/a><\/li><li id=\"footnote-308-34\">Phillips, M., \u201cDigital Music Services Hit First Major Milestone as Downloads Outsell Physical Formats for the First Time,\u201d Head-Fi, September 2, 2004, http:\/\/www.head-fi.org\/t\/59174\/legal-downloads-outselling-other-formats (accessed November 14, 2011). <a href=\"#return-footnote-308-34\" class=\"return-footnote\" aria-label=\"Return to footnote 34\">&crarr;<\/a><\/li><li id=\"footnote-308-35\">Research at Penn, \u201cCan E-Tailers Find Fulfillment with Drop Shipping?\u201d Research at Penn, http:\/\/www.upenn.edu\/researchatpenn\/article.php?21&amp;bus (accessed November 14, 2011). <a href=\"#return-footnote-308-35\" class=\"return-footnote\" aria-label=\"Return to footnote 35\">&crarr;<\/a><\/li><li id=\"footnote-308-36\">Alexander, S., \u201cFeds Take Up Arms as Computer Crime Becomes Multibillion-Dollar Problem,\u201d Minneapolis Star Tribune, Computer Crime Research Center, http:\/\/www.crime-research.org\/news\/2003\/10\/Mess0601.html (accessed November 14, 2011). <a href=\"#return-footnote-308-36\" class=\"return-footnote\" aria-label=\"Return to footnote 36\">&crarr;<\/a><\/li><li id=\"footnote-308-37\">Ponemon Institute, \u201cFirst Annual Cost of Cyber Crime Study: Benchmark Study of U.S. Companies,\u201d Ponemon Institute, July 2010, http:\/\/www.riskandinsurancechalkboard.com\/uploads\/file\/Ponemon%20Study%281%29.pdf (accessed November 14, 2011). <a href=\"#return-footnote-308-37\" class=\"return-footnote\" aria-label=\"Return to footnote 37\">&crarr;<\/a><\/li><li id=\"footnote-308-38\">Shukovsky, P., \u201cBlaster Worm Attacker Gets 18 Months,\u201d Seattle Post-Intelligencer, http:\/\/www.seattlepi.com\/local\/article\/Blaster-worm-attacker-gets-18-months-1165231.php (accessed November 14, 2011). <a href=\"#return-footnote-308-38\" class=\"return-footnote\" aria-label=\"Return to footnote 38\">&crarr;<\/a><\/li><li id=\"footnote-308-39\">Alexander, S., \u201cFeds Take Up Arms as Computer Crime Becomes Multibillion-Dollar Problem,\u201d Minneapolis Star Tribune, Computer Crime Research Center, http:\/\/www.crime-research.org\/news\/2003\/10\/Mess0601.html (accessed November 14, 2011). <a href=\"#return-footnote-308-39\" class=\"return-footnote\" aria-label=\"Return to footnote 39\">&crarr;<\/a><\/li><li id=\"footnote-308-40\">Baker, S., and Brian Grow, \u201cGambling Sites, This Is a Holdup,\u201d BusinessWeek Online, August 9, 2004, http:\/\/www.businessweek.com\/magazine\/content\/04_32\/b3895106_mz063.htm (accessed November 14, 2011). <a href=\"#return-footnote-308-40\" class=\"return-footnote\" aria-label=\"Return to footnote 40\">&crarr;<\/a><\/li><li id=\"footnote-308-41\">Recording Industry Association of America, \u201cFor Students Doing Reports,\u201d Recording Industry Association of America, http:\/\/www.riaa.com\/faq.php (accessed November 14, 2011). <a href=\"#return-footnote-308-41\" class=\"return-footnote\" aria-label=\"Return to footnote 41\">&crarr;<\/a><\/li><li id=\"footnote-308-42\">Epstein, Z., \u201cGlobal Market for Pirated Software Reaches $59 billion,\u201d BGR Innovation, http:\/\/www.bgr.com\/2011\/05\/12\/global-market-for-pirated-software-reaches-59-billion\/ (accessed November 14, 2011). <a href=\"#return-footnote-308-42\" class=\"return-footnote\" aria-label=\"Return to footnote 42\">&crarr;<\/a><\/li><li id=\"footnote-308-43\">AudioMicro, \u201cCan\u2019t Stop Piracy,\u201d AudioMicro, May 20, 2010, http:\/\/www.audiomicro.com\/royalty-free-music-blog\/2010\/05\/can%E2%80%99t-stop-piracy\/ (accessed November 14, 2011). <a href=\"#return-footnote-308-43\" class=\"return-footnote\" aria-label=\"Return to footnote 43\">&crarr;<\/a><\/li><li id=\"footnote-308-44\">Recording Industry Association of America, \u201cThe Law,\u201d Recording Industry Association of America, http:\/\/www.riaa.com\/physicalpiracy.php?content_selector=piracy_online_the_law (accessed November 14, 2011). <a href=\"#return-footnote-308-44\" class=\"return-footnote\" aria-label=\"Return to footnote 44\">&crarr;<\/a><\/li><li id=\"footnote-308-45\">World Law Direct, \u201cIs Downloading Music Illegal?,\u201d World Law Direct, http:\/\/www.worldlawdirect.com\/article\/1395\/downloading-music-legal.html (accessed November 14, 2011). <a href=\"#return-footnote-308-45\" class=\"return-footnote\" aria-label=\"Return to footnote 45\">&crarr;<\/a><\/li><li id=\"footnote-308-46\">Green, H., \u201cDigital Media: Don\u2019t Clamp Down Too Hard,\u201d BusinessWeek Online, October 14, 2002, http:\/\/www.businessweek.com\/magazine\/content\/02_41\/b3803121.htm (accessed November 14, 2011). <a href=\"#return-footnote-308-46\" class=\"return-footnote\" aria-label=\"Return to footnote 46\">&crarr;<\/a><\/li><li id=\"footnote-308-47\">Apple, \u201cApple\u2019s App Store Downloads Top 10 Billion,\u201d Apple, http:\/\/www.apple.com\/pr\/library\/2011\/01\/22Apples-App-Store-Downloads-Top-10-Billion.html (accessed November 14, 2011). <a href=\"#return-footnote-308-47\" class=\"return-footnote\" aria-label=\"Return to footnote 47\">&crarr;<\/a><\/li><li id=\"footnote-308-48\">Reputation.com, \u201cAre Cookies Jeopardizing Your Online Privacy?,\u201d Reputation.com, http:\/\/www.reputation.com\/how_to\/are-cookies-jeopardizing-your-online-privacy\/ (accessed November 14, 2011). <a href=\"#return-footnote-308-48\" class=\"return-footnote\" aria-label=\"Return to footnote 48\">&crarr;<\/a><\/li><li id=\"footnote-308-49\">Kraft Foods, \u201cCareers at Kraft: Information Systems,\u201d Kraft Foods, http:\/\/www.kraftfoods.com\/careers\/careers\/systems.htm (accessed June 2, 2006). <a href=\"#return-footnote-308-49\" class=\"return-footnote\" aria-label=\"Return to footnote 49\">&crarr;<\/a><\/li><\/ol><\/div><div class=\"glossary\"><span class=\"screen-reader-text\" id=\"definition\">definition<\/span><template id=\"term_308_1461\"><div class=\"glossary__definition\" role=\"dialog\" data-id=\"term_308_1461\"><div tabindex=\"-1\"><p>unprocessed facts<\/p>\n<\/div><button><span aria-hidden=\"true\">&times;<\/span><span class=\"screen-reader-text\">Close definition<\/span><\/button><\/div><\/template><template id=\"term_308_1462\"><div class=\"glossary__definition\" role=\"dialog\" data-id=\"term_308_1462\"><div tabindex=\"-1\"><p>data that have been processed, or turned into some useful form.<\/p>\n<\/div><button><span aria-hidden=\"true\">&times;<\/span><span class=\"screen-reader-text\">Close definition<\/span><\/button><\/div><\/template><template id=\"term_308_1463\"><div class=\"glossary__definition\" role=\"dialog\" data-id=\"term_308_1463\"><div tabindex=\"-1\"><p>the combination of technologies, procedures, and people who collect and distribute the information needed to make decisions and coordinate and control company-wide activities.<\/p>\n<\/div><button><span aria-hidden=\"true\">&times;<\/span><span class=\"screen-reader-text\">Close definition<\/span><\/button><\/div><\/template><template id=\"term_308_1465\"><div class=\"glossary__definition\" role=\"dialog\" data-id=\"term_308_1465\"><div tabindex=\"-1\"><p>An ERP system integrates the computer needs of all activities across the enterprise into a single system that serves all users.<\/p>\n<\/div><button><span aria-hidden=\"true\">&times;<\/span><span class=\"screen-reader-text\">Close definition<\/span><\/button><\/div><\/template><template id=\"term_308_1466\"><div class=\"glossary__definition\" role=\"dialog\" data-id=\"term_308_1466\"><div tabindex=\"-1\"><p>electronic collections of related data that can be accessed by various members of the organization.<\/p>\n<\/div><button><span aria-hidden=\"true\">&times;<\/span><span class=\"screen-reader-text\">Close definition<\/span><\/button><\/div><\/template><template id=\"term_308_1467\"><div class=\"glossary__definition\" role=\"dialog\" data-id=\"term_308_1467\"><div tabindex=\"-1\"><p>a centralized database in which data from several databases are consolidated and organized so that they can be easily analyzed.<\/p>\n<\/div><button><span aria-hidden=\"true\">&times;<\/span><span class=\"screen-reader-text\">Close definition<\/span><\/button><\/div><\/template><template id=\"term_308_1470\"><div class=\"glossary__definition\" role=\"dialog\" data-id=\"term_308_1470\"><div tabindex=\"-1\"><p>the process of searching and analyzing large amounts of data to reveal patterns and trends that can be used to predict future behavior.<\/p>\n<\/div><button><span aria-hidden=\"true\">&times;<\/span><span class=\"screen-reader-text\">Close definition<\/span><\/button><\/div><\/template><template id=\"term_308_1473\"><div class=\"glossary__definition\" role=\"dialog\" data-id=\"term_308_1473\"><div tabindex=\"-1\"><p>first-time casino customers.<\/p>\n<\/div><button><span aria-hidden=\"true\">&times;<\/span><span class=\"screen-reader-text\">Close definition<\/span><\/button><\/div><\/template><template id=\"term_308_1474\"><div class=\"glossary__definition\" role=\"dialog\" data-id=\"term_308_1474\"><div tabindex=\"-1\"><p>computer-run machines that can perform repetitive or dangerous tasks.<\/p>\n<\/div><button><span aria-hidden=\"true\">&times;<\/span><span class=\"screen-reader-text\">Close definition<\/span><\/button><\/div><\/template><template id=\"term_308_1475\"><div class=\"glossary__definition\" role=\"dialog\" data-id=\"term_308_1475\"><div tabindex=\"-1\"><p>the science of developing computer systems that can mimic human behavior.<\/p>\n<\/div><button><span aria-hidden=\"true\">&times;<\/span><span class=\"screen-reader-text\">Close definition<\/span><\/button><\/div><\/template><template id=\"term_308_1476\"><div class=\"glossary__definition\" role=\"dialog\" data-id=\"term_308_1476\"><div tabindex=\"-1\"><p>linking computers to one another.<\/p>\n<\/div><button><span aria-hidden=\"true\">&times;<\/span><span class=\"screen-reader-text\">Close definition<\/span><\/button><\/div><\/template><template id=\"term_308_1478\"><div class=\"glossary__definition\" role=\"dialog\" data-id=\"term_308_1478\"><div tabindex=\"-1\"><p>in the same building or office complex.<\/p>\n<\/div><button><span aria-hidden=\"true\">&times;<\/span><span class=\"screen-reader-text\">Close definition<\/span><\/button><\/div><\/template><template id=\"term_308_1477\"><div class=\"glossary__definition\" role=\"dialog\" data-id=\"term_308_1477\"><div tabindex=\"-1\"><p>a processor that allows dissimilar networks to communicate with one another.<\/p>\n<\/div><button><span aria-hidden=\"true\">&times;<\/span><span class=\"screen-reader-text\">Close definition<\/span><\/button><\/div><\/template><template id=\"term_308_1479\"><div class=\"glossary__definition\" role=\"dialog\" data-id=\"term_308_1479\"><div tabindex=\"-1\"><p>software, such as Microsoft\u2019s Internet Explorer and Netscape Navigator, that locates and displays Web pages.<\/p>\n<\/div><button><span aria-hidden=\"true\">&times;<\/span><span class=\"screen-reader-text\">Close definition<\/span><\/button><\/div><\/template><template id=\"term_308_764\"><div class=\"glossary__definition\" role=\"dialog\" data-id=\"term_308_764\"><div tabindex=\"-1\"><p>conducting business over the Internet.<\/p>\n<\/div><button><span aria-hidden=\"true\">&times;<\/span><span class=\"screen-reader-text\">Close definition<\/span><\/button><\/div><\/template><template id=\"term_308_1480\"><div class=\"glossary__definition\" role=\"dialog\" data-id=\"term_308_1480\"><div tabindex=\"-1\"><p>a private system supplied by a third-party firm.<\/p>\n<\/div><button><span aria-hidden=\"true\">&times;<\/span><span class=\"screen-reader-text\">Close definition<\/span><\/button><\/div><\/template><template id=\"term_308_1481\"><div class=\"glossary__definition\" role=\"dialog\" data-id=\"term_308_1481\"><div tabindex=\"-1\"><p>criminal activity done using computers or the Internet.<\/p>\n<\/div><button><span aria-hidden=\"true\">&times;<\/span><span class=\"screen-reader-text\">Close definition<\/span><\/button><\/div><\/template><template id=\"term_308_1482\"><div class=\"glossary__definition\" role=\"dialog\" data-id=\"term_308_1482\"><div tabindex=\"-1\"><p>software and hardware systems that prevent unauthorized users from accessing their computer networks.<\/p>\n<\/div><button><span aria-hidden=\"true\">&times;<\/span><span class=\"screen-reader-text\">Close definition<\/span><\/button><\/div><\/template><template id=\"term_308_1483\"><div class=\"glossary__definition\" role=\"dialog\" data-id=\"term_308_1483\"><div tabindex=\"-1\"><p>the process of encoding data so that only individuals (or computers) armed with a secret code (or key) can decode it.<\/p>\n<\/div><button><span aria-hidden=\"true\">&times;<\/span><span class=\"screen-reader-text\">Close definition<\/span><\/button><\/div><\/template><template id=\"term_308_1484\"><div class=\"glossary__definition\" role=\"dialog\" data-id=\"term_308_1484\"><div tabindex=\"-1\"><p>a third-party (such as VeriSign) that verifies the identify of the responding computer and sends you a digital certificate of authenticity stating that it trusts the site.<\/p>\n<\/div><button><span aria-hidden=\"true\">&times;<\/span><span class=\"screen-reader-text\">Close definition<\/span><\/button><\/div><\/template><\/div>","protected":false},"author":30,"menu_order":4,"template":"","meta":{"pb_show_title":"on","pb_short_title":"Managing Information and Technology","pb_subtitle":"Managing Information and Technology ","pb_authors":[],"pb_section_license":"cc-by-nc-sa"},"chapter-type":[],"contributor":[58],"license":[54],"class_list":["post-308","chapter","type-chapter","status-publish","hentry","contributor-mpauley","license-cc-by-nc-sa"],"part":416,"_links":{"self":[{"href":"https:\/\/pressbooks.library.upei.ca\/smallbusinessmanagement\/wp-json\/pressbooks\/v2\/chapters\/308","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pressbooks.library.upei.ca\/smallbusinessmanagement\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/pressbooks.library.upei.ca\/smallbusinessmanagement\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/pressbooks.library.upei.ca\/smallbusinessmanagement\/wp-json\/wp\/v2\/users\/30"}],"version-history":[{"count":15,"href":"https:\/\/pressbooks.library.upei.ca\/smallbusinessmanagement\/wp-json\/pressbooks\/v2\/chapters\/308\/revisions"}],"predecessor-version":[{"id":1486,"href":"https:\/\/pressbooks.library.upei.ca\/smallbusinessmanagement\/wp-json\/pressbooks\/v2\/chapters\/308\/revisions\/1486"}],"part":[{"href":"https:\/\/pressbooks.library.upei.ca\/smallbusinessmanagement\/wp-json\/pressbooks\/v2\/parts\/416"}],"metadata":[{"href":"https:\/\/pressbooks.library.upei.ca\/smallbusinessmanagement\/wp-json\/pressbooks\/v2\/chapters\/308\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/pressbooks.library.upei.ca\/smallbusinessmanagement\/wp-json\/wp\/v2\/media?parent=308"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/pressbooks.library.upei.ca\/smallbusinessmanagement\/wp-json\/pressbooks\/v2\/chapter-type?post=308"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/pressbooks.library.upei.ca\/smallbusinessmanagement\/wp-json\/wp\/v2\/contributor?post=308"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/pressbooks.library.upei.ca\/smallbusinessmanagement\/wp-json\/wp\/v2\/license?post=308"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}