The case study is on Information Systems. I have attached the book to work on the case study. Please read the instructions below: Read the chapters 12 through 13 in the textbook and select one (1) of
Copyright © 2016 John Wiley & Sons, Inc. Copyright © 2016 John Wiley & Sons, Inc. Managing and Using Information Systems
A STRATEGIC APPROACH Sixth Edition
Keri E. Pearlson
KP Partners
Carol S. Saunders
W.A. Franke College of Business
Northern Arizona University
Dr. Theo and Friedl Schoeller Research Center for Business and Society
Dennis F. Galletta
Katz Graduate School of Business
University of Pittsburgh, Pittsburgh, PA
Copyright © 2016 John Wiley & Sons, Inc. VICE PRESIDENT & DIRECTOR George Hoffman
EXECUTIVE EDITOR Lise Johnson
DEVELOPMENT EDITOR Jennifer Manias
ASSOCIATE DEVELOPMENT EDITOR Kyla Buckingham
SENIOR PRODUCT DESIGNER Allison Morris
MARKET SOLUTIONS ASSISTANT Amanda Dallas
SENIOR DIRECTOR Don Fowley
PROJECT MANAGER Gladys Soto
PROJECT SPECIALIST Nichole Urban
PROJECT ASSISTANT Anna Melhorn
EXECUTIVE MARKETING MANAGER Christopher DeJohn
ASSISTANT MARKETING MANAGER Puja Katariwala
ASSOCIATE DIRECTOR Kevin Holm
SENIOR CONTENT SPECIALIST Nicole Repasky
PRODUCTION EDITOR Loganathan Kandan
This book was set in 10/12 Times Roman by SPi Global and printed and bound by Courier Kendallville.
This book is printed on acid free paper.
Founded in 1807, John Wiley & Sons, Inc. has been a valued source of knowledge and understanding for more than 200 years, helping people
around the world meet their needs and fulfill their aspirations. Our company is built on a foundation of principles that include responsibility to
the communities we serve and where we live and work. In 2008, we launched a Corporate Citizenship Initiative, a global effort to address the
environmental, social, economic, and ethical challenges we face in our business. Among the issues we are addressing are carbon impact, paper
specifications and procurement, ethical conduct within our business and among our vendors, and community and charitable support. For more
information, please visit our website: www.wiley.com/go/citizenship.
Copyright 2016, 2013, 2010, 2006, 2004, 2001 John Wiley & Sons, Inc. All rights reserved. No part of this publication may be repro-
duced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or
otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission
of the Publisher, or authorization through payment of the appropriate per‐copy fee to the Copyright Clearance Center, Inc., 222 Rosewood
Drive, Danvers, MA 01923 (Web site: www.copyright.com). Requests to the Publisher for permission should be addressed to the Permissions
Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030‐5774, (201) 748‐6011, fax (201) 748‐6008, or online at: www.
wiley.com/go/permissions.
Evaluation copies are provided to qualified academics and professionals for review purposes only, for use in their courses during the next
academic year. These copies are licensed and may not be sold or transferred to a third party. Upon completion of the review period, please
return the evaluation copy to Wiley. Return instructions and a free of charge return shipping label are available at: www.wiley.com/go/
returnlabel. If you have chosen to adopt this textbook for use in your course, please accept this book as your complimentary desk copy.
Outside of the United States, please contact your local sales representative.
ISBN: 978-1-119-24428-8 (BRV)
ISBN: 978-1-119-24807-1 (EVALC) Library of Congress Cataloging-in-Publication Data
Names: Pearlson, Keri E. | Saunders, Carol S. | Galletta, Dennis F.
Title: Managing and using information systems: a strategic approach / Keri
E. Pearlson, Carol S. Saunders, Dennis F. Galletta.
Description: 6th edition. | Hoboken, NJ : John Wiley & Sons, Inc., [2015] |
Includes index.
Identifiers: LCCN 2015041210 (print) | LCCN 2015041579 (ebook) | ISBN 9781119244288 (loose-leaf : alk. paper) | ISBN 9781119255208 (pdf) | ISBN 9781119255246 (epub)
Subjects: LCSH: Knowledge management. | Information technology—Management. | Management information systems. | Electronic commerce.
Classification: LCC HD30.2 .P4 2015 (print) | LCC HD30.2 (ebook) | DDC 658.4/038011—dc23
LC record available at http://lccn.loc.gov/2015041210
Printing identification and country of origin will either be included on this page and/or the end of the book. In addition, if the ISBN on this
page and the back cover do not match, the ISBN on the back cover should be considered the correct ISBN.
Printed in the United States of America 10 9 8 7 6 5 4 3 2 1
Copyright © 2016 John Wiley & Sons, Inc. To Yale & Hana
To Rusty, Russell, Janel & Kristin
To Carole, Christy, Lauren, Matt, Gracie, and Jacob
Copyright © 2016 John Wiley & Sons, Inc. iv
Information technology and business are becoming inextricably interwoven. I don ’ t think anybody can talk
meaningfully about one without the talking about the other.
Bill Gates
Microsoft 1
I ’ m not hiring MBA students for the technology you learn while in school, but for your ability to learn about, use
and subsequently manage new technologies when you get out .
IT Executive
Federal Express 2
Give me a sh and I eat for a day; teach me to sh and I eat for a lifetime .
Proverb
Managers do not have the luxury of abdicating participation in decisions regarding information systems (IS).
Managers who choose to do so risk limiting their future business options. IS are at the heart of virtually every
business interaction, process, and decision, especially when the vast penetration of the Web over the last 20 years
is considered. Mobile and social technologies have brought IS to an entirely new level within rms and between
individuals in their personal lives. Managers who let someone else make decisions about their IS are letting
someone else make decisions about the very foundation of their business. This is a textbook about managing and
using information written for current and future managers as a way to introduce the broader implications of the
impact of IS. The goal of this book is to assist managers in becoming knowledgeable participants in IS decisions. Becoming
a knowledgeable participant means learning the basics and feeling comfortable enough to ask questions. It does
not mean having all the answers or having a deep understanding of all the technologies out in the world today. No
text will provide managers everything they need to know to make important IS decisions. Some texts instruct on
the basic technical background of IS. Others discuss applications and their life cycles. Some take a comprehensive
view of the management information systems (MIS) eld and offer readers snapshots of current systems along with
chapters describing how those technologies are designed, used, and integrated into business life. This book takes a different approach. It is intended to provide the reader a foundation of basic concepts relevant
to using and managing information. This text is not intended to provide a comprehensive treatment on any one
aspect of MIS, for certainly each aspect is itself a topic of many books. This text is not intended to provide readers
enough technological knowledge to make them MIS experts. It is not intended to be a source of discussion of any
particular technology. This text is written to help managers begin to form a point of view of how IS will help or
hinder their organizations and create opportunities for them. The idea for this text grew out of discussions with colleagues in the MIS area. Many faculties use a series of
case studies, trade and popular press readings, and Web sites to teach their MIS courses. Others simply rely on one
of the classic texts, which include dozens of pages of diagrams, frameworks, and technologies. The initial idea for
this text emerged from a core MIS course taught at the business school at the University of Texas at Austin. That
course was considered an “appetizer” course—a brief introduction into the world of MIS for MBA students. The
course had two main topics: using information and managing information. At the time, there was no text like this
Preface
1
Bill Gates, Business @ the Speed of Thought. New York: Warner Books, Inc. 1999.
2 Source: Private conversation with one of the authors.
Copyright © 2016 John Wiley & Sons, Inc. v Preface
one; hence, students had to purchase thick reading packets made up of articles and case studies to provide them the
basic concepts. The course was structured to provide general MBA students enough knowledge of the MIS eld so
that they could recognize opportunities to use the rapidly changing technologies available to them. The course was
an appetizer to the menu of specialty courses, each of which went much more deeply into the various topics. But
completion of the appetizer course meant that students were able to feel comfortable listening to, contributing to, and ultimately participating in IS decisions. Today, many students are digital natives—people who have grown up using information technologies (IT) all
of their lives. That means that students come to their courses with signicantly more knowledge about things such
as tablets, apps, personal computers, smartphones, texting, the Web, social networking, le downloading, online
purchasing, and social media than their counterparts in school just a few years ago. This is a signicant trend
that is projected to continue; students will be increasingly knowledgeable the personal use of technologies. That
knowledge has begun to change the corporate environment. Today’s digital natives expect to nd in corporations
IS that provide at least the functionality they have at home. At the same time, these users expect to be able to work
in ways that take advantage of the technologies they have grown to depend on for social interaction, collaboration,
and innovation. We believe that the basic foundation is still needed for managing and using IS, but we understand
that the assumptions and knowledge base of today’s students is signicantly different. Also different today is the vast amount of information amassed by rms, sometimes called the “big data” prob-
lem. Organizations have gured out that there is an enormous amount of data around their processes, their interac-
tions with customers, their products, and their suppliers. These organizations also recognize that with the increase
in communities and social interactions on the Web, there is additional pressure to collect and analyze vast amounts
of unstructured information contained in these conversations to identify trends, needs, and projections. We believe
that today’s managers face an increasing amount of pressure to understand what is being said by those inside and
outside their corporations and to join those conversations reasonably and responsibly. That is signicantly different
from just a few years ago. This book includes an introduction, 13 chapters of text and mini cases, and a set of case studies, supplemental
readings, and teaching support on a community hub at http://pearlsonandsaunders.com. The Hub provides faculty
members who adopt the text additional resources organized by chapter, including recent news items with teaching
suggestions, videos with usage suggestions, blog posts and discussions from the community, class activities, addi-
tional cases, cartoons, and more. Supplemental materials, including longer cases from all over the globe, can be
found on the Web. Please visit http://www.wiley.com/college/pearlson or the Hub for more information. The introduction to this text defends the argument presented in this preface that managers must be knowledge-
able participants in making IS decisions. The rst few chapters build a basic framework of relationships among
business strategy, IS strategy, and organizational strategy and explore the links among them. The strategy chapters
are followed by ones on work design and business processes that discuss the use of IS. General managers also need
some foundation on how IT is managed if they are to successfully discuss their next business needs with IT pro-
fessionals who can help them. Therefore, the remaining chapters describe the basics of information architecture
and infrastructure, IT security, the business of IT, the governance of the IS organization, IS sourcing, project
management, business analytics, and relevant ethical issues. Given the acceleration of security breaches, readers will nd a new chapter on IS security in this sixth edition of
the text. Also, the material on analytics and “big data” has been extensively updated to reect the growing impor-
tance of the topic. Further, the chapter on work design has been reorganized and extensively revised. Each of the
other chapters has been revised with newer concepts added, discussions of more current topics eshed out, and old,
outdated topics removed or at least their discussion shortened. Similar to the fth edition, every chapter begins with a navigation “box” to help the reader understand the ow
and key topics of the chapter. Further, most chapters continue to have a Social Business Lens or a Geographic Lens
feature. The Social Business Lens feature reects on an issue related to the chapter’s main topic but is enabled by or
fundamental to using social technologies in the enterprise. The Geographic Lens feature offers a single idea about
a global issue related to the chapter’s main topic. No text in the eld of MIS is completely current. The process of writing the text coupled with the publication
process makes a book somewhat out‐of‐date prior to delivery to its audience. With that in mind, this text is written
Copyright © 2016 John Wiley & Sons, Inc. vi Preface
to summarize the “timeless” elements of using and managing information. Although this text is complete in and
of itself, learning is enhanced by combining the chapters with the most current readings and cases. Faculty are
encouraged to read the news items on the faculty Hub before each class in case one might be relevant to the topic of
the day. Students are encouraged to search the Web for examples related to topics and current events and bring them
into the discussions of the issues at hand. The format of each chapter begins with a navigational guide, a short case
study, and the basic language for a set of important management issues. These are followed by a set of managerial
concerns related to the topic. The chapter concludes with a summary, key terms, a set of discussion questions, and case studies. Who should read this book? General managers interested in participating in IS decisions will nd this a good
reference resource for the language and concepts of IS. Managers in the IS eld will nd the book a good resource
for beginning to understand the general manager’s view of how IS affect business decisions. And IS students will
be able to use the book’s readings and concepts as the beginning in their journey to become informed and success-
ful businesspeople. The information revolution is here. Where do you t in?
Keri E. Pearlson, Carol S. Saunders, and Dennis F. Galletta
Copyright © 2016 John Wiley & Sons, Inc. vii
Books of this nature are written only with the support of many individuals. We would like to personally thank
several individuals who helped with this text. Although we ’ ve made every attempt to include everyone who helped
make this book a reality, there is always the possibility of unintentionally leaving some out. We apologize in
advance if that is the case here. Thank you goes to Dr. William Turner of LeftFour , in Austin, Texas, for help with the infrastructure and
architecture concepts and to Alan Shimel, Editor‐in‐Chief at DevOps.com for initial ideas for the new security
chapter. We also want to acknowledge and thank pbwiki.com. Without its incredible and free wiki, we would have been
relegated to e‐mailing drafts of chapters back and forth, or saving countless les in an external drop box without
any opportunity to include explanations or status messages. For this edition, as with earlier editions, we wanted to
use Web 2.0 tools as we wrote about them. We found that having used the wiki for our previous editions, we were
able to get up and running much faster than if we had to start over without the platform. We have been blessed with the help of our colleagues in this and in previous editions of the book. They
helped us by writing cases and reviewing the text. Our thanks continue to go out to Jonathan Trower, Espen
Andersen, Janis Gogan, Ashok Rho, Yvonne Lederer Antonucci, E. Jose Proenca, Bruce Rollier, Dave Oliver, Celia
Romm, Ed Watson, D. Guiter, S. Vaught, Kala Saravanamuthu, Ron Murch, John Greenwod, Tom Rohleder, Sam
Lubbe, Thomas Kern, Mark Dekker, Anne Rutkowski, Kathy Hurtt, Kay Nelson, Janice Sipior, Craig Tidwell, and
John Butler. Although we cannot thank them by name, we also greatly appreciate the comments of the anonymous
reviewers who have made a mark on this edition. The book would not have been started were it not for the initial suggestion of a wonderful editor in 1999 at John
Wiley & Sons, Beth Lang Golub. Her persistence and patience helped shepherd this book through many previous
editions. We also appreciate the help of our current editor, Lise Johnson. Special thanks go to Jane Miller, Gladys
Soto, Loganathan Kandan, and the conscientious JaNoel Lowe who very patiently helped us through the revision
process. We also appreciate the help of all the staff at Wiley who have made this edition a reality. We would be remiss if we did not also thank Lars Linden for the work he has done on the Pearlson and Saunders
Faculty Hub for this book. Our vision included a Web‐based community for discussing teaching ideas and post-
ing current articles that supplement this text. Lars made that vision into a reality starting with the last edition and
continuing through the present. Thank you, Lars! From Keri: Thank you to my husband, Yale, and my daughter, Hana, a business and computer science student at
Tulane University. Writing a book like this happens in the white space of our lives—the time in between everything
else going on. This edition came due at a particularly frenetic time, but they listened to ideas, made suggestions, and
celebrated the book ’ s completion with us. I know how lucky I am to have this family. I love you guys! From Carol: I would like to thank the Dr. Theo and Friedl Schoeller Research Center of Business and Society for
their generous support of my research. Rusty, thank you for being my compass and my release valve. I couldn ’ t do
it without you. Paraphrasing the words of an Alan Jackson song (“Work in Progress”): I may not be what you want
me to be, but I ’ m trying really hard. Just be patient because I ’ m a work in progress. I love you, Kristin, Russell,
and Janel very much! From Dennis: Thanks to my terri c family: my wife Carole, my daughters Christy and Lauren, and my grand-
daughter Gracie. Also thanks to Matt and Jacob, two lovable guys who take wonderful care of my daughters. Finally,
thanks to our parents and sisters ’ families. We are also blessed with a large number of great, caring neighbors whom
we see quite often. I love you all, and you make it all worthwhile!
Acknowledgments
Copyright © 2016 John Wiley & Sons, Inc. viii
Dr. Keri E. Pearlson is President of KP Partners , an advisory services rm working with business leaders on issues
related to the strategic use of information systems (IS) and organizational design. She is an entrepreneur, teacher,
researcher, consultant, and thought leader. Dr. Pearlson has held various positions in academia and industry. She
has been a member of the faculty at the Graduate School of Business at the University of Texas at Austin where she
taught management IS courses to MBAs and executives and at Babson College where she helped design the popular
IS course for the Fast Track MBA program. Dr. Pearlson has held positions at the Harvard Business School, CSC, nGenera (formerly the Concours Group), AT&T , and Hughes Aircraft Company . While writing this edition, she was
the Research Director for the Analytics Leadership Consortium at the International Institute of Analytics and was
named the Leader of the Year by the national Society of Information Management (SIM) 2014. Dr. Pearlson is coauthor of Zero Time: Providing Instant Customer Value—Every Time, All the Time (John
Wiley, 2000). Her work has been published in numerous places including Sloan Management Review, Academy
of Management Executive, and Information Resources Management Journal . Many of her case studies have been
published by Harvard Business Publishing and are used all over the world. She currently writes a blog on issues at
the intersection of IT and business strategy. It ’ s available at www.kppartners.com. Dr. Pearlson holds a Doctorate in Business Administration (DBA) in Management Information Systems from
the Harvard Business School and both a Master ’ s Degree in Industrial Engineering Management and a Bachelor ’ s
Degree in Applied Mathematics from Stanford University. Dr. Carol S. Saunders is Research Professor at the W. A. Franke College of Business, Northern Arizona
University in Flagstaff, Arizona, and is a Schoeller Senior Fellow at the Friedrich‐Alexander University of
Erlangen‐Nuremberg, Germany. She served as General Conference Chair of the International Conference on
Information Systems (ICIS) in 1999 and as Program Co‐Chair of the Americas Conference of Information
Systems (AMCIS) in 2015. Dr. Saunders was the Chair of the ICIS Executive Committee in 2000. For three
years, she served as Editor‐in‐Chief of MIS Quarterly . She is currently on the editorial boards of Journal
of Strategic Information Systems and Organization Science and serves on the advisory board of Business &
Information Systems Engineering. Dr. Saunders has been recognized for her lifetime achievements by the
Association of Information Systems (AIS) with a LEO award and by the Organizational Communication and
Information Systems Division of the Academy of Management. She is a Fellow of the AIS. Dr. Saunders ’ current research interests include the impact of IS on power and communication, overload,
virtual teams, time, sourcing, and interorganizational linkages. Her research is published in a number of journals including MIS Quarterly, Information Systems Research, Journal of MIS, Communications of the ACM, Journal
of Strategic Information Systems, Journal of the AIS, Academy of Management Journal, Academy of Management
Review, Communications Research , and Organization Science .
Dr. Dennis F. Galletta is Professor of Business Administration at the Katz Graduate School of Business,
University of Pittsburgh in Pennsylvania. He is also the Director of the Katz School ’ s doctoral program and has
taught IS Management graduate courses in Harvard ’ s summer program each year since 2009. He obtained his
doctorate from the University of Minnesota in 1985 and is a Certi ed Public Accountant. Dr. Galletta served as
President of the Association of Information Systems (AIS) in 2007. Like Dr. Saunders, he is both a Fellow of
the AIS and has won a LEO lifetime achievement award. He was a member of the AIS Council for ve years.
He also served in leadership roles for the International Conference on Information Systems (ICIS): Program
Co‐Chair in 2005 (Las Vegas) and Conference Co‐Chair in 2011 (Shanghai); as Program Co‐Chair for the
About the Authors
Copyright © 2016 John Wiley & Sons, Inc. ix About the Authors
Americas Conference on Information Systems (AMCIS) in 2003 (Tampa, Florida) and Inaugural Conference
Chair in 1995 (Pittsburgh). The Pittsburgh conference had several “rsts” for an IS conference, including the rst
on‐line submissions, reviews, conference registration and payment, placement service, and storage of all papers
in advance on a website. Dr. Galletta served as ICIS Treasurer from 1994 to 1998 and Chair of the ICIS Execu-
tive Committee in 2012. He taught IS courses on the Fall 1999 Semester at Sea voyage (Institute for Shipboard
Education) and established the concept of Special Interest Groups in AIS in 2000. In 2014, he won an Emerald
Citation of Excellence for a co‐authored article that reached the top 50 in citations and ratings from the elds of
management, business, and economics. Dr. Galletta’s current research addresses online and mobile usability and behavioral security issues such as
phishing, protection motivation, and antecedents of security‐related decision making. He has published his research in journals such as Management Science; MIS Quarterly; Information Systems Research; Journal of MIS; European
Journal of Information Systems; Journal of the AIS; Communications of the ACM; Accounting, Management, and
Information Technologies; Data Base; and Decision Sciences and in proceedings of conferences such as ICIS,
AMCIS, and the Hawaii International Conference on Systems Sciences . Dr. Galletta’s editorship includes working
as current and founding Coeditor in Chief for AIS Transactions on Human‐Computer Interaction and on editorial
boards at journals such as MIS Quarterly, Information Systems Research, Journal of MIS, and Journal of the AIS.
He is currently on the Pre‐eminent Scholars Board of Data Base. He won a Developmental Associate Editor Award
at the MIS Quarterly in 2006. And during the off‐hours, Dr. Galletta’s fervent hobby and obsession is digital pho-
tography, often squinting through his eyepiece to make portrait, macro, Milky Way, and lightning photos when he should be writing.
Copyright © 2016 John Wiley & Sons, Inc. x
Contents
Preface iv Acknowledgments vii
About the Authors viiiIntroduction 1 The Case for Participating in Decisions about Information Systems 2
What If a Manager Doesn’t Participate? 5
Skills Needed to Participate Effectively in Information Technology Decisions 6
Basic Assumptions 8
Economics of Information versus Economics of Things 12
Social Business Lens 14 Summary 15
Key Terms 16
1 The Information Systems Strategy Triangle 17
Brief Overview of Business Strategy Frameworks 19
Business Models versus Business Strategy 21
Brief Overview of Organizational Strategies 25
Brief Overview of Information Systems Strategy 26
Social Business Lens: Building a Social Business Strategy 27Summary 28
Key Terms 29
Discussion Questions 29
Case Study 1‐1 Lego 30Case Study 1‐2 Google 31
2 Strategic Use of Information Resources 33
Evolution of Information Resources 34
Information Resources as Strategic Tools 36
How Can Information Resources Be Used Strategically? 37
Sustaining Competitive Advantage 43
Social Business Lens: Social Capital 47
Strategic Alliances 47Risks 49
Geographic Box: Mobile‐Only Internet Users Dominate Emerging Countries 50
Co‐Creating IT and Business Strategy 50
Copyright © 2016 John Wiley & Sons, Inc. xi Contents
Summary 51
Key Terms 51
Discussion Questions 51
Case Study 2‐1 Groupon 52
Case Study 2‐2 Zipcar 53
3 Organizational Strategy and Information Systems 55Information Systems and Organizational Design 58
Social Business Lens: Social Networks 63
Information Systems and Management Control Systems 63
Information Systems and Culture 66
Geographic Lens: Does National Culture Affect Firm Investment in IS Training? 70Summary 71
Key Terms 71
Discussion Questions 71
Case Study 3‐1 The Merger of Airtran by Southwest Airlines: Will the Organizational Cultures Merge? 72
Case Study 3‐2 The FBI 73
4 Digital Systems and the Design of Work 75Work Design Framework 77
How Information Technology Changes the Nature of Work 78
Social Business Lens: Activity Streams 84
Where Work Is Done and Who Does It: Mobile and Virtual Work Arrangements 86
Geographic Lens: How Do People Around the World Feel About Working Remotely? 88
Geographic Lens: Who Telecommutes? A Look at Global Telecommuting Habits 89
Gaining Acceptance for IT‐Induced Change 94Summary 96
Key Terms 97
Discussion Questions 97
Case Study 4‐1 Trash and Waste Pickup Services, Inc. 97
Case Study 4‐2 Social Networking: How Does IBM Do It? 98
5 Information Systems and Business Transformation 99Silo Perspective versus Business Process Perspective 100
Building Agile and Dynamic Business Processes 104
Changing Business Processes 105
Workflow and Mapping Processes 107
Integration versus Standardization 109
Enterprise Systems 110
Geographic Lens: Global vs. Local ERPs 113
Social Business Lens: Crowdsourcing Changes Innovation Processes 118Summary 119
Key Terms 120
Copyright © 2016 John Wiley & Sons, Inc. xii Contents
Discussion Questions 120
Case Study 5‐1 Santa Cruz Bicycles 121
Case Study 5‐2 Boeing 787 Dreamliner 122
6 Architecture and Infrastructure 124From Vision to Implementation 125
The Leap from Strategy to Architecture to Infrastructure 126
From Strategy to Architecture to Infrastructure: An Example 133
Architectural Principles 135
Enterprise Architecture 136
Virtualization and Cloud Computing 137
Other Managerial Considerations 139
Social Business Lens: Building Social Mobile Applications 143Summary 144
Key Terms 144
Discussion Questions 145
Case Study 6‐1 Enterprise Architecture at American Express 145
Case Study 6‐2 The Case of Extreme Scientists 146
7 Security 147IT Security Decision Framework 149
Breaches and How They Occurred 151
The Impossibility of 100% Security 154
What Should Management Do? 155Summary 162
Key Terms 163
Discussion Questions 163
Case Study 7-1 The Aircraft Communications Addressing and Reporting System (ACARS) 163
Case Study 7-2 Sony Pictures: The Criminals Won 164
8 The Business of Information Technology 165Organizing to Respond to Business: A Maturity Model 167
Understanding the IT Organization 168
What a Manager Can Expect from the IT Organization 168
What the IT Organization Does Not Do 170
Chief Information Officer 171
Building a Business Case 173
IT Portfolio Management 175
Valuing IT Investments 176
Monitoring IT Investments 177
Funding IT Resources 182
How Much Does IT Cost? 184Summary 187
Copyright © 2016 John Wiley & Sons, Inc. xiii Contents
Key Terms 188
Discussion Questions 188
Case Study 8‐1 KLM Airlines 189
Case Study 8‐2 Balanced Scorecards at BIOCO 190
9 Governance of the Information Systems Organization 191IT Governance 192
Decision‐Making Mechanisms 199
Governance Frameworks for Control Decisions 200
Social Business Lens: Governing the Content 204Summary 205
Key Terms 205
Discussion Questions 205
Case Study 9‐1 IT Governance at University of the Southeast 205
Case Study 9‐2 The “MyJohnDeere” Platform 207
10 Information Systems Sourcing 208Sourcing Decision Cycle Framework 209
Social Business Lens: Crowdsourcing 214
Geographic Lens: Corporate Social Responsibility 220
Outsourcing in the Broader Context 224Summary 225
Key Terms 225
Discussion Questions 225
Case Study 10‐1 Crowdsourcing at AOL 225
Case Study 10‐2 Altia Business Park 226
11 Managing IT Projects 228What Defines a Project? 230
What Is Project Management? 231
Organizing for Project Management 232
Project Elements 233
IT Projects 239
IT Project Development Methodologies and Approaches 240
Social Business Lens: Mashups 247
Managing IT Project Risk 247Summary 253
Key Terms 254
Discussion Questions 254
Case Study 11‐1 Implementing Enterprise Change Management at Southern Company 254
Case Study 11‐2 Dealing with Traffic Jams in London 255
Copyright © 2016 John Wiley & Sons, Inc. xiv Contents
12 Business Intelligence, Knowledge Management, and Analytics 258Competing with Business Analytics 259
Knowledge Management, Business Intelligence, and Business Analytics 260
Data, Information, and Knowledge 261
Knowledge Management Processes 264
Business Intelligence 264
Components of Business Analytics 265
Big Data 268
Social Media Analytics 269
Social Business Lens: Personalization and Real‐Time Data Streams 271
Geographic Lens: When Two National Views of Intellectual Property Collide 272
Caveats for Managing Knowledge and Business Intelligence 274Summary 274
Key Terms 275
Discussion Questions 275
Case Study 12‐1 Stop & Shop’s Scan It! App 275
Case Study 12‐2 Business Intelligence at CKE Restaurants 276
13 Privacy and Ethical Considerations in Information Management 278
Responsible Computing 280
Corporate Social Responsibility 283
PAPA: Privacy, Accuracy, Property, and Accessibility 284
Social Business Lens: Personal Data 289
Geographic Lens: Should Subcultures Be Taken into Account When Trying to Understand National
Attitudes Toward Information Ethics? 292
Green Computing 292Summary 293
Key Terms 294
Discussion Questions 294
Case Study 13‐1 Ethical Decision Making 295
Case Study 13‐2 Midwest Family Mutual Goes Green 297
Glossary 299
Index
313
Copyright © 2016 John Wiley & Sons, Inc. 1
Introduction
Why do managers need to understand and participate in the information systems decisions of their
organizations? After all, most corporations maintain entire departments dedicated to the management
of information systems (IS). These departments are staffed with highly skilled professionals devoted
to the eld of technology. Shouldn’t managers rely on experts to analyze all the aspects of IS and
to make the best decisions for the organization? The answer to that question is an emphatic “no.” Managing information is a critical skill for success in today ’ s business environment. All decisions
made by companies involve, at some level, the management and use of IS and the interpretation of
data from the business and its environment. Managers today need to know about their organization ’ s
capabilities and uses of information as much as they need to understand how to obtain and budget nancial resources. The ubiquity of personal devices such as smart phones, laptops, and tablets and
of access to apps within corporations and externally over the Internet, highlights this fact. Today ’ s
technologies form the backbone for virtually all business models. This backbone easily crosses
oceans, adding the need for a global competency to the manager ’ s skill set. Further, the proliferation
of supply chain partnerships and the vast amount of technology available to individuals outside of
the corporation have extended the urgent need for business managers to be involved in information
systems decisions. In addition, the availability of seemingly free (or at least very inexpensive) appli-
cations, collaboration tools, and innovation engines in the consumer arena has put powerful tools in
everyone ’ s hands, increasing the dif culty of ensuring that corporate systems are robust, secure, and
protected. A manager who doesn ’ t understand the basics of managing and using information can ’ t
be successful in this business environment. The majority of U.S. adults own a smart phone and access online apps. According to the Pew
Research Center , in 2014, 90% of U.S. adults had a cell phone of some kind, and 87% of American adults used the Internet. 1
Essentially the use of these types of devices implies that individuals now
manage a “personal IS” and make decisions about usage, data, and applications. Doesn ’ t that give
them insight into managing information systems in corporations? Students often think they are
experts in corporate IS because of their personal experience with technology. Although there is some
truth in that perspective, it ’ s a very dangerous perspective for managers to take. Certainly knowing
about interesting apps, being able to use a variety of technologies for different personal purposes,
and being familiar with the ups and downs of networking for their personal information systems pro-
vide some experience that is useful in the corporate setting. But in a corporate setting, information
systems must be enterprise‐ready. They must be scalable for a large number of employees; they
must be delivered in an appropriate manner for the enterprise; they must be managed with corpo-
rate guidelines and appropriate governmental regulations in mind. Issues like security, privacy, risk,
support, and architecture take on a new meaning within an enterprise, and someone has to manage
them. Enterprise‐level management and use of information systems require a unique perspective and
a different skill set.
1 Internet Use and Cell Phone Demographics, http://www.pewinternet.org/data‐trend/internet‐use/internet‐use‐over‐time (access ed
August 18, 2015).
Copyright © 2016 John Wiley & Sons, Inc. 2 Introduction
Consider the now‐historic rise of companies such as Amazon.com, Google, and Zappos. Amazon.com began as
an online bookseller and rapidly outpaced traditional brick‐and‐mortar businesses like Barnes and Noble, Borders,
and Waterstones. Management at the traditional companies responded by having their IS support personnel build
Web sites to compete. But upstart Amazon.com moved ahead, keeping its leadership position on the Web by lever-
aging its business model into other marketplaces, such as music, electronics, health and beauty products, lawn and
garden products, auctions, tools and hardware, and more. It cleared the protability hurdle by achieving a good
mix of IS and business basics: capitalizing on operational efciencies derived from inventory software and smarter
storage, cost cutting, and effectively partnering with such companies as Toys “R” Us Inc. and Target Corporation. 2
More recently, Amazon.com changed the basis of competition in another market, but this time it was the Web ser-
vices business. Amazon.com Web services offers clients the extensive technology platform used for Amazon.com
but in an on‐demand fashion for developing and running the client’s own applications. Shoe retailer Zappos.com
challenged Amazon’s business model, in part by coupling a social business strategy with exemplary service and
sales. It was so successful that Amazon.com bought Zappos. Likewise, Google built a business that is revolutionizing the way information is found. Google began in 1999
as a basic search company but its managers quickly learned that its unique business model could be leveraged
for future success in seemingly unrelated areas. The company changed the way people think about Web content
by making it available in a searchable format with an incredibly fast response time and in a host of languages.
Further, Google’s keyword‐targeted advertising program revolutionized the way companies advertise. Then Google
expanded, offering a suite of Web‐based applications, such as calendaring, ofce tools, e‐mail, collaboration, shopping, and maps and then enhanced the applications further by combining them with social tools to increase
collaboration. Google Drive is one of the most popular le‐sharing tools and Gmail one of the most popular email
apps. In 2015, Google’s mission was to “organize the world’s information and make it universally accessible and
useful.” It is offering its customers very inexpensive ber connections. In so doing, Google further expanded into infrastructure and on‐demand services. 3
These and other online businesses are able to succeed where traditional companies have not, in part because their
management understood the power of information, IS, and the Web. These exemplary online businesses aren’t suc-
ceeding because their managers could build Web pages or assemble an IS network. Rather, the executives in these
new businesses understand the fundamentals of managing and using information and can marry that knowledge
with a sound, unique business vision to dominate their intended market spaces. The goal of this book is to provide the foundation to help the general business manager become a knowledge-
able participant in IS decisions because any IS decision in which the manager doesn’t participate can greatly affect
the organization’s ability to succeed in the future. This introduction outlines the fundamental reasons for taking the
initiative to participate in IS decisions. Moreover, because effective participation requires a unique set of manage-
rial skills, this introduction identies the most important ones. These skills are helpful for making both IS decisions
and all business decisions. We describe how managers should participate in the decision‐making process. Finally,
this introduction presents relevant models for understanding the nature of business and information systems. These
models provide a framework for the discussions that follow in subsequent chapters.
The Case for Participating in Decisions about Information Systems
In today’s business environment, maintaining a back‐ofce view of technology is certain to cost market share and
could ultimately lead to the failure of the organization. Managers who claim ignorance of IS can damage their
reputation. Technology has become entwined with all the classic functions of business—operations, marketing,
accounting, nance—to such an extent that understanding its role is necessary for making intelligent and effec-
tive decisions about any of them. Furthermore, a general understanding of key IS concepts is possible without the
extensive technological knowledge required just a few years ago. Most managers today have personal technology
2
Robert Hof, “How Amazon Cleared the Profitability Hurdle” (February 4, 2002), http://www.bloomberg.com/bw/stories/2002-02-03/h ow-amazon-
cleared-the-profitability-hurdle (accessed on October 29, 2015).
3 For more information on the latest services by these two companies, see http://aws.amazon.com/ec2 and http://www.google.com/enterprise/cloud/.
Copyright © 2016 John Wiley & Sons, Inc. 3 The Case for Participating in Decisions about Information Systems
such as a smart phone or tablet that is more functional than many corporate‐supported personal computers provided
by enterprises just a few years ago. In fact, the proliferation of personal technologies makes everyone a “pseudo‐
expert.” Each individual must manage applications on smart phones, make decisions about applications to purchase,
and procure technical support when the systems fail. Finally, with the robust number of consumer applications
available on the Web, many decisions historically made by the IS group are increasingly being made by individuals
outside that group, sometimes to the detriment of corporate objectives. Therefore, understanding basic fundamentals about using and managing information is worth the investment of
time. The reasons for this investment are summarized in Figure I-1 and are discussed next.
A Business View of Critical Resources
Information technology (IT) is a critical resource for today’s businesses. It both supports and consumes a signicant
amount of an organization’s resources. Just like the other three major types of business resources—people, money,
and machines—it needs to be managed wisely. IT spending represents a signicant portion of corporate budgets. Worldwide IT spending topped $3.7 trillion in
2014. It is projected to continue to increase. 4
A Gartner study of where this money goes groups spending into ve
categories including devices (e.g., PCs, tablets, and mobile phones), data center systems (e.g., network equipment,
servers, and storage equipment), enterprise software and apps (e.g., companywide software applications), IT ser-
vices (e.g., support and consulting services), and telecommunications (e.g., the expenses paid to vendors for voice and data services). Resources must return value, or they will be invested elsewhere. The business manager, not the IS specialist,
decides which activities receive funding, estimates the risk associated with the investment, and develops metrics
for evaluating the investment’s performance. Therefore, the business manager needs a basic grounding in managing
and using information. On the ip side, IS managers need a business view to be able to explain how technology
impacts the business and what its trade‐offs are.
People and Technology Work Together
In addition to nancial issues, managers must know how to mesh technology and people to create effective work
processes. Collaboration is increasingly common, especially with the rise of social networking. Companies are
reaching out to individual customers using social technologies such as Facebook, Twitter, Reddit, Renren, YouTube,
and numerous other tools. In fact, Web 2.0 describes the use of the World Wide Web applications that incorporate
information sharing, user‐centered design, interoperability, and collaboration among users. Technology facilitates
FIGURE I-1
Reasons why business managers should participate in information systems decisions.
Reasons
IS must be managed as a critical resource since it permeates almost every aspect of business.
IS enable change in the way people work both inside and outside of the enterprise.
IS are at the heart of integrated Internet‐based solutions that are replacing standard business processes.
IS enable or inhibit business opportunities and new strategies.
IS can be used to combat business challenges from competitors.
IS enable customers to have greater pull on businesses and communities by giving them new options for voicing their
concerns and opinions using social media.
IS can support data‐driven decision making.
IS can help ensure the security of key assets.
4
http://www.gartner.com/newsroom/id/2959717/ (accessed March 5, 2015).
Copyright © 2016 John Wiley & Sons, Inc. 4 Introduction
the work that people do and the way they interact with each other. Appropriately incorporating IS into the design
of a business model enables managers to focus their time and resources on issues that bear directly on customer
satisfaction and other revenue‐ and prot‐generating activities. Adding a new IS to an existing organization, however, requires the ability to manage change. Skilled business
managers must balance the benets of introducing new technology with the costs associated with changing the
existing behaviors of people in the workplace. There are many choices of technology solutions, each with a different impact. Managers’ decisions must incorporate a clear understanding of the consequences. Making this assessment
doesn’t require detailed technical knowledge. It does require an understanding of short‐term and long‐term con-
sequences risk mitigation, and why adopting new technology may be more appropriate in some instances than in
others. Understanding these issues also helps managers know when it may prove effective to replace people with technology at certain steps in a process.
Integrating Business with Information Systems
IS are integrated with almost every aspect of business and have been for quite some time. For example, the CTO of
@WalmartLabs, Jeremy King, wrote in a blog,
There used to be a big distinction between tech companies: those that develop enterprise technology for businesses,
and the global companies that depend on those products. But that distinction is now diminishing for this simple reason:
every global company is becoming a tech company. . . . w re seeing technology as a critical component for business success. 5
Walmart built platforms to support all of its ecommerce and digital shopping experiences around the world.
Walmart’s teams created a new search engine to enable engaging and efcient ways for on‐line customers to nd
items in inventory. IS placed information in the hands of Walmart associates so that decisions could be made closer
to the customer. IS simplied organizational activities and processes such as moving goods, stocking shelves, and
communicating with suppliers. For example, handheld scanners provide oor associates with immediate and real‐
time access to inventory in their store and the ability to locate items in surrounding stores, if necessary.
Opportunities and New Strategies Derived from Rapid Changes in Technology
The proliferation of new technologies creates a business environment lled with opportunities. The rate of adop-
tion of these new technologies has increased due in part to the changing demographics of the workforce and the
integration of “ digital natives,” individuals whose entire lives have been lived in an era with Internet availability.
Therefore digital natives are completely uent in the use of personal technologies and the Web. Even today, inno-
vative uses of the Internet produce new types of online businesses that keep every manager and executive on alert.
New business opportunities spring up with little advance warning. The manager’s role is to frame these oppor-
tunities so that others can understand them, evaluate them against existing business needs and choices, and then
pursue those that t with an articulated business strategy. The quality of the information at hand affects the quality
of both decisions and their implementation. Managers must develop an understanding of what information is cru-
cial to the decisions, how to get it, and how to use it. They must lead the changes driven by IS.
Competitive Challenges
Competitors come from both expected and unexpected places. General managers are in the best position to see the
emerging threats and utilize IS effectively to combat ever‐changing competitive challenges. Further, general man-
agers are often called on to demonstrate a clear understanding of how their own technology programs and products
5 Jeremy King, “Why Every Company Is a Tech Company” (November 21, 2013), http://www.walmartlabs.com/2013/11/21/why‐every‐compan y‐is‐a‐
tech‐company‐by‐jeremy‐king‐cto‐of‐walmartlabs (accessed August 18, 2015).
Copyright © 2016 John Wiley & Sons, Inc. 5 What If a Manager Doesn’t Participate?
compare with those of their competitors. A deep understanding of the capabilities of the organization coupled with
existing IS can create competitive advantages and change the competitive landscape for the entire industry. Customer Pull
With the emergence of social networks like Facebook, microblogs like Twitter, and other Web applications like
Yelp, businesses have had to redesign their existing business models to account for the change in power now
wielded by customers and others in their communities. Social media and other web apps have given powerful
voices to customers and communities, and businesses must listen. Redesigning the customer experience when inter-
acting with a company is paramount for many managers and the key driver is IS. Social IT enables new and often
deeper relationships with a large number of customers, and companies are learning how to integrate and leverage
this capability into existing and new business models.
Data‐Driven Decision Making
Managers are increasingly using evidence‐based management to make decisions based on data gathered from
experiments, internal les, and other relevant sources. Data‐driven decision making, based on new techniques for
analytics, data management, and business intelligence, has taken on increased importance. Social media have cre-
ated a rich stream of real‐time data that gives managers increased insights to the impact of decisions much faster
than traditional systems. Mid‐course corrections are much easier to make. Predictive and prescriptive analytics give
suggestions that are eerily close to what happens. Big data stores can be mined for insights that were unavailable
with traditional IS, creating competitive advantage for companies with the right tools and techniques. Securing Key Assets
As the use of the Internet grows, so does the opportunity for new and unforeseen threats to company assets. Taking measures to ensure the security of these assets is increasingly important. But decisions about security measures
also impact the way IS can be used. It’s possible to put so much security around IT assets that they are locked down
in a manner that gets in the way of business. At the same time, too little security opens up the possibility of theft,
hacking, phishing, and other Web‐based mischief that can disrupt business. Managers must be involved in decisions
about risk and security to ensure that business operations are in sync with the resulting security measures.
What If a Manager Doesn’t Participate?
Decisions about IS directly affect the prots of a business. The basic formula Prot = Revenue − Expenses can
be used to evaluate the impact of these decisions. Adopting the wrong technologies can cause a company to miss
business opportunities and any revenues those opportunities would generate. For example, inadequate IS can cause
a breakdown in servicing customers, which hurts sales. Poorly deployed social IT resources can badly damage
the reputation of a strong brand. On the expense side, a miscalculated investment in technology can lead to over-
spending and excess capacity or underspending and restricted opportunity. Inefcient business processes sustained
by ill‐tting IS also increase expenses. Lags in implementation or poor process adaptation reduces prots and there-
fore growth. IS decisions can dramatically affect the bottom line. Failure to consider IS strategy when planning business strategy and organizational strategy leads to one of three
business consequences: (1) IS that fail to support business goals, (2) IS that fail to support organizational systems,
and (3) a misalignment between business goals and organizational capabilities. These consequences are discussed
briey in the following section and in more detail in later chapters. The driving questions to consider are the poten-
tial effects on an organization’s ability to achieve its business goals. How will the consequences impact the way
people work? Will the organization still be able to implement its business strategy?
Copyright © 2016 John Wiley & Sons, Inc. 6 Introduction
Information Systems Must Support Business Goals
IS represent a major investment for any rm in today’s business environment. Yet poorly chosen IS can actually
become an obstacle to achieving business goals. The results can be disastrous if the systems do not allow the orga-
nization to realize its goals. When IS lack the capacity needed to collect, store, and transfer critical information for
the business, decisions can be impacted and options limited. Customers will be dissatised or even lost. Production
costs may be excessive. Worst of all, management may not be able to pursue desired business directions that are
blocked by inappropriate IS. Victoria’s Secret experienced this problem when a Superbowl ad promoting an online
fashion show generated so many inquiries to its Web site that the Web site crashed. Spending large amounts of
money on the advertisement was wasted when potential customers could not access the site. Likewise, Toys “R”
Us experienced a similar calamity when its well‐publicized Web site was unable to process and fulll orders fast
enough one holiday season. It not only lost those customers, but it also had a major customer‐relations issue to manage as a result. Information Systems Must Support Organizational Systems
Organizational systems represent the fundamental elements of a business—its people, work processes, tasks, struc-
ture, and control systems—and the plan that enables them to work efciently to achieve business goals. If the
company’s IS fail to support its organizational systems, the result is a misalignment of the resources needed to
achieve its goals. For example, it seems odd to think that a manager might add functionality to a corporate Web
site without providing the training the employees need to use the tool effectively. Yet, this mistake—and many
more costly ones—occurs in businesses every day. Managers make major IS decisions without informing all the
staff of resulting changes in their daily work. For example, an enterprise resource planning (ERP) system often
dictates how many business processes are executed and the organizational systems must change to reect the new
processes. Deploying technology without thinking through how it actually will be used in the organization—who
will use it, how they will use it, and how to make sure the applications chosen will actually accomplish what is
intended—results in signicant expense. In another example, a company may decide to block access to the Internet,
thinking that it is prohibiting employees from accessing offensive or unsecure sites. But that decision also means
that employees can’t access social networking sites that may be useful for collaboration or other Web‐based appli-
cations that may offer functionality to make the business more efcient. The general manager, who, after all, is charged with ensuring that company resources are used effectively,
must guarantee that the company’s IS support its organizational systems and that changes made in one system are
reected in the other. For example, a company that plans to allow employees to work remotely needs an information
system strategy compatible with its organizational strategy. Desktop PCs located within the corporate ofce aren’t
the right solution for a telecommuting organization. Instead, laptop computers or tablets with applications that are
accessible online anywhere and anytime and networks that facilitate information sharing are needed. Employees
may want to use tablets or smart phones remotely, too, and those entail a different set of IS processes. If the orga-
nization allows the purchase of only desktop PCs and builds systems accessible from desks within the ofce, the
telecommuting program is doomed to failure.
Skills Needed to Participate Effectively in Information
Technology Decisions
Participating in IT decisions means bringing a clear set of skills to the table. All managers are asked to take on
tasks that require different skills at different times. Those tasks can be divided into three types: visionary tasks, or
those that provide leadership and direction for the group; informational/interpersonal tasks, or those that provide
information and knowledge the group needs to be successful; and structural tasks, those that organize the group.
Figure I-2 lists basic skills required of managers who wish to participate successfully in key IT decisions. Not only
does this list emphasize understanding, organizing, planning, and solving the business needs of the organization,
but also it is an excellent checklist for all managers’ professional growth.
Copyright © 2016 John Wiley & Sons, Inc. 7 Skills Needed to Participate Effectively in Information Technology Decisions
These skills may not look much different from those required of any successful manager, which is the main
point of this book: General managers can be successful participants in IS decisions without an extensive technical
background. General managers who understand a basic set of IS concepts and who have outstanding managerial
skills, such as those listed in Figure I-2, are ready for the digital economy.
How to Participate in Information Systems Decisions
Technical wizardry isn’t required to become a knowledgeable participant in the IS decisions of a business. Man-
agers need curiosity, creativity, and the condence to ask questions in order to learn and understand. A solid frame-
work that identies key management issues and relates them to aspects of IS provides the background needed to
participate in business IS decisions. The goal of this book is to provide that framework. The way in which managers use and manage information is
directly linked to business goals and the business strategy driving both organizational and IS decisions. Aligning
business and IS decisions is critical. Business, organizational, and information strategies are fundamentally linked in what is called the Information Systems Strategy Triangle, discussed in the next chapter. Failing to understand this
relationship is detrimental to a business. Failing to plan for the consequences in all three areas can cost a manager
his or her job. This book provides a foundation for understanding business issues related to IS from a managerial
perspective. Organization of the Book
To be knowledgeable participants, managers must know about both using and managing information. The rst
ve chapters offer basic frameworks to make this understanding easier. Chapter 1 uses the Information Systems
Strategy Triangle framework to discuss alignment of IS and the business. This chapter also provides a brief over-
view of relevant frameworks for business strategy and organizational strategy. It is provided as background for
those who have not formally studied organization theory or business strategy. For those who have studied these areas, this chapter is a brief refresher of major concepts used throughout the remaining chapters of the book.
FIGURE I-2
Skills for successful IT use by managerial role.
Managerial Role Skills
Visionary Creativity
Curiosity Condence
Focus on business solutions
Flexibility
Informational and Interpersonal Communication
ListeningInformation gathering
Interpersonal skills
Structural Project management
Analytical
OrganizationalPlanningLeading
Controlling
Copyright © 2016 John Wiley & Sons, Inc. 8 Introduction
Subsequent chapters provide frameworks and sets of examples for understanding the links between IS and business
strategy (Chapter 2), links between IS and organizational strategy (Chapter 3), collaboration and individual work
(Chapter 4), and business processes (Chapter 5). The rest of the text covers issues related to the business manager’s role in managing IS itself. These chapters
are the building blocks of an IS strategy. Chapter 6 provides a framework for understanding the four components
of IS architecture: hardware, software, networks, and data. Chapter 7 discusses how managers might participate in
decisions about IS security. Chapter 8 focuses on the business of IT with a look at IS organization, funding models,
portfolios, and monitoring options. Chapter 9 describes the governance of IS resources. Chapter 10 explores sourc-
ing and how companies provision IS resources. Chapter 11 focuses on project and change management. Chapter 12
concerns business intelligence, knowledge management, and analytics and provides an overview of how companies
manage knowledge and create a competitive advantage using business analytics. And nally, Chapter 13 discusses
the ethical use of information and privacy. Basic Assumptions
Every book is based on certain assumptions, and understanding those assumptions makes a difference in interpret-
ing the text. The rst assumption made by this text is that managers must be knowledgeable participants in the IS
decisions made within and affecting their organizations. That means that the general manager must develop a basic
understanding of the business and technology issues related to IS. Because technology changes rapidly, this text
also assumes that today’s technology is different from yesterday’s technology. In fact, the technology available
to readers of this text today might even differ signicantly from that available when the text was being written.
Therefore, this text focuses on generic concepts that are, to the extent possible, technology independent. It provides
frameworks on which to hang more up‐to‐the‐minute technological evolutions and revolutions, such as new uses of
the Web, new social tools, or new cloud‐based services. We assume that the reader will supplement the discussions
of this text with current case studies and up‐to‐date information about the latest technology. A second, perhaps controversial, assumption is that the roles of a general manager and of an IS manager require
different skill sets and levels of technical competency. General managers must have a basic understanding of IS in
order to be a knowledgeable participant in business decisions. Without that level of understanding, their decisions
may have serious negative implications for the business. On the other hand, IS managers must have more in‐depth
knowledge of technology so they can partner with general managers who will use the IS. As digital natives take on increasingly more managerial roles in corporations, this second assumption may change—all managers may need
deeper technical understanding. But for this text, we assume a different, more technical skill set for the IS manager
and we do not attempt to provide that here. Assumptions about Management
Although many books have been written describing the activities of managers, organizational theorist Henry
Mintzberg offers a view that works especially well with a perspective relevant to IS management. Mintzberg’s
model describes management in behavioral terms by categorizing the three major roles a manager lls: interper-
sonal, informational, and decisional (see Figure I-3). This model is useful because it considers the chaotic nature of
the environment in which managers actually work. Managers rarely have time to be reective in their approaches
to problems. They work at an unrelenting pace, and their activities are brief and often interrupted. Thus, quality
information becomes even more crucial to effective decision making. The classic view is often seen as a tactical
approach to management, whereas some describe Mintzberg’s view as more strategic. Assumptions about Business
Everyone has an internal understanding of what constitutes a business, which is based on readings and experi-
ences with different rms. This understanding forms a model that provides the basis for comprehending actions,
interpreting decisions, and communicating ideas. Managers use their internal model to make sense of otherwise
Copyright © 2016 John Wiley & Sons, Inc. 9 Basic Assumptions
FIGURE I-3 Managers’ roles.
Source: Adapted from H. Mintzberg,
The Nature of Managerial Work (New York: Harper & Row, 1973).
Type of Roles Manager’s Roles IS Examples
Interpersonal Figurehead CIO greets touring dignitaries. Leader IS manager puts in long hours to help motivate project team to complete project on schedule in an environment of heavy budget cuts.
Liaison CIO works with the marketing and human resource vice presidents to make sure that the reward and compensation system is changed to
encourage use of the new IS supporting sales.
Informational Monitor Division manager compares progress on IS project for the division with milestones developed during the projec s initiation and feasibility phase.
Disseminator CIO conveys organizatio s business strategy to IS department and demonstrates how IS strategy supports the business strategy.
Spokesperson IS manager represents IS department at organizatio s recruiting fair.
Decisional Entrepreneur IS division manager suggests an application of a new technology that improves the divisio s operational efciency.
Disturbance handler IS division manager, as project team leader, helps resolve design disagreements between division personnel who will be using the system
and systems analysts who are designing it.
Resource allocator CIO allocates additional personnel positions to various departments based upon the business strategy.
Negotiator IS manager negotiates for additional personnel needed to respond to recent user requests for enhanced functionality in a system that is being
implemented.
chaotic and random activities. This book uses several conceptual models of business. Some take a functional view
and others take a process view. Functional View
The classical view of a business is based on the functions that people perform, such as accounting, nance,
marketing, operations, and human resources. The business organizes around these functions to coordinate them and
to gain economies of scale within specialized sets of tasks. Information rst ows vertically up and down between
line positions and management; after analysis, it may be transmitted across other functions for use elsewhere in the
company (see Figure I-4).
Process View
Michael Porter of Harvard Business School describes a business in terms of the primary and support activities that
are performed to create, deliver, and support a product or service. The primary activities are not limited to specic
functions, but rather are cross‐functional processes (see Figure I-5). For example, an accounts payable process
Operations Accounting Sales
Executive Management
Marketing Support
Information flows
FIGURE I-4
Hierarchical view of the rm.
Copyright © 2016 John Wiley & Sons, Inc. 10 Introduction
might involve steps taken by other departments that generate obligations, which the accounting department pays.
Likewise, the product creation process might begin with an idea from R&D, which is transferred to an operations
organization that builds the actual product and involves marketing to get the word out, sales to sell and deliver the
product, and support to provide customer assistance as needed. This view takes into account the activities in each
functional area that are needed to complete a process, and any organization can be described by the processes it
performs. Improving coordination among activities increases business prot. Organizations that effectively manage
core processes across functional boundaries are often the industry leaders because they have made efciencies that
are not visible from the functional viewpoint. IS are often the key to process improvement and cross‐functional coordination. Both the process and functional views are important to understanding IS. The functional view is useful when sim-
ilar activities must be explained, coordinated, executed, or communicated. For example, understanding a marketing
information system means understanding the functional approach to business in general and the marketing function
in particular. The process view, on the other hand, is useful when examining the ow of information throughout a
business. For example, understanding the information associated with order fulllment, product development, or
customer service means taking a process view of the business. This text assumes that both views are important for participating in IS decisions. Assumptions about Information Systems
Consider the components of an information system from the manager’s viewpoint rather than from the technolo-
gist’s viewpoint. Both the nature of information (hierarchy and economics) and the context of an information
system must be examined to understand the basic assumptions of this text.
Information Hierarchy The terms data, information , and knowledge are often used interchangeably, but have signicant and discrete mean-
ings within the knowledge management domain (and are more fully explored in Chapter 12). Tom Davenport, in his book Information Ecology , pointed out that getting everyone in any given organization to agree on common de-
nitions is difcult. However, his work (summarized in Figure I-6) provides a nice starting point for understanding
the subtle but important differences. The information hierarchy begins with data, or simple observations; data are sets of specic, objective facts or
observations, such as “inventory contains 45 units.” Standing alone, such facts have no intrinsic meaning but can be
easily captured, transmitted, and stored electronically.
Accounting
Operations
Marketing Sales
Support
Executive Management
Accounts Payable Process
Product Development Process Order Fulfillment Process
Information Flows
FIGURE I-5 Process view of the rm: Cross‐functional processes.
Copyright © 2016 John Wiley & Sons, Inc. 11 Basic Assumptions
Information is data endowed with relevance and purpose. 6
People turn data into information by organizing data
into some unit of analysis (e.g., dollars, dates, or customers). For example, a mashup of location data and housing
prices adds something beyond what the data provide individually, and that makes it information. A mashup is the
term used for applications that combine data from different sources to create a new application on the Web. To be relevant and have a purpose, information must be considered within the context in which it is received
and used. Because of differences in context, information needs vary across functions and hierarchical levels. For
example, when considering functional differences related to a sales transaction, a marketing department manager
may be interested in the demographic characteristics of buyers, such as their age, gender, and home address. A man-
ager in the accounting department probably won’t be interested in any of these details, but instead wants to know details about the transaction itself, such as method of payment and date of payment. Similarly, information needs may vary across hierarchical levels. These needs are summarized in Figure I-7
and reect the different activities performed at each level. At the supervisory level, activities are narrow in scope
and focused on the production or the execution of the business’s basic transactions. At this level, information is
focused on day‐to‐day activities that are internally oriented and accurately dened in a detailed manner. The activ-ities of senior management are much broader in scope. Senior management performs long‐term planning and needs FIGURE I-6
Comparison of data, information, and knowledge.
Source: Adapted from Thomas Davenport,
Information Ecology (New York: Oxford University Press, 1997).
Data Information Knowledge
Denition Simple observations of the state of the world Data endowed with
relevance and purposeInformation from the human mind
(includes reection, synthesis,
context)
Characteristics • Easily structured • Easily captured on machines
• Often quantied
• Easily transferred
• Mere facts • Requires unit of analysis
• Data that have been
processed
• Human mediation necessary • Hard to structure
• Difcult to capture on machines
• Often tacit
• Hard to transfer
Example Daily inventory report of all inventory items sent to the
CEO of a large manufacturing company Daily inventory report
of items that are below
economic order quantity
levels sent to inventory
managerInventory manage s knowledge of
which items need to be reordered
in light of daily inventory report,
anticipated labor strikes, and
a ood in Brazil that affects the supply of a major component
6
Peter F. Drucker, “The Coming of the New Organization,” Harvard Business Review (January–February 1988), 45–53.
Top Management Middle Management Supervisory and Lower‐Level Management
Time Horizon Long: years Medium: weeks, months, years Short: day to day
Level of Detail Highly aggregated Less accurate
More predictive Summarized
IntegratedOften nancial Very detailed
Very accurateOften nonnancial
Source Primarily external Primarily internal with limited externalInternal
Decision Extremely judgmental Uses creativity and analytical skills Relatively judgmental Heavily reliant on rules
FIGURE I-7 Information characteristics across hierarchical levels.
Source: G. Adapted from Anthony Gorry and Michael S. Scott Morton, “A Framework for Management Information Systems,”
Sloan Management Review 13, no. 1, 55–70.
Copyright © 2016 John Wiley & Sons, Inc. 12 Introduction
information that is aggregated, externally oriented, and more subjective than supervisors require. The information
needs of middle managers in terms of these characteristics fall between the needs of supervisors and of senior
management. Because information needs vary across levels, a daily inventory report of a large manufacturing rm
may serve as information for a low‐level inventory manager whereas the CEO would consider such a report to be
merely data. The context in which the report is used must be considered in determining whether it is information. Knowledge is information that is synthesized and contextualized to provide value. It is information with the
most value. Knowledge consists of a mix of contextual information, values, experiences, and rules. For example,
the mashup of locations and housing prices means one thing to a real estate agent, another thing to a potential buyer,
and yet something else to an economist. It is richer and deeper than information and more valuable because someone
thought deeply about that information and added his or her own unique experience and judgment. Knowledge also
involves the synthesis of multiple sources of information over time. 7
The amount of human contribution increases
along the continuum from data to information to knowledge. Computers work well for managing data but are less
efcient at managing information and knowledge. Some people think there is a fourth level in the information hierarchy: wisdom. Wisdom is knowledge fused
with intuition and judgment that facilitates the ability to make decisions. Wisdom is that level of the information
hierarchy used by subject matter experts, gurus, and individuals with a high degree of experience who seem to “just
know” what to do and how to apply the knowledge they gain. This is consistent with Aristotle’s view of wisdom as
the ability to balance different and conicting elements together in ways that are only learned through experience.
Economics of Information versus Economics of Things In their groundbreaking book, Blown to Bits, Evans and Wurster argued that every business is in the information
business. 8
Even those businesses not typically considered information businesses have business strategies in which
information plays a critical role. The physical world of manufacturing is shaped by information that dominates
products as well as processes. For example, an automobile contains as much computing power as a personal com-
puter. Information‐intensive processes in the manufacturing and marketing of the automobile include design,
market research, logistics, advertising, and inventory management. The automobile itself, with its millions of lines
of code, has become a computer on wheels with specialized computers and sensors alerting the driver of its health
and road conditions. When taken in for service, maintenance crews simply plug an electronic monitor into the auto-
mobile to analyze and identify worn parts or other areas in need of upgrades and repair. As our world is reshaped by information‐intensive industries, it becomes even more important for business strat-
egies to differentiate the timeworn economics of things from the evolving economics of information. Things wear
out; things can be replicated at the expense of the manufacturer; things exist in a tangible location. When sold, the
seller no longer owns the thing. The price of a thing is typically based on production costs. In contrast, information
never wears out, although it can become obsolete or untrue. Information can be replicated at virtually no cost
without limit; information exists in the ether. When sold, the seller still retains the information, but this ownership
provides little value if the ability of others to copy it is not limited. Finally, information is often costly to produce
but cheap to reproduce. Rather than pricing it to recover the sunk cost of its initial production, its price is typically
based on its value to the consumer. Figure I-8 summarizes the major differences between the economics of goods and the economics of information. Evans and Wurster suggest that traditionally the economics of information has been bundled with the economics
of things. However, in this Information Age, rms are vulnerable if they do not separate the two. The Encyclopedia
Britannica story serves as an example. Bundling the economics of things with the economics of information made
it difcult for Encyclopedia Britannica to gauge two serious threats. The rst threat was posed by Encarta, an entire
encyclopedia on a CD‐ROM that was given away to promote the sale of computers and peripherals. The second
was Wikipedia, which is freely available to all and updated on a nearly real‐time basis continuously by thousands of
7 Thomas H. Davenport, Information Ecology (New York: Oxford University Press, 1997), 9–10.
8 Philip Evans and Thomas Wurster, Blown to Bits (Boston: Harvard Business School Press, 2000).
Copyright © 2016 John Wiley & Sons, Inc. 13 Economics of Information versus Economics of Things
volunteers; currently Wikipedia reports that it holds over 4.9 million articles, receives 10 edits per second globally,
and boasts 750 new pages added each day. 9
In contrast, Encyclopedia Britannica published volumes every several
years and the price was between $1,500 and $2,200, covering printing and binding ($250) and sales commissions ($500 to $600). 10
Britannica focused on its centuries‐old tradition of providing information in richly bound tomes sold to the public
through a well‐trained sales force. Only when it was threatened with its very survival did Encyclopedia Britannica grasp the need to separate the economics of information from economics of things and sell bits of information
online. Clearly, Encyclopedia Britannica’s business strategy, like that of many other companies, needed to reect
the difference between the economics of things from the economics of information.
Internet of Things
More recently, a new concept has emerged to describe the explosive growth in the data generated by sensors
traveling over the Web. The Internet of things (IoT) is the term used to refer to machines and sensors talking to
each other over the network, taking Evans and Wurster’s concepts even further. Although the term IoT was coined in1999, 11
it was not widely discussed until the current decade. The earliest example of its functions was reported
before the Internet even existed—in a Coke machine at Carnegie Mellon University in the mid‐1970s. Staff mem-
bers and students in the Computer Science Department were able to use a network connecting a minicomputer
and sensors in the machine to monitor not only the machine’s inventory but even which button to push for the coldest bottles. 12
A more broadly used early application of IoT was provided by Otis Elevator in the late 1980s and later copied
by most other elevator companies. 13
Sensors in elevators send alerts over a network to a service center’s computer
when parts need replacing, and service technicians arrive without the builder owner knowing about the potential
problem. Extending IoT even further, today’s elevator systems alert handheld devices of nearby repair technicians
who then visit the elevator to make the repair. Devices may connect to the Internet over a wireless connection or through a hard‐wired connection. Many say that we are on the brink of a new revolution that will be as impactful as the popularization of the
World‐Wide Web. The IoT has already been applied to large number of “things”—extending to home appliances,
automobiles, thermostats, lighting, pets, and even people. 14
Many people can already perform futuristic functions
using smartphone apps. They can remotely check the status of their heart monitor, tire pressure, or subway train’s
location. They can locate a lost pet or valuable object. They can reset their thermostat, turn off lights, and record a
program on their DVR even after having left for vacation.
9 Wikipedia Statistics, http://en.wikipedia.org/wiki/Wikipedia:Statistics (accessed August 18, 2015).
10 Evans and Wurster, Blown to Bits.
11 K. Ashton, “That ‘Internet of Things’ Thing,” RFID Journal (June 22, 2009), http://www.rfidjournal.com/articles/view?4986 (accessed May 26, 2015).
12 Attributed to The Carnegie Mellon University Computer Science Department Coke Machine, “The ‘Only’ Coke Machine on the Internet,” https://www.
cs.cmu.edu/~coke/history_long.txt (accessed May 26, 2015). 13 D. Freedman, “The Myth of Strategic IS,” CIO Magazine (July 1991), 42–48.
14 Internet of Things, Whatis.com, http://whatis.techtarget.com/definition/Internet‐of‐Things (accessed May 26, 2015).
FIGURE I-8
Comparison of the economics of things with the economics of information.
Things Information
Wear out Does t wear out but can become obsolete or untrue
Are replicated at the expense of the manufacturer Is replicated at almost zero cost without limit
Exist in a tangible location Does not physically exist
When sold, possession changes hands When sold, seller may still possess and sell again
Price based on production costs Price based on value to consumer
Copyright © 2016 John Wiley & Sons, Inc. 14 IntroductionManagement
Information Systems
People Technology Process
FIGURE I-9 System hierarchy.
Social Business Lens
The explosion of consumer‐based technologies, coupled with applications such as Facebook, Renren, Sina
Weibo, Twitter, LinkedIn, YouTube, Foursquare, Skype, Pinterest, and more have brought into focus the concept of
a social business. Some call this trend the
consumerization of technology
. Consumerization
means that technol-
ogies such as social tools, mobile phones, and Web applications targeted at individual, personal users are cre-
ating pressures for companies in new and unexpected ways. At the same time, technologies initially intended for
the corporation, like cloud computing, are being retooled and “consumerized” to appeal to individuals outside
the corporation.
In this text, we use the term
social business to refer to an enterprise using social IT for business applications,
activities and processes. We sometimes say that a social business has infused social capabilities into business
processes.
Social business is permeating every facet of business. There are new business models based on a social IT
platform that offer new ways of connecting with stakeholders in functions such as governing, collaborating, doing
work, and measuring results. In this book, we are particular about the terminology we use.
Social IT
is the term we
use for all technologies in this space. We de ne
social IT as the technologies used for people to collaborate, net-
work, and interact over the Web. These include social networks and other applications that provide for interaction
between people.
Many use the term
social media as an overarching term for this space, but increasingly, social media
refers to
the marketing and sales applications of social IT, and we use it that way. Social networks are a speci c type of tool,
like Facebook, Ning, and similar tools.
Social networking
is the use of these types of social IT tools in a community.
As of the writing of this text, the social space is still like the Wild West; there are no widely accepted conventions
about the terms and their meanings or the uses and their impacts. But we have enough experience with social
IT that we know it s a major force bursting on to the enterprise scene and it must be addressed in discussions of
managing and using information systems.
Look in chapters for the feature “Social Business Lens” where we explore one topic related to that chapter from
a social business perspective.
The reader might already be using the IoT with one or more of these apps. However, vendors tell us we “ain ’ t
seen nothing yet.” The potential impact of IoT is limited by the number of objects connected and apps available to
monitor and control them. As the number of devices directly connected to the Internet increases, researchers and IT
Copyright © 2016 John Wiley & Sons, Inc. 15 Summary
professionals expect an exponential increase in IoT functionality and usage. 15
In the coming years, Internet trafc
will dramatically increase along with an explosion in the amount of information generated by these devices.
System Hierarchy
Information systems are composed of three main elements: technology, people, and process (see Figure I-9). When most people use the term information system, they actually refer only to the technology element as dened by the
organization’s infrastructure. In this text, the term infrastructure refers to everything that supports the ow and
processing of information in an organization, including hardware, software, data, and network components whereas
architecture refers to the blueprint that reects strategy implicit in combining these components. Information sys-
tems (IS) are dened more broadly as the combination of technology (the “what”), people (the “who”), and process
(the “how”) that an organization uses to produce and manage information. In contrast, information technology (IT)
focuses only on the technical devices and tools used in the system. We dene information technology as all forms
of technology used to create, store, exchange, and use information. Many people use the terms IS and IT inter-
changeably. In recent years, “IT” has been more fashionable, but that changes as fashions change.
SUMMARY
Aligning information systems and business decisions is no longer an option; it’s an imperative for business. Every business ope r-
ates as an information‐based enterprise. In addition, the explosive growth of smart phones, tablets, social tools, and Web‐base d
businesses provides all managers with some experience in information systems and some idea of the complexity involved in
providing enterprise‐level systems. This highlights the need for all managers to be skilled in managing and using IS. It is no longer acceptable to delegate IS decisions to the management information systems (MIS) department alone. The
general manager must be involved to both execute business plans and protect options for future business vision. IS and business
maturity must be aligned to provide the right level of information resources to the business. This chapter makes the case for general managers’ full participation in strategic business decisions concerning IS. It out-
lines the skills required for such participation, and it makes explicit certain key assumptions about the nature of business,
management, and IS that will underlie the remaining discussions. Subsequent chapters are designed to build on these concepts
by addressing the following questions.
Frameworks and Foundations
• How should information strategy be aligned with business and organizational strategies? (Chapter 1)
• How can a business achieve competitive advantages using its IS? (Chapter 2)
• How do organizational decisions impact IS decisions? (Chapter 3)
• How is the work of the individual in an organization affected by decisions concerning IS? (Chapter 4)
• How are information systems integrated with business processes? (Chapter 5)
IS Management Issues • What are the components of an IS architecture? (Chapter 6)
• How are IS kept secure? (Chapter 7)
• How is the IT organization managed and funded? (Chapter 8)
• How are IS decisions made? (Chapter 9)
• What source should provide IS services and how and where should they be provided? (Chapter 10)
15
Jared Newman, “Right Now, the Internet of Things Is Like the Internet of the 1990s,” Fast Company (March 27, 2015I, http://www.fastcompany.
com/3044375/sector‐forecasting/the‐future‐of‐the‐internet‐of‐things‐is‐like‐the‐internet‐of‐the‐1990s (last accessed May 26, 2015).
Copyright © 2016 John Wiley & Sons, Inc. 16 Introduction
• How are IS projects managed and risks from change management mitigated? (Chapter 11)
• How is business intelligence managed within an organization? (Chapter 12)
• What ethical and moral considerations bind the uses of information in business? (Chapter 13)
KEY TERMS architecture (p. 14) data (p. 10)
digital natives (p. 4)information (p. 11)information system (p. 14)information technology (p. 14) infrastructure (p. 14)internet of things (p. 13)
knowledge (p. 12)mashup (p. 11)
social business (p. 15)social IT (p. 15)social media (p. 15)
social networking (p. 15)
Web 2.0 (p. 3)wisdom (p. 12)
Copyright © 2016 John Wiley & Sons, Inc. 17
1
chapter
The Information Systems
Strategy Triangle
In February 2015, 1
health care giant Kaiser Permanente named Dick Daniels to the CIO position and
the leadership team for the next stage of the company ’ s business strategy: to provide better health care
at lower costs. To achieve those goals, Kaiser Permanente, one of the nation ’ s largest not‐for‐pro t
health care systems with over 9.5 million members and 2014 operating revenue of $56.4 billion,
invested in numerous information systems projects aimed at streamlining operations, offering new
services, and meeting government obligations. For example, in 2014, 13% of all the medical appoint-
ments were ful lled digitally—through e‐mail—to the delight of patients who did not have to make
a trip to the doctor ’ s of ce and to the delight of doctors who were able to check in on their patients,
particularly those with chronic conditions, more frequently. Doctors particularly liked this because
their annual bonuses were based, in part, on improvements in patient health metrics such as lower
blood pressure, reduced blood sugar levels if at risk for diabetes, and improvement in cholesterol
scores rather than on the number of tests they ordered or the total billing they brought in. The organi-
zation invested heavily in video conferencing technology, mobile apps, and analytics as they nished
implementing a $4 billion electronic health records system, KP HealthConnect. KP HealthConnect began in 2003, but by 2008, all members had online access to their health
records; by 2010, all system services were available at all medical of ces and hospitals in the system;
and by 2012, all members had access to their health records on mobile devices. Kaiser Permanente
has been a regular innovator in the use of technologies, being one of the rst health care organiza-
tions to experiment with chat rooms, secure messaging, and private e‐mail correspondence between
patients, physicians, and care providers. The new system connects each member to all caregivers and
services available at Kaiser Permanente. Further, it enabled patients to participate in the health care
they received at a new level and access information directly from the system. The organizational design supported the business strategy of better health care at lower costs. 2
At the core of this strategy was a shift from a “ x‐me system” with which patients seek health care
when something is broken and needs repair to a system that was truly proactive and focused on pro-
moting health. Under the “ x‐me system,” health care was expensive and often sought too late to
The Information Systems Strategy Triangle highlights the alignment necessary between
decisions regarding business strategy, information systems, and organizational design.
This chapter reviews models of business strategy, organizational strategy and design, and
information systems strategy. It concludes with a simple framework for creating a social
business strategy.
1
http://blogs.wsj.com/cio/2015/02/09/kaiser‐permanente‐names‐richard‐dick‐daniels‐cio/; http://fortune.com/2015/04/29/kaiser ‐
ceo‐on‐healthcare/; http://fortune.com/2014/07/24/a‐health‐care‐model‐thats‐working/; Paul Gray , Omar Sawy , Guillermo Asper ,
and Magnus Thordarson , “ Realizing Strategic Value Through Center‐Edge Digital Transformation in Consumer‐Centric Industr ies ,”
MIS Quarterly Executive 12 , no. 1 ( March 2013 ) .
2 Note that the organizational design puts the organizational strategy into practice. For instance, rewarding billings, shari ng little
information, and late involvement with patients are organizational design elements of a “fix‐me” organizational strategy.
Copyright © 2016 John Wiley & Sons, Inc. 18 The Information Systems Strategy Triangle
x the problem. Instead, the Kaiser Permanente strategy focused on promoting health, enabling identication of
problems before they became serious issues. For example, those in need of more exercise may receive a prescription
to take a walk and an e‐mail reminder from health care providers to reinforce the new behavior. Staff incentive
systems were aligned with this behavior, too. Physicians were all paid a at salary and end‐of‐year bonuses if their
patients achieved better health. All caregivers were rewarded for guiding people into making behavioral choices
that were likely to keep them well. The success at Kaiser Permanente was achieved in part because of the alignment between its business strategy, its
information systems strategy, and its organization design. Physicians were part of the decision‐making processes.
Managers were involved in the design and implementation of the information systems. The decision to move from
a “x‐me system” to a “proactive health system” was not made in isolation from the organization or the information systems. The information systems (IS) department is not an island within a rm. Rather, IS manages an infrastructure
that is essential to the rm’s functioning. Further, the Kaiser Permanente case illustrates that a rm’s IS must be
aligned with the way it manages its employees and processes. For Kaiser Permanente, it was clear that not only did
the physicians need a fast, inexpensive, and useful way to communicate with patients outside of regular in‐person
appointments but also incentive systems and patient service processes had to be updated. Information systems
provided a solution in conjunction with new operational and control processes. This chapter introduces a simple framework for describing the alignment necessary with business systems and
for understanding the impact of IS on organizations. This framework is called the Information Systems Strategy
Triangle because it relates business strategy with IS strategy and organizational strategy. This chapter also presents
key frameworks from organization theory that describe the context in which IS operates as well as the business
imperatives that IS support. The Information Systems Strategy Triangle presented in Figure 1.1 suggests three key
points about strategy.
1. Successful rms have an overriding business strategy that drives both organizational strategy and IS strat-
egy. The decisions made regarding the structure, hiring practices, vendor policies, and other components of
the organizational design, as well as decisions regarding applications, hardware, and other IS components,
are all driven by the rm’s business objectives, strategies, and tactics. Successful rms carefully balance
these three strategies—they purposely design their organization and their IS strategies to complement their
business strategy.
2. IS strategy can itself affect and is affected by changes in a rm’s business and organizational design. To
perpetuate the balance needed for successful operation, changes in the IS strategy must be accompanied by
changes in the organizational strategy and must accommodate the overall business strategy. If a rm designs
its business strategy to use IS to gain strategic advantage, the leadership position in IS can be sustained only
by constant innovation. The business, IS, and organizational strategies must constantly be adjusted.
3. IS strategy always involves consequences—intended or not—within business and organizational strategies.
Avoiding harmful unintended consequences means remembering to consider business and organizational
strategies when designing IS implementation. For example, deploying tablets to employees without an
accompanying set of changes to job expectations, process design, compensation plans, and business tac-
tics will fail to achieve expected productivity improvements. Success can be achieved only by specically
designing all three components of the strategy triangle so they properly complement each other.
Business Strategy
Organizational Strategy Information Strategy
FIGURE 1.1 The Information Systems Strategy Triangle.
Copyright © 2016 John Wiley & Sons, Inc. 19 Brief Overview of Business Strategy Frameworks
Before the changes at Kaiser Permanente, incentives for doctors were misaligned with the goals of better health
care. Its IS Strategy Triangle was out of alignment at that time. Its organizational strategy (e.g., a “x‐me” system)
was not supported by the IS strategy (e.g., tracking and reporting billable procedures). Neither the organizational
strategy nor the IS strategy adequately supported their purported business strategy (helping patients at lower cost).
For Kaiser Permanente, success could be achieved only by specically designing all three components of the
strategy triangle to work together. Of course, once a rm is out of alignment, it does not mean that it has to stay that way. To correct the misalign-
ment described earlier, Kaiser Permanente used on‐line services to enable quick communications between patients,
physicians, and care providers. Further, it changed its bonus structure to focus on health rather than billing amounts.
The new systems realign people, process, and technology to provide better service, save time, and save money. What does alignment mean? The book Winning the 3‐Legged Race denes alignment as the situation in which a
company’s current and emerging business strategy is enabled and supported yet unconstrained by technology. The
authors suggest that although alignment is good, there are higher states, namely synchronization and convergence,
toward which companies should strive. With synchronization, technology not only enables current business strategy
but also anticipates and shapes future business strategy. Convergence goes one step further by exhibiting a state in
which business strategy and technology strategy are intertwined and the leadership team members operate almost
interchangeably. Although we appreciate the distinction and agree that rms should strive for synchronization and
convergence, alignment in this text means any of these states, and it pertains to the balance between organizational
strategy, IS strategy, and business strategy. 3
A word of explanation is needed here. Studying IS alone does not provide general managers with the appropriate
perspective. This chapter and subsequent chapters address questions of IS strategy squarely within the context of
business strategy. Although this is not a textbook of business strategy, a foundation for IS discussions is built on
some basic business strategy frameworks and organizational theories presented in this and the next chapter. To be
effective, managers need a solid sense of how IS are used and managed within the organization. Studying details
of technologies is also outside the scope of this text. Details of the technologies are relevant, of course, and it is
important that any organization maintain a sufcient knowledge base to plan for and adequately align with business
priorities. However, because technologies change so rapidly, keeping a textbook current is impossible. Instead, this
text takes the perspective that understanding what questions to ask and having a framework for interpreting the
answers are skills more fundamental to the general manager than understanding any particular technology. That
understanding must be constantly refreshed using the most current articles and information from experts. This text
provides readers with an appreciation of the need to ask questions, a framework from which to derive the ques-
tions to ask, and a foundation sufcient to understand the answers received. The remaining chapters build on the
foundation provided in the Information Systems Strategy Triangle.
Brief Overview of Business Strategy Frameworks A strategy is a coordinated set of actions to fulll objectives, purposes, and goals. The essence of a strategy is
setting limits on what the business will seek to accomplish. Strategy starts with a mission. A mission is a clear and
compelling statement that unies an organization’s effort and describes what the rm is all about (i.e., its purpose).
Mark Zuckerberg’s reection on the mission of Facebook provides an interesting example. Originally conceived as
a product rather than a service, the CEO of Facebook commented, “after we started hiring more people and building
out the team, I began to get an appreciation that a company is a great way to get a lot of people involved in a mission
you’re trying to push forward. Our mission is getting people to connect.” 4
In a few words, the mission statement sums up what is unique about the rm. The information in Figure 1.2 indi-
cates that even though Zappos, Amazon, and L.L. Bean are all in the retail industry, they view their missions quite
differently. For example, Zappos’ focus is on customer service, Amazon is about customer sets, and L.L. Bean is
3 F. Hogue, V. Sambamurthy, R. Zmud, T. Trainer, and C. Wilson, Winning the 3‐Legged Race (Upper Saddle River, NJ: Prentice Hall, 2005).
4 Shayndi Raice, “Is Facebook Ready for the Big Time?” The Wall Street Journal (January 14–15, 2012), B1.
Copyright © 2016 John Wiley & Sons, Inc. 20 The Information Systems Strategy Triangle
about the merchandise and treating people the right way. It’s interesting to note that although Amazon purchased
Zappos in 2009, the acquisition agreement specied that Zappos would continue to run independently of its new
parent. Today, Zappos continues to remain both culturally and physically separate from Amazon. Zappos is located
near Las Vegas, Nevada, and Amazon is in Seattle, Washington. A business strategy is a plan articulating where a business seeks to go and how it expects to get there. It is
the means by which a business communicates its goals. Management constructs this plan in response to market
forces, customer demands, and organizational capabilities. Market forces create the competitive context for the
business. Some markets, such as those faced by package delivery rms, laptop computer manufacturers, and credit
card issuers, face many competitors and a high level of competition, such that product differentiation becomes
increasingly difcult. Other markets, such as those for airlines and automobiles, are similarly characterized by
high competition, but product differentiation is better established. Customer demands comprise the wants and
needs of the individuals and companies who purchase the products and services available in the marketplace.
Organizational capabilities include the skills and experience that give the corporation a currency that can add value
in the marketplace. Consider Dell, originally a personal computer company. Initially Dell’s business strategy was to sell personal
computers directly to the customer without going through an intermediary. Reaching customers in this way was
less expensive and more responsive than selling the computers in retail stores. The Internet, combined with Dell’s
well‐designed IS infrastructure, allowed customers to electronically contact Dell, which then designed a PC for a
customer’s specic needs. Dell’s ordering system was integrated with its production system and shared information
automatically with each supplier of PC components. This IS enabled the assembly of the most current computers
without the expense of storing large inventories, and inventory uncertainties were pushed back to the vendors. Cost
savings were passed on to the customer, and the direct‐to‐customer model allowed Dell to focus its production
capacity on building only the most current products. With small prot margins and new products quickly able to
replace existing products, IS aligned with Dell’s business strategy to provide low‐cost PCs. The cost savings from
the IS was reected in the price of systems. In addition, Dell executives achieved a strategic advantage in reducing
response time, building custom computers that had one of the industry’s lowest costs, and eliminating inventories
that could become obsolete before they are sold. Thus, this business strategy was consistent with Dell’s mission of
delivering the best customer experience in the markets it serves. But things aren’t always as they seem. If the direct‐to‐customer strategy was so effective, why is Dell now
also selling its computers at major retail outlets such as Walmart, Staples, and Best Buy? It is likely that the sales
gures and prot margins were not measuring up to Dell’s stated objectives and performance targets. And Dell
has branched out to other hardware, such as printers and servers, and more recently, providing IT services. Con-
sequently, Dell adjusted its business strategy, and we can expect to see changes in its organizational design and information systems to reect its altered direction. Now consider your favorite dot‐com company. Every dot‐com company has a business strategy of delivering
its products or services over the Internet. To do so, the dot‐coms need organizations lled with individuals and
processes that support this business strategy. Their employees must be Internet savvy; that is, they must have
FIGURE 1.2
Mission statements of three retail businesses.
Company Mission Statement
Zappos To provide the best customer service possible. Internally we call this our WOW philosophy. a
Amazon We seek to be Eart s most customer‐centric company for three primary customer sets: consumer customers, seller customers and developer customers. b
L.L. Bean Sell good merchandise at a reasonable prot, treat your customers like human beings and they will always come back for more. c
a http://about.zappos.com (accessed March 19, 2015).
b http://www.amazon.com Mission Statement on Amazon Investor Relations page (accessed March 19, 2015).
c http://www.llbean.com/customerService/aboutLLBean/company_values.html (accessed March 19, 2015).
Copyright © 2016 John Wiley & Sons, Inc. 21 Brief Overview of Business Strategy Frameworks
Business Models versus Business Strategy
Some new managers confuse the concept of a business model with the concept of a business strategy. The
business strategy , as discussed in this chapter, is the coordinated set of actions used to meet the business goals
and objectives. It s the path a company takes to achieve its goals. One of the components of the business strategy
is the business model, the design of how the business will make money and how customers will get value from its
products and services. Some might argue that a business model is the outcome of strategy. * Some examples of business models commonly seen in the digital world include †
:
•
Subscription: Customers pay a recurring fee for the product or service.
•
Advertising:
Customers access the product or service for “free,” and sponsors or vendors pay fees for
advertising that goes with the product or service.
•
Cost plus: Somewhat like a traditional retailer, customers purchase the product or service for a specific price
that is usually the cost plus some markup for profit.
•
Renting/Licensing: Customers pay a fee to use the product or service for a specified period of time.
•
All‐you‐can‐Eat:
Customers pay one fee for access to as much of the product or service as they want to
consume, usually over a specific period of time.
•
Freemium: Customers get something for “free,” and the company makes money from selling customers
something after they get the giveaway. This is similar to a business model used in brick‐and‐mortar busi-
nesses that give away something or sell something for a very low price, but the customer has to pay for
refills or upgrades such as giving razors away but making money from selling razor blades.
*
For a more detailed treatment of the concepts of business models, strategy, and tactics, see Ramon Casadesus Masanell and Joan
Ricart, “From Strategy to Business Models and to Tactics,” Harvard Business School working paper 10 036, http://www.hbs.edu/
faculty/Publication%20Files/10 036.pdf (accessed August 21, 2015). †
For a list of 15 different business models, see http://www.digitalbusinessmodelguru.com/2012/12/15 business models complete
list.html (accessed August 21, 2015).
skills and knowledge that are relevant to the dot‐com business. Their processes must support the dot‐com strategy.
Imagine what would happen if the order process for their services was not Internet based. It seems silly to even
consider a dot‐com that would insist that orders be placed in person or even by telephone. The dot‐com processes
are aligned with companies ’ on‐line‐based business strategy. Further, their IS strategy must also be aligned with
their processes. It would be equally silly to expect information to be based on paper les rather than electronic les.
A classic, widely used model developed by Michael Porter still frames most discussions of business strategy. In
the next section, we review Porter ’ s generic strategies framework as well as dynamic environment strategies. 5
W e
then share questions that a general manager must answer to understand the business ’ strategy.
The Generic Strategies Framework
Companies sell their products and services in a marketplace populated with competitors. Michael Porter ’ s frame-
work helps managers understand the strategies they may choose to build a competitive advantage. In his book
Competitive Advantage , Porter claims that the “fundamental basis of above‐average performance in the long run is
sustainable competitive advantage.” 6
Porter identi ed three primary strategies for achieving competitive advantage:
(1) cost leadership, (2) differentiation, and (3) focus. These advantages derive from the company ’ s relative position
5 Another popular model by Michael Porter, the value chain, provides a useful model for discussing internal operations of an organization. Some find it a
useful model for understanding how to link two firms. This framework is used in Chapter 5 to examine business process design. For further information,
see M. Porter , Competitive Advantage
, 1st ed. ( New York : The Free Press , 1985 ) .
6 M. Porter , Competitive Advantage: Creating and Sustaining Superior Performance , 2nd ed. ( New York : The Free Press , 1998 ) .
Copyright © 2016 John Wiley & Sons, Inc. 22 The Information Systems Strategy Triangle
in the marketplace, and they depend on the strategies and tactics used by competitors. See Figure 1.3 for a summary
of these three strategies for achieving competitive advantage. Cost leadership results when the organization aims to be the lowest‐cost producer in the marketplace. The
organization enjoys above‐average performance by minimizing costs. The product or service offered must be
comparable in quality to those offered by others in the industry so that customers perceive its relative value. Typ-
ically, only one cost leader exists within an industry. If more than one organization seeks an advantage with this
strategy, a price war ensues, which eventually may drive the organization with the higher cost structure out of the
marketplace. Through mass distribution, economies of scale, and IS to generate operating efciencies, Walmart
epitomizes the cost‐leadership strategy. Through differentiation , the organization offers its product or service in a way that appears unique in the mar-
ketplace. The organization identies which qualitative dimensions are most important to its customers and then
nds ways to add value along one or more of those dimensions. For this strategy to work, the price charged cus-
tomers for the differentiator must seem fair relative to the price charged by competitors. Typically, multiple rms
in any given market employ this strategy. Progressive Insurance is able to differentiate itself from other automobile insurance companies. In its earlier days, Progressive Insurance’s service was unique. Representatives responded to accident claims
24‐7, arriving at the scene of the accident with powerful laptops and software that enabled them to settle claims and
cut a check on the spot. More recently, Progressive was the rst to offer a usage‐based insurance product, called
Snapshot, that bases insurance rates on the miles driven by customers. These innovations enabled a strategy that
spurred Progressive’s growth and widened its prot margins. Apple Inc. is another example of a company that com-
petes in its markets on its ability to differentiate its products. Apple’s various innovations in its operating system,
laptop design, iPads, iPhones, iPods, iTunes and iWatches have created a strategy based on the uniqueness of its products and services. Focus allows an organization to limit its scope to a narrower segment of the market and tailor its offerings
to that group of customers. This strategy has two variants: (1) cost focus, in which the organization seeks a cost
advantage within its segment and (2) differentiation focus, in which it seeks to distinguish its products or services
within the segment. This strategy allows the organization to achieve a local competitive advantage even if it does
not achieve competitive advantage in the marketplace overall. Porter explains how the focuser can achieve compet-
itive advantage by focusing exclusively on certain market segments:
Breadth of target is clearly a matter of degree, but the essence of focus is the exploitation of a narrow targe s differ-
ences from the balance of the industry. Narrow focus in and of itself is not sufcient for above‐average performance. 7
Marriott International demonstrates both types of focus with two of its hotel chains: Marriott has a cost focus,
and Ritz‐Carlton has a differentiation focus. To better serve its business travelers and cut operational expenses,
Marriott properties have check‐in kiosks that interface with their Marriott Rewards loyalty program. A guest can
swipe a credit card or Marriott Rewards card at the kiosk in the lobby and receive a room assignment and keycard
Strategic Advantage
Strategic Target
Uniqueness perceived by customer Low-cost position
Industrywide Differentiation Cost leadership
Particular segment only Focus
Source: Adapted from M. Porter,
Competitive Advantage , 1st ed. (New York: The Free Press, 1985) and Competitive Advantage:
Creating and Sustaining Superior Performance , 2nd ed. (New York: The Free Press, 1998).
FIGURE 1.3
Three strategies for achieving competitive advantage.
7
Porter, Competitive Advantage: Creating and Sustaining .
Copyright © 2016 John Wiley & Sons, Inc. 23 Brief Overview of Business Strategy Frameworks
from the machine. She can also print airline boarding passes at the kiosks. Further, the kiosks help the Marriott
chain implement its cost focus by cutting down on the personnel needed in at the front desk. The kiosk system is
integrated with other systems such as billing and customer relationship management (CRM) to generate operating efciencies and enhanced corporate standardization. In contrast, stand‐alone kiosks in the lobby would destroy the feeling that the Ritz‐Carlton chain, acquired by
Marriott in 1995, creates. To the Ritz‐Carlton chain, CRM means capturing and using information about guests,
such as their preference for wines, a hometown newspaper, or a sunny room. Each Ritz‐Carlton employee is
expected to promote personalized service by identifying and recording individual guest preferences. To demon-
strate how this rule could be implemented, a waiter, after hearing a guest exclaim that she loves tulips, could log the
guest’s comments into the Ritz‐Carlton CRM system called “Class.” On her next visit to a Ritz‐Carlton hotel, tulips
could be placed in the guest’s room after querying Class to learn more about her as her visit approaches. The CRM
is instrumental in implementing the differentiation‐focus strategy of the Ritz‐Carlton chain. 8
Its strategy allows the
Ritz‐Carlton chain to live up to its unique motto which emphasizes that its staff members are distinguished people with distinguished customers. Airline JetBlue adopted a differentiation strategy based on low costs coupled with unique customer experience.
It might be called a “value‐based strategy.” It is not the lowest cost carrier in the airline industry; at 12.3 cents per
passenger seat mile, JetBlue has one of the lowest costs, but Virgin America, Spirit, and Allegiant had even lower
per seat mile costs in 2013. But JetBlue manages its operational costs carefully, making decisions that keep its per
passenger costs among the lowest in the business, such as a limited number of airplane models in its eet, gates at
less congested airports, paperless cockpit and many other operations, and snacks instead of meals on ights. Jet-
Blue has one of the longest stage length averages (the length of the average ight) in the industry, and the longer
the ight, the lower the unit costs. Competing network carriers, who are more well known and established, may
have different pay scales because they’ve been in the business longer and have a different composition of staff.
These carriers also have higher maintenance costs for their older, more diverse eets. If it could realize its plans for
growth while maintaining its low cost structure, JetBlue could move from its cost focus based on serving a limited,
but growing, number of market segments to a cost leadership strategy. 9
While sustaining a cost focus, JetBlue’s chairman believes that JetBlue can compete on more than price, which
is part of its unique differentiation strategy. It is why the airline continually strives to keep customers satised with
frills such as extra leg room, leather seats, prompt baggage delivery, DirectTV, and movies. It has been recognized
with many awards for customer satisfaction in the North American airline industry.
Dynamic Environment Strategies
Porter’s generic strategies model is useful for diagnostics, for understanding how a business seeks to prot in
its chosen marketplace, and for prescriptions, or building new opportunities for advantage. It reects a careful
balancing of countervailing competitive forces posed by buyers, suppliers, competitors, new entrants, and substitute
products and services within an industry. As is the case with many models, dynamic environment strategies offer
managers useful tools for thinking about strategy. However, the Porter model was developed at a time when competitive advantage was sustainable because the
rate of change in any given industry was relatively slow and manageable. Since the late 1980s, when this frame-
work was at the height of its popularity, newer models have been developed to take into account the increasing
turbulence and velocity of the marketplace. Organizations need to be able to respond instantly and change rapidly,
which requires dynamic structures and processes. One example of this type of approach is the hypercompetition
framework. Discussions of hypercompetition take a perspective different from that of the previous framework. Por-
ter’s framework focuses on creating competitive advantage in relatively stable markets, whereas hypercompetition
frameworks suggest that the speed and aggressiveness of the moves and countermoves in a highly competitive and
8 Scott Berinato, “Room for Two,” CIO.com (May 15, 2002), http://www.cio.com/archive/051502/two_content.html.
9 http://www.oliverwyman.com/content/dam/oliver‐wyman/global/en/2014/nov/Airline_Economic_Analysis_Screen_OW_Nov_2014.pdf (acces sed
March 23, 2015).
Copyright © 2016 John Wiley & Sons, Inc. 24 The Information Systems Strategy Triangle
turbulent market create an environment in which advantages are rapidly created and eroded. In a hypercompetitive
market, trying to sustain a specic competitive advantage can be a deadly distraction because the environment and
the marketplace change rapidly. To manage the rapid speed of change, rms value agility and focus on quickly
adjusting their organizational resources to gain competitive advantage. Successful concepts in hypercompetitive
markets include dynamic capabilities, creative destruction, and blue ocean strategy. 10
Dynamic capabilities are means of orchestrating a rm’s resources in the face of turbulent environments. In
particular, the dynamic capabilities framework focuses on the ways a rm can integrate, build, and recongure
internal and external capabilities, or abilities, to address rapidly changing environments. These capabilities are
built rather than bought. They are embedded in rm‐specic routines, processes, and asset positions. Thus,
they are difcult for rivals to imitate. In sum, they help determine the speed and degree to which the rm can
marshal and align its resources and competences to match the opportunities and requirements of the business
environment. 11
Since the 1990s, a competitive practice, called creative destruction, has emerged. First predicted over 60 years
ago by the economist Joseph Schumpeter, it was made popular more recently by Harvard Professor Clay Christensen. Coincidentally (or maybe not), the accelerated competition has occurred concomitantly with sharp increases in the
quality and quantity of information technology (IT) investment. The changes in competitive dynamics are particu-
larly striking in sectors that spend the most on IT. 12
One example of using dynamic models was implemented by leadership guru Jack Welch at General Electric
(GE). Often nicknamed “Neutron Jack” because of the way businesses were radically changed, Welch’s approach
to creative destruction was termed destroy your business (DYB). Welch recognized that GE could sustain its com-
petitive advantage only for a limited time as competitors attempted to outmaneuver the company. He knew that
if GE did not identify its weaknesses, its competitors would relish doing so. DYB is an approach that places GE
employees in the shoes of their competitors. 13
Through the DYB lenses, GE employees develop strategies to destroy
the company’s competitive advantage. Then, in light of their revelations, they apply the grow your business (GYB)
strategy to nd fresh ways to reach new customers and better serve existing ones. This allows GE to protect its
business from its competitors and sustain its position in the marketplace over the long run. A similar strategy of cannibalizing its own products was used by Apple. Steve Jobs, Apple’s founder and former
CEO, felt strongly that if a company was not willing to cannibalize its own products, someone else would come
along and do it for them. That was evident in the way Apple introduced the iPhone while iPod sales were brisk and
the iPad while its Macintosh sales were strong. 14
Apple continues to exhibit this strategy with subsequent releases
of new models of all of its products. Most discussions of strategy focus on gaining competitive advantage in currently existing industries and mar-
ketplaces, which are referred to by Kim and Mauborgne as red ocean strategy. Using a red ocean strategy, rms
ercely compete to earn a larger share of existing demand. Kim and Mauborgne recommend a better approach: Firms adopt a blue ocean strategy in which they create new demand in untapped marketspaces where they have the
“water” to themselves. When applying the blue ocean strategy, the goal is not to beat the competition but to make
it irrelevant. This is what Dell did when it challenged current industry logic by changing the computer purchasing
and delivery experiences of its customers. “With its direct sales to customers, Dell was able to sell its PCs for
40 percent less than IBM dealers while still making money.” 15
Dell also introduced into unchartered seas an unprec-
edented delivery process that allowed buyers to receive their new computers within four days of ordering them as compared to the red ocean process, which typically required 10 weeks.
10 For more information, please see Don Goeltz, “Hypercompetition,” vol. 1 of The Encyclopedia of Management Theory, ed. Eric Kessler (Los Angeles:
Sage, 2013), 359–60. 11 D. J. Teece, G. Pisano, and A. Shuen, “Dynamic Capabilities and Strategic Management,” Strategic Management Journal 18 (1997), 509–33; David
Teece, “Dynamic Capabilities,” vol. 1 of The Encyclopedia of Management Theory, ed. Eric Kessler (Los Angeles: Sage, 2013), 221–24.
12 Andrew McAfee and Erik Brynjolfsson, “Investing in the IT That Makes a Competitive Difference,” Harvard Business Review (July–August 2008),
98–107.13 M. Levinson, “GE Uses the Internet to Grow Business,” CIO (October 15, 2001), http://www.cio.com/article/30624/HOT_TOPIC_E_BUSINESS_
GE_Uses_the_Internet_to_Grow_Business_ (accessed May 5, 2012).14 Walter Isaacson, Steve Jobs (New York: Simon and Shuster, 2011).
15 W. Chan Kim and Renee Mauborgne, Blue Ocean Strategy (Cambridge, MA: Harvard Business School, 2005), 202.
Copyright © 2016 John Wiley & Sons, Inc. 25 Brief Overview of Organizational Strategies
Why Are Strategic Advantage Models Essential to Planning for Information Systems?
A general manager who relies solely on IS personnel to make IS decisions may not only give up any authority over
IS strategy but also hamper crucial future business decisions. In fact, business strategy should drive IS decision
making, and changes in business strategy should entail reassessments of IS. Moreover, changes in IS potential
should trigger reassessments of business strategy—as in the case of the Internet when companies that understood
or even considered its implications for the marketplace quickly outpaced their competitors who failed to do so.
For the purposes of our model, the Information Systems Strategy Triangle, understanding business strategy means
answering the following questions: 1. What is the business goal or objective?
2. What is the plan for achieving it? What is the role of IS in this plan?
3. Who are the crucial competitors and partners, and what is required of a successful player in this
marketplace?
4. What are the industry forces in this marketplace?
Porter’s generic strategies framework and the dynamic frameworks (summarized in Figure 1.4) are revisited in
the next few chapters. They are especially helpful in discussing the role of IS in building and sustaining competitive
advantages (Chapter 2) and for incorporating IS into business strategy. The next section of this chapter establishes
a foundation for understanding organizational strategies.
Brief Overview of Organizational Strategies
Organizational strategy includes the organization’s design as well as the choices it makes to dene, set up, coor-
dinate, and control its work processes. How a manager designs the organization impacts every aspect of opera-
tions from dealing with innovation to relationships with customers, suppliers, and employees. The organizational
strategy is a plan that answers the question: “How will the company organize to achieve its goals and implement
its business strategy?” A useful framework for organizational design can be found in the book Building the Information Age Orga-
nization by Cash, Eccles, Nohria, and Nolan. 16
This framework (Figure 1.5) suggests that the successful execu-
tion of a company’s organizational strategy comprises the best combination of organizational, control, and cultural
variables. Organizational variables include decision rights, business processes, formal reporting relationships, and
informal networks. Control variables include the availability of data, nature and quality of planning, effectiveness
of performance measurement and evaluation systems, and incentives to do good work. Cultural variables comprise
the values of the organization. These organizational, control, and cultural variables are managerial levers used by
decision makers to effect changes in their organizations. These managerial levers are discussed in detail in Chapter 3. FIGURE 1.4
Summary of strategic approaches and IT applications.
Strategic Approach Key Idea Application to Information Systems
Porte s generic strategies Firms achieve competitive advantage through cost leadership, differentiation, or focus. Understanding which strategy is chosen by a rm is critical to choosing IS to
complement the strategy.
Dynamic environment strategies Speed, agility, and aggressive moves and countermoves by a rm create
competitive advantage. The speed of change is too fast for
manual response, making IS critical to
achieving business goals.
16
James I. Cash, Robert G. Eccles, Nitin Nohria, and Richard L. Nolan, Building the Information Age Organization (Homewood, IL: Richard D. Irwin, 1994).
Copyright © 2016 John Wiley & Sons, Inc. 26 The Information Systems Strategy Triangle
Our objective is to give the manager a framework to use in evaluating various aspects of organizational design.
In this way, the manager can review the current organization and assess which components may be missing and
what future options are available. Understanding organizational design means answering the following questions:
1. What are the important structures and reporting relationships within the organization?
2. Who holds the decision rights to critical decisions?
3. What are the important people‐based networks (social and informational), and how can we use them to get
work done better?
4. What are the characteristics, experiences, and skill levels of the people within the organization?
5. What are the key business processes?
6. What control systems (management and measurement systems) are in place?
7. What are the culture, values, and beliefs of the organization?
The answers to these questions inform the assessment of the organization’s use of IS. Chapters 3, 4, and 5 use
the Managerial Levers model to assess the impact of information systems (IS) on the rm. Chapters 8 and 9 use this
same list to understand the business and governance of the IS organization.
Brief Overview of Information Systems Strategy IS strategy is the plan an organization uses to provide information services. IS allow a company to implement its
business strategy. JetBlue’s former Vice President for People explains it nicely: “We dene what the business needs
and then go nd the technology to support that.” 17
Business strategy is a function of competition (What does the customer want and what does the competition
do?), positioning (In what way does the rm want to compete?), and capabilities (What can the rm do?). IS help
Organizational effectiveness Strategy Organization Control
Culture
Performance
measurement and
evaluation
Incentives
and rewards
Values
Formal
reporting
relationships Planning
Business
processes Decision
rights
Data
Informal
networks People,
Information, and Technology
Execution
FIGURE 1.5 Managerial Levers model.
Source: J. Cash, R. G. Eccles, N. Nohria, and R. L. Nolan, Building the Information Age Organization (Homewood, IL: Richard D.
Irwin, 1994).
17 Hogue et al., Winning the 3‐Legged Race , 111.
Copyright © 2016 John Wiley & Sons, Inc. 27 Brief Overview of Information Systems Strategy
determine the company ’ s capabilities. An entire chapter is devoted to understanding key issues facing general man-
agers concerning IT architecture, but for now a more basic framework is used to understand the decisions related
to IS that an organization must make. The purpose of the matrix in Figure 1.6 is to give the manager a high‐level view of the relation between the
four IS infrastructure components and the other resource considerations that are keys to IS strategy. Infrastructure
FIGURE 1.6
IS strategy matrix.
What Who Where
Hardware The physical devices of the system System users and managers Physical location of devices (cloud, data center, etc.)
Software The programs, applications, and utilities System users and managers The hardware it resides on and
physical location of that hardware
Networking The way hardware is connected to other hardware, to the Internet, and
to other outside networks System users and managers;
company that provides the serviceWhere the nodes, the wires, and
other transport media are located
Data Bits of information stored in the system Owners of data; data
administratorsWhere the information resides
Social Business Lens: Building a Social Business Strategy
Some companies use social IT as point solutions for business opportunities, but others build a social business
strategy that considers the application of social IT tools and capabilities to solve business opportunities holisti-
cally. A
social business strategy is a plan of how the rm will use social IT that is aligned with its organizational strat-
egy and IS strategy. Social business strategy includes a vision of how the business would operate if it seamlessly
and thoroughly incorporated social and collaborative capabilities throughout the business model. It answers the
same type of questions of what, how, and who, as do many other business strategies.
Social businesses infuse social capabilities into their business processes. Most of the social business opportu-
nities fall into one of three categories:
Collaboration —using social IT to extend the reach of stakeholders, both employees and those outside the
enterprise walls. Social IT such as social networks enable individuals to find and connect with each other to
share ideas, information, and expertise.
Engagement —using social IT to involve stakeholders in the traditional business of the enterprise. Social IT such as
communities and blogs provide a platform for individuals to join in conversations, create new conversations,
and offer support to each other and other activities that create a deeper feeling of connection to the company,
brand, or enterprise.
Innovation —using social IT to identify, describe, prioritize, and create new ideas for the enterprise. Social IT offers
community members a “super idea box” where individuals suggest new ideas, comment on other ideas, and
vote for their favorite idea, giving managers a new way to generate and decide on products and services.
National Instruments (ni.com) is an example of a company that has embraced social IT and created a social
business strategy. Managers developed a branded community consisting of a number of social IT tools like Face-
book, Twitter, blogs, forums, and more. By thinking holistically about all the ways that customers and employees
might interact with one another, the branded community has become the hub of collaboration, engagement, and
idea generation.
Source: Adapted from
Keri Pearlson
, “ Killer Apps for a Social Business ” (February 17, 2011 ) , http://instantlyresponsive.wordpress.
com/2011/02/27/killer apps for a social business/ (accessed March 19, 2015). For more information on National Instruments,
see Harvard Business school case study 813001, “National Instruments” by Lynda Applegate, Keri Pearlson, and Natalie Kindred.
Copyright © 2016 John Wiley & Sons, Inc. 28 The Information Systems Strategy Triangle
includes hardware, such as desktop units and servers. It also includes software, such as the programs used to do
business, to manage the computer itself and to communicate between systems. The third component of IS infra-
structure is the network, which is the physical means by which information is exchanged among hardware com-
ponents. Examples include ber networks such as Google Fiber, cable networks such as those provided by Time
Warner, AT&T, and Comcast, WiFi provided by many local services, and 3G/4G/WiMax technologies (which are
actually Internet communication standards, but some phone companies adopt those terms as the name of networks
they offer). Some communications are conducted through a private digital network, managed by an internal unit).
Finally, the fourth part of the infrastructure is the data. The data include the bits and bytes stored in the system. In current systems, data are not necessarily stored alongside the programs that use them; hence, it is important to
understand what data are in the system and where they are stored. Many more detailed models of IS infrastructure
exist, and interested readers may refer to any of the dozens of books that describe them. For the purposes of this
text, the IS strategy matrix provides sufcient information to allow the general manager to assess the critical issues in information management. Because of the advanced state of technology, many managers are more familiar with the use of platforms and
applications, or apps. Platforms are technically any set of technologies upon which other technologies or appli-
cations run. Often they are a combination of hardware and operating system software. Microsoft Windows and
Apple’s Macintosh with its latest operating system are two examples of platforms. Also common are mobile plat-
forms such as the iPhone and Samsung/Android phone. Applications or apps, on the other hand, are self‐contained
software programs that fulll a specic purpose and run on a platform. The term “apps” became popular from the
smart phone industry, beginning when Apple offered an online marketplace for customers to download small pro-
grams to run on their devices. But more recently, because all platforms have applications that run on them, the term apps has taken on a broader meaning.
SUMMARY
The Information Systems Strategy Triangle represents a simple framework for understanding the impact of IS on businesses. It
relates business strategy with IS strategy and organizational strategy and implies the balance that must be maintained in busin ess
planning. The Information Systems Strategy Triangle suggests the following management principles.
Business Strategy
Business strategy drives organizational strategy and IS strategy. The organization and its IS should clearly support dened
business goals and objectives.
• Denition: A well‐articulated vision of where a business seeks to go and how it expects to get there
• Example Models: Porter’s generic strategies model; dynamic environment models
Organizational Strategy
Organizational strategy must complement business strategy. The way a business is organized either supports the implementation
of its business strategy or it gets in the way. • Denition: The organization’s design, as well as the choices it makes to dene, set up, coordinate, and control its work processes
• Example Model: managerial levers
IS Strategy
IS strategy must complement business strategy. When IS support business goals, the business appears to be working well. IS
strategy can itself affect and is affected by changes in a rm’s business and organizational strategies. Moreover, IS strategy
always has consequences—intended or not—on business and organizational strategies.
Copyright © 2016 John Wiley & Sons, Inc. 29 Discussion Questions
• Denition: The plan the organization uses in providing information systems and services
• Models: A basic framework for understanding IS decisions for platform, applications, network and data‐relating architecture (the “what”), and the other resource considerations (“who” and “where”) that represent important planning constraints
Strategic Relationships
Organizational strategy and information strategy must complement each other. They must be designed so that they support,
rather than hinder, each other. If a decision is made to change one corner of the triangle, it is necessary to evaluate the other two
corners to ensure that balance is preserved. Changing business strategy without thinking through the effects on the organizatio n
and IS strategies will cause the business to struggle until balance is restored. Likewise, changing IS or the organization alon e
will cause an imbalance.
DISCUSSION QUESTIONS 1. Why is it important for business strategy to drive organizational strategy and IS strategy? What might happen if the business
strategy was not the driver?
2. In 2015, the NFL decided to hand out Microsoft Surface tablets to all coaches for use during games, and there are reports
that in the future, they will add HoloLens devices to provide augmented reality. 18
A HoloLens device is a high‐definition,
head‐mounted display that allows coaches to see the plays with text and animation superimposed right on the live images. If
the NFL simply handed them out without making any other formal changes in organizational strategy or business strategy,
what might be the outcome? What unintended consequences might occur?
3. Consider a traditional manufacturing company that wants to build a social business strategy. What might be a reasonable
business strategy, and how would organization and IS strategy need to change? How would this differ for a restaurant chain?
A consumer products company? A nonprofit?
4. This chapter describes key components of an IS strategy. Describe the IS strategy of a consulting firm using the matrix
framework.
5. What does this tip from Fast Company mean: “The job of the CIO is to provide organizational and strategic flexibility”? 19
KEY TERMS apps (p. 27)
blue ocean strategy (p. 24)
business model (p. 20)
business strategy (p. 21)collaboration (p. 28)cost leadership (p. 22)
creative destruction (p. 24)
differentiation (p. 22)
dynamic capabilities (p. 24)engagement (p. 28)focus (p. 22)hypercompetition (p. 23)
Information Systems Strategy
Triangle (p. 18)
innovation (p. 28)
IS strategy (p. 26) managerial levers (p. 25)mission (p. 19)
organizational strategy (p. 25)
red ocean strategy (p. 24)
social business strategy (p. 27)
strategy (p. 19)
18
Sean Michael, “NFL Teams Will Use Surface Pro 3s in 2015 and May Use HoloLens in the Future,” WinBeta (August 7, 2015), http:/ /www.winbeta.
org/news/nfl‐teams‐will‐use‐surface‐pro‐3s‐2015‐and‐may‐use‐hololens‐future (accessed August 21, 2015). 19 “Technology: How much? How fast? How revolutionary? How expensive?” Fast Company (March 2002), http://www.fastcompany.com/44651/
technology‐how‐much‐how‐fast‐how‐revolutionary‐how‐expensive (accessed August 21, 2015).
Copyright © 2016 John Wiley & Sons, Inc. 30 The Information Systems Strategy Triangle
Lego has long been an industry leader in children ’ s toys with its simple yet unique building block‐style products. A Danish
carpenter whose family still owns Lego today founded the privately held company in 1932. But by 2004, the company found
itself close to extinction, losing $1 million a day. A new CEO was brought in, and within ve years sales were strong, pro ts
were up, and naysayers who felt the new strategy was going to fail were proved wrong. In fact, sales, revenues and pro ts
continued to be strong. Revenues grew from 16 billion Danish krone (DKK) in 2010 to over 28 billion DKK in 2014, and in
the same period, pro t almost doubled from 3.7 billion DKK to 7 billion DKK.
With the advent of high‐tech forms of entertainment, such as the iPod and PlayStation, Lego found itself more antique
than cutting edge in the toy world. When new CEO Jorgen Vig Knudstorp, a father and former McKinsey consultant, took
over, the company was struggling with poor performance, missed deadlines, long development times, and a poor delivery
record. The most popular toys frequently would be out of stock, and the company was unable to ship enough products or manage the production of its more complicated sets. Retail stores were frustrated, and that translated into reduced shelf
space and ultimately to business losses. Knudstorp changed all of that. He reached out to top retailers, cut costs, and added missing links to the supply chain. For
example, prior to the new strategy, 90% of the components were used in just one design. Designers were encouraged to reuse
components in their new products, which resulted in a reduction from about 13,000 different Lego components to 7,000.
Because each component ’ s mold could cost up to 50,000 euros on average to create, this reduction saved signi cant expense.
Lego was known for its traditional blocks and components that would allow children to build just about anything their
imagination could create. The new strategy broadened the products, targeting new customer segments. Lego managers cre-
ated products based on themes of popular movies, such as Star Wars and the Indiana Jones series. The company moved
into video games, which featured animated Lego characters sometimes based on movies. The company created a product
strategy for adults and engaged the communities who had already set up thousands of Web sites and blogs featuring Lego
creations. It embraced the community who thought of Lego as a way to create art rather than simply as a building toy. And
the company designed a line of Legos aimed at girls because the majority of its products had primarily targeted boys.
The culture of Lego changed to one that refused to accept nonperformance. The company ’ s past showed a tendency to
focus on innovation and creativity, often at the expense of pro ts. But that changed. “Knudstorp . . . made it clear that results,
not simply feeling good about making the best toys, would be essential if Lego was to succeed. . . . Its business may still be
fun and games, but working here isn ’ t,” 20
describes the current culture at Lego .
Some of the most drastic changes came from within the Lego organization structure. After its massive losses in 2004,
Lego switched its employee pay structure, offering incentives for appropriate product innovation and sales. Key performance
indicators encourage product innovation that catalyzes sales while decreasing costs. Development time dropped by 50%, and
some manufacturing and distribution functions were moved to less expensive locations, but the focus on quality remained.
The creation of reusable parts alleviated some of the strain on Lego ’ s supply chain, which in turn helped its bottom line.
Lego also expanded into the virtual world, extending into video gaming and virtual‐interaction games on the Internet.
Thinking outside the company ’ s previous product concepts cut costs while encouraging real‐time feedback from customers
across a global market. Additionally, Lego created brand ambassadors who organized conventions across the world to dis-
cuss product innovation and to build communities of fellow customers. With increased revenue, Lego managers considered
entering the movie‐making business—a risky proposition for a toy company. However, Lego ’ s success with Hollywood‐type
action gures fueled its interest in a movie‐making endeavor.
The growth put strains on the IS supporting the business. Order management and ful llment were particularly affected,
resulting in the inability to meet customer demand. Employee management systems were stretched as new employees were
added to support the growth and additional locations. Product design and development, especially the virtual and video
games, required new technology, too. To solve some of these problems, Lego managers used the same approach they used for their blocks. They created a
modularized and standardized architecture for their IS, making it possible to expand more quickly and add capacity and
functionality as it was needed. They implemented an integrated enterprise system that gave them new applications for
human capital management, operations support, product life cycle management, and data management. The new systems
and services, purchased from vendors such as SAP and IBM , simpli ed the IT architecture and the management processes
needed to oversee the IS.
■
CASE STUDY 1‐1
Lego
20
Nelson D. Schwartz , “ Turning to Tie‐Ins, Lego Thinks Beyond the Brick ,” The New York Times
, September 5, 2009 , http://www.nytimes.
com/2009/09/06/business/global/06lego.html?pagewanted=all&_r=0 (accessed August 21, 2015) .
Copyright © 2016 John Wiley & Sons, Inc. 31 Case Study
One manager at Lego summed it up nicely, “The toy world moves onwards constantly, and Lego needs to re‐invent itself
continuously. Signi cant corporate re‐shaping introduced new energy to the company.” 21
He went on to say that simplifying
Lego ’ s IT systems and implementing an ef cient product development process that was able to maintain quality and cost
favorably positioned Lego to respond to the fast changing pace of the toy industry.
Discussion Questions
1. How did the information systems and the organization design changes implemented by Knudstorp align with the changes
in business strategy?
2. Which of the generic strategies does Lego appear to be using based on this case? Provide support for your choice.
3. Are the changes implemented by Knudstorp an indication of hypercompetition? Defend your position.
4. What advice would you give Knudstorp to keep Lego competitive, growing, and relevant?
Sources: Adapted from http://www.nytimes.com/2009/09/06/business/global/06lego.html (accessed August 21, 2015) ; Brad Wieners ,
“ Lego Is for Girls ” (December 19, 2011 ), 68 – 73 ; information from Lego s 2012 annual report, http://www.lego.com/en‐us/aboutus/news‐
room/2013/february/annual‐result‐2012 (accessed March 29, 2015); and “Lego Case Study,” http://thelegocasestudy.com (accessed
March 29, 2015).
Started in the late 1990s, Google grew rapidly to become one of the leading companies in the world. Its mission is “to
organize the world ’ s information and make it universally accessible and useful.” It is operating on a simple but innovative
business model of attracting Internet users to its free search services and earning revenue from targeted advertising. In the
winner‐takes‐all business of Internet search, Google has captured considerably more market share than its next highest rival,
Yahoo . This has turned Google ’ s Web pages into the Web ’ s most valuable real (virtual) estate. Through its two agship pro-
grams, AdWords and AdSense, Google has capitalized on this leadership position in searching to capture the lion ’ s share in
advertisement spending. AdWords enables businesses to place ads on Google and its network of publishing partners using
an auction‐engine algorithm to decide which ad will appear on a given page. On the other hand, Google uses AdSense to
push advertisements on publishing partners ’ Web sites targeting a speci c audience and share ad revenue with the publishing
partner. This creates a win–win situation for both advertisers and publishers; Google makes more than 90% of its revenue from ads. Even as a large company, Google continues to take risks and expand into new markets. Innovation is at the core of their
enterprise. Sergey Brin and Larry Page, the founders, declared in Google ’ s IPO prospectus, “We would fund projects that
have a 10% chance of earning a billion dollars over the long term. . . We place smaller bets in areas that seem very specula-
tive or even strange. As the ratio of reward to risk increases, we will accept projects further outside our normal areas.” They
add that they are especially likely to fund new types of projects when the initial investment is small.
Google promotes a culture of creativity and innovation in a number of ways. It encourages innovation in all employees
by allowing them to spend 20% of their time on a project of their own choosing. In addition, the company offers bene ts
such as free meals, on‐site gym, on‐site dentist, and even washing machines at the company for busy employees.
Despite an open and free work culture, a rigid and procedure‐ lled structure is imposed for making timely decisions and
executing plans. For example, when designing new features, the team and senior managers meet in a large conference room.
They use the right side of the conference room walls to digitally project new features and the left side to project any tran-
scribed critique with a timer clock giving everyone 10 minutes to lay out ideas and nalize features. Thus, Google utilizes
rigorous, data‐driven procedures for evaluating new ideas in the midst of a chaotic innovation process. Nine notions of innovations are embedded in the organizational culture, processes, and structure of Google: 22
1. “Innovation Comes from Anywhere”: All Google employees can innovate.
2. “Focus on the User”: When focus is on the user, the money and all else will follow.
■
CASE STUDY 1‐2
21
https://www.vmware.com/files/pdf/partners/sap/sap‐vmware‐lego‐cs‐en.pdf (accessed September 11, 2015).
22 Kathy Chin Long , “ Google Reveals its Nine Principles of Innovations ,” Fast Company
, http://www.fastcompany.com/3021956/how‐to‐be‐a‐success‐
at‐everything/googles‐nine‐principles‐of‐innovation (accessed March 30, 2015 ) .
Copyright © 2016 John Wiley & Sons, Inc. 32 The Information Systems Strategy Triangle
3. “Aim to be Ten Times Better”: To get radical and revolutionary innovation, think 10 times improvement to force out‐of‐the‐box thinking.
4. “Bet on Technical Insights”: Trust your organization ’ s unique insights and bet on them for major innovation.
5. “Ship and Iterate”: Do not wait for perfection; let users help you to “iterate.”
6. “Give Employees 20 Percent Time”: Employees will delight you with their creative thinking. Give them 20 percent of their work time to pursue projects they are passionate about.
7. “Default to Open Processes”: Make processes open to all to tap into the collective energy of the user base to find great ideas.
8. “Fail Well”: Do not attach stigma to failure. If you do not fail often, you are not trying hard enough. Let people and projects fail with pride.
9. “Have a Mission That Matters”: Google believes that its work has a positive impact on millions of people and that this is motivating its people every day.
Keeping up with the organizational strategy of Google , its IT department provides free and open access to IT for all
employees. Rather than keeping tight control, Google allows employees to choose from several options for computer and
operating systems, download software themselves, and maintain of cial and unof cial blog sites. Google ’ s intranet provides
employees information about every piece of work at any part of the company. In this way, employees can nd and join hands
with others working on similar technologies or features. In building the necessary IT infrastructure, Google ’ s IT department balances buying and making its own software depend-
ing on its needs and off‐the‐shelf availability. Google thinks of every IT decision “at Web Scale” to make sure its technology
works well for its customers. Given the nature of business, security of information resources is critical for Google . For
instance, its master search algorithm is considered a more valuable secret formula than Coca‐Cola ’ s. However, rather than
improving IT security by sti ing freedom through preventive policy controls, Google puts security in the infrastructure and
focuses more on detective and corrective controls. Its network management software tools combined with a team of security
engineers constantly look for viruses and spyware as well as strange network traf c patterns associated with intrusion.
Discussion Questions
1. How is Google ’ s mission statement related to its business strategy?
2. How does Google ’ s information systems strategy support its business strategy?
3. How does Google ’ s organizational strategy support its business strategy?
4. Which of Porter ’ s three generic strategies does Google appear to be using based on this case? Provide a rationale for
your response.
5. Analyze Google ’ s strategy and the type of market disruption it has created using a dynamic environment perspective.
Sources: Adapted from Michelle Colin , “ Champions of Innovation ,”
Businessweek
3989 (June 1 8 , 2006 ), 18–26 , http://www.bloomberg.
com/bw/stories/2006‐06‐18/champions‐of‐innovation; Vauhini Va r a
, “ Pleasing Google s Tech‐Savvy Staff ” (March 18, 2008 ) , B6; Jason
Bloomberg , “ Google s Three‐Pronged Enterprise Strategy ,” Forbes Online (December 12, 2014 ) ; and Connor Forrest , “ Four Ways
Google Makes Money ,”
TechRepublic
(January 16, 2015 ) , http://www.techrepublic.com/article/four‐ways‐google‐makes‐money‐
outside‐of‐advertising/ (accessed August 21, 2015 ).
Copyright © 2016 John Wiley & Sons, Inc. 33
2
chapter
This chapter introduces the concept of building competitive advantage using information
systems‐based applications. It begins with a discussion of a set of eras that describe the use
of information resources historically. It then presents information resources as strategic tools,
discussing information technology (
IT
) assets and IT capabilities. Michael Porter s Five Com-
petitive Forces model then provides a framework for discussing strategic advantage, and
his Value Chain model addresses tactical ways organizations link their business processes
to create strategic partnerships. We then introduce the Piccoli and Ive s model to show how
strategic advantage may be sustained in light of competitive barriers while the Resource‐
Based View focuses on gaining and maintaining strategic advantage through information
and other resources of the rm. The chapter concludes with a brief discussion of strategic
alliances, co‐opetition, risks of strategic use of IT, and cocreating IT and business strategy. Just as a note: this chapter uses the terms
competitive advantage and strategic advantage
interchangeably.
1
Inditex Web site, http://www.inditex.com/en/who_we_are/concepts/zara (accessed February 20, 2012); http://www.marinabaysand s.
com/shopping/zara.html (accessed May 2, 2015).
Strategic Use of
Information Resources
Zara , a global retail and apparel manufacturer based in Arteixo, Spain, needed a dynamic business
model to keep up with the ever‐changing demands of its customers and industry. At the heart of its
model was a set of business processes and an information system that linked demand to manufactur-
ing and manufacturing to distribution. The strategy at Zara stores was simply to have a continuous ow of new products that were typically in limited supply. As a result, regular customers visited
their stores often—an average of 17 times a year whereas many retail stores averaged only four
times a year. When customers saw something they liked, they bought it on the spot because they
knew it would probably be gone the next time they visited the store. The result was a very loyal and
satis ed customer base and a wildly pro table business model. How did Zara do it? It was possible in part because the company aligned its information system
strategy with its business strategy. Its corporate Web site gave some insight:
Zara
s approach to design is closely linked to our customers. A non‐stop ow of information from
stores conveys shoppers desires and demands, inspiring our 200‐person strong creative team. 1
The entire process from factory to shop oor is coordinated from Zara ’ s headquarters by using
information systems. The point‐of‐sale (POS) system on the shop oor records the information from
each sale, and the information is transmitted to headquarters at the end of each business day. Using
a handheld device, the Zara shop managers also report daily to the designers at headquarters to let
them know what has sold and what the customers wanted but couldn ’ t nd. The information is used
to determine which product lines and colors should be kept and which should be altered or dropped.
Copyright © 2016 John Wiley & Sons, Inc. 34 Strategic Use of Information Resources
The designers communicate directly with the production staff to plan for the incredible number of designs—more
than 30,000—that will be manufactured every year. 2
The shop managers have the option to order new designs twice a week using handheld computers. Before order-
ing, they can use these devices to check out the new designs. Once an order is received at the manufacturing plant at
headquarters, a large computer‐controlled piece of equipment calculates how to position patterns to minimize scrap
and cut up to 100 layers of fabric at a time. The cut fabric is then sent from Zara factories to external workshops for
sewing. The completed products are sent to distribution centers where miles of automated conveyor belts are used
to sort the garments and recombine them into shipments for each store. Zara’s Information Systems (IS) department
wrote the applications controlling the conveyors, often in collaboration with vendors of the conveyor equipment. As the Zara example illustrates, innovative use of a rm’s information resources can provide it substantial
and sustainable advantages over competitors. Every business depends on IS, making its use a necessary resource
every manager must consider. IS also can create a strategic advantage for rms who bring creativity, vision, and
innovation to their IS use. The Zara case is an example. This chapter uses the business strategy foundation from
Chapter 1 to help general managers visualize how to use information resources for competitive advantage. This
chapter highlights the difference between simply using IS and using IS strategically. It also explores the use of
information resources to support the strategic goals of an organization. The material in this chapter can enable a general manager to understand the linkages between business strategy
and information strategy on the Information Systems Strategy Triangle. General managers want to nd answers to
questions such as: Does using information resources provide a sustainable and defendable competitive advantage?
What tools are available to help shape strategic use of information? What are the risks of using information resources
to gain strategic advantage?
Evolution of Information Resources
The Eras model (Figure 2.1) summarizes the evolution of information resources over the past six decades. To think
strategically about how to use information resources now and in the future within the rm, a manager must under-
stand how the company arrived at where it is today. This model provides a good overview of trends and uses that
have gotten the company from simple automation of tasks to extending relationships and managing their business
ecosystems to where it is today. IS strategy from the 1960s to the 1990s was driven by internal organizational needs. First came the need to
lower existing transaction costs. Next was the need to provide support for managers by collecting and distributing
information followed by the need to redesign business processes. As competitors built similar systems, organi-
zations lost any advantages they had derived from their IS, and competition within a given industry once again
was driven by forces that existed prior to the new technology. Most recently, enterprises have found that social IT
platforms and capabilities drive a new evolution of applications, processes, and strategic opportunities that often
involve an ecosystems of partners rather than a list of suppliers. Business ecosystems are collections of interacting
participants, including vendors, customers, and other related parties, acting in concert to do business. 3
In Eras I through III, the value of information was tied to physical delivery mechanisms. In these eras, value was
derived from scarcity reected in the cost to produce the information. Information, like diamonds, gold, and MBA
degrees, was more valuable because it was found in limited quantities. However, the networked economy beginning
in Era IV drove a new model of value—value from plenitude. Network effects offered a reason for value derived
from plenitude; the value of a network node to a person or organization in the network increased when others joined
the network. For example, an e‐mail account has no value without at least one other e‐mail account with which to
communicate. As e‐mail accounts become relatively ubiquitous, the value of having an e‐mail account increases
as its potential for use increases. Further, copying additional people on an e‐mail is done at a very low cost (virtu-
ally zero), and the information does not wear out (although it can become obsolete). As the cost of producing an
2 Shenay Kentish, Zara (October 18, 2011), http://unilifemagazine.com.au/special‐interest/zara/ (accessed April 10, 2012).
3 For further discussion of business ecosystems, please refer to Nicholas Vitalari and Hayden Shaughnessy, The Elastic Enterprise (Longboat Key, FL:
Telemachus Press, 2012).
Copyright © 2016 John Wiley & Sons, Inc. 35 Evolution of Information Resources
additional copy of an information product within a network becomes trivial, the value of that network increases. Therefore, rather than using production costs to guide the determination of price, information products might be
priced to reect their value to the buyer. 4
As each era begins, organizations adopt a strategic role for IS to address not only the rm’s internal circum-
stances but also its external circumstances. Thus, in the value‐creation era (Era V), companies seek those appli-
cations that again provide them an advantage over their competition and keep them from being outgunned by
start‐ups with innovative business models or traditional companies entering new markets. For example, companies
like Microsoft, Google, Apple, and Facebook have created and maintained a competitive advantage by building
technical platforms and organizational competencies that allow them to bring in partners as necessary to create
new products and services for their customers. Their business ecosystems give them agility as well as access to
talent and knowledge, extending the capabilities of their internal staff. Other rms simply try to solve all customer
requests themselves. Era VI has brought another paradigm shift in the use of information with an era of hyperplenitude: seem-
ingly unlimited availability of information resources such as the Internet and processing and storage through
FIGURE 2.1
Eras of information usage in organizations.
Era I 1960s Era II 1970s Era III 1980s Era IV 1990s Era V 2000s Era VI 2010+
Primary Role of IT Efciency Effectiveness Strategy Strategy Value
creationValue extension
Automate
existing paper‐based
processes Solve
problems
and create opportunities Increase individual and
group
effectiveness Transform industry/
organization
Create
collaborative
partnershipsCreate community and social businessConnecting
intelligent
devices
Justify IT
Expenditures Return on
investment Increase in
productivity and better decision quality Competitive position
Competitive positionAdded value Creation of
relationshipsAutomated information
exchange
Target of Systems Organization Organization/
Group Individual
manager/
Group Business
processes
Customer/ Supplier
relationshipsCustomer/
Employee/supplier ecosystemIntelligent
devices
Information Models Application specic Data driven User driven Business
drivenKnowledge
drivenPeople
driven (or
relationship
driven)Data
exchange
driven
Dominant
Technology Mainframe,
“centralized
intelligence” Minicomputer, mostly
“centralized
intelligence” Microcomputer,
“decentralized
intelligence”
Client server, “distributed
intelligence”Internet, global “ubiquitous
intelligence”Social
platforms, social
networks, mobile
, cloud Intelligent
devices,
sensors,
electronics
Basis of
Value Scarcity Scarcity Scarcity Plenitude Plenitude Hyperplenitude
Underlying Economics Economics of information bundled with economics of things Economics of information bundled with economics of things Economics of information bundled with economics of things Economics of information
separated
from economics of thingsEconomics of information
separated
from economics of thingsEconomics of
relationships bundled with economics of information
Economics of
informa tion bundled with economics of things
4
Adapted from M. Broadbent, P. Weill, and D. Clair. “The Implications of Information Technology Infrastructure for Business Process Redesign,” MIS
Quarterly 23, no. 2 (1999), 163.
Copyright © 2016 John Wiley & Sons, Inc. 36 Strategic Use of Information Resources
cloud computing sparked new value sources such as community and social business and the Internet of Things
(connecting intelligent devices, sensors, and other electronics). The Information System Strategy Triangle introduced in Chapter 1 reects the linkages between a rm’s IS strat-
egy, organizational strategy, and business strategy. A link between IS strategy and business strategy focuses on the
rm’s external requirements whereas a link between IS strategy and organizational strategy fullls and enhances
internal requirements of the rm. Maximizing the effectiveness of the rm’s business strategy requires that the
general manager be able both to identify and use information resources. This chapter describes how information
resources can be used strategically by general managers.
Information Resources as Strategic Tools
Crafting a strategic advantage requires the general manager to cleverly combine all the rm’s resources, includ-
ing nancial, production, human, and information, and to consider external resources such as the Internet and
opportunities in the global arena. Information resources are more than just the infrastructure. This generic term,
information resources , is dened as the available data, technology, people, and processes within an organization
to be used by the manager to perform business processes and tasks. Information resources can either be assets or capabilities. An IT asset is any thing, tangible or intangible, that can be used by a rm to create, produce, and/or
offer its products (goods or services). Examples of IT assets include a rm’s Web site, data les, or computer equip-ment. An IT capability is something that is learned or developed over time for the rm to create, produce, or offer
its products. An IT capability makes it possible for a rm to use its IT assets effectively. 5
The ability and knowledge
to create a Web site, work with data les, and take advantage of IT equipment are examples of capabilities. An IS infrastructure (a concept that is discussed in detail in Chapter 6) is an IT asset. It includes each of an
information resource’s constituent components (i.e., data, technology, people, and processes). The infrastructure
provides the foundation for the delivery of a rm’s products or services. Another IT asset is an information repos-
itory , which is logically related data captured, organized, and retrieved by the rm. Some information repositories
are lled with internally oriented information designed to improve the rm’s efciency. Other repositories tap the
external environment and contain signicant knowledge about the industry, the competitors, and the customers.
Although most rms have these types of information repositories, not all rms use them effectively. In the continually expanding Web space, the view of IT assets is broadening to include potential resources that
are available to the rm but that are not necessarily owned by it. These additional information resources are often
available as a service rather than as a system to be procured and implemented internally. For example, Internet‐
based software (also called software as a service, or SAAS ), such as SalesForce.com, offers managers the opportu-
nity to nd new ways to manage their customer information with an externally based IT resource. Social networking
systems such as Facebook and LinkedIn offer managers the opportunity to nd expertise or an entire network of
individuals ready to participate in the corporate innovation processes using relatively little capital or expense. The three major categories of IT capabilities are technical skills, IT management skills, and relationship skills.
Technical skills are applied to designing, developing, and implementing information systems. IT management skills
are critical for managing the IS department and IS projects. They include an understanding of business processes,
the ability to oversee the development and maintenance of systems to support these processes effectively, and the
ability to plan and work with the business units in undertaking change. Relationship skills can be focused either
externally or internally. An externally focused relationship skill includes the ability to respond to the rm’s market
and to work with customers and suppliers. The internal relationship between a rm’s IS managers and its business
managers is a spanning relationship skill and includes the ability of IS to manage partnerships with the business
units. Even though it focuses on relationships in the rm, it requires spanning beyond the IS department. Rela-
tionship skills develop over time and require mutual respect and trust. They, like the other information resources,
can create a unique advantage for a rm. Figure 2.2 summarizes the different types of information resources and
provides examples of each.
5 G. Piccoli and B. Ives, “IT‐Dependent Strategic Initiatives and Sustained Competitive Advantage: A Review and Synthesis of the Literature,” MIS
Quarterly 29, no. 4 (2003), 747–76.
Copyright © 2016 John Wiley & Sons, Inc. 37 How Can Information Resources Be Used Strategically?
Information resources exist in a company alongside other resources. The general manager is responsible for
organizing all resources so that business goals are met. Understanding the nature of the resources at hand is a pre-
requisite to using them effectively. By aligning IS strategy with business strategy, the general manager maximizes
the company’s prot potential. To ensure that information resources being deployed for strategic advantage are used
wisely, the general manager must identify what makes the information resource valuable (and the Eras model may
provide some direction) and sustainable. Meanwhile, the rm’s competitors are working to do the same. In this
competitive environment, how should the information resources be organized and applied to enable the organiza-
tion to compete most effectively?
How Can Information Resources Be Used Strategically?
The general manager confronts many elements that inuence the competitive environment of his or her enterprise.
Overlooking a single element can bring about disastrous results for the rm. This slim tolerance for error requires
the manager to take multiple views of the strategic landscape. Three such views can help a general manager align
IS strategy with business strategy. The rst view uses the ve competitive forces model by Michael Porter to look
at the major inuences on a rm’s competitive environment. Information resources should be directed strategically
to alter the competitive forces to benet the rm’s position in the industry. The second view uses Porter’s value
chain model to assess the internal operations of the organization and partners in its supply chain. Information
resources should be directed at altering the value‐creating or value‐supporting activities of the rm. We extend this
view further to consider the value chain of an entire industry to identify opportunities for the organization to gain
competitive advantage. The third view specically focuses on the types of IS resources needed to gain and sustain
competitive advantage. These three views provide a general manager with varied perspectives from which to iden-
tify strategic opportunities to apply the rm’s information resources.
Using Information Resources to In uence Competitive Forces
Porter provides the general manager a classic view of the major forces that shape the competitive environment of an
industry, which affects rms within the industry. These ve competitive forces are shown in Figure 2.3 along with
some examples of how information resources can be applied to inuence each force. This view reminds the general
FIGURE 2.2
Information resources.
Source: Adapted from G. Piccoli and B. Ives, “IT‐Dependent Strategic Initiatives and Sustained Competitive Advantage: A Review
and Synthesis of the Literature,”
MIS Quarterly 29, no. 4 (2005), 755.
IT Assets IT Capabilities
IT Infrastructure • Hardware
• Software and company apps
• Network• Data
• Web site
Information Repository • Customer information
• Employee information
• Marketplace information
• Vendor information Technical Skills
• Prociency in systems analysis
• Programming and Web design skills
• Data analysis/data scientist skills
• Network design and implementation skills
IT Management Skills • Business process knowledge
• Ability to evaluate technology options
• Project management skills
• Envisioning innovative IT solutions
Relationship Skills • Spanning skills such as business‐IT relationship management
• External skills such as vendor management
Copyright © 2016 John Wiley & Sons, Inc. 38 Strategic Use of Information Resources
manager that competitive forces result from more than just the actions of direct competitors. We explore each force
in detail from an IS perspective.
Potential Threat of New Entrants
Existing rms within an industry often try to reduce the threat of new entrants to the marketplace by erecting bar-
riers to entry. New entrants seem to come out of nowhere; established rms can diversify their business models and
begin to compete in the space occupied by existing rms, or an enterprising entrepreneur can create a new business
that changes the game for existing rms. Barriers to entry— including a rm’s controlled access to limited distribu-
tion channels, public image of a rm, unique relationships with customers, and an understanding of their industry’s
government regulations—help the rm create a stronghold by offering products or services that are difcult to dis-
place in the eyes of customers based on apparently unique features. Information resources also can be used to build
barriers that discourage competitors from entering an industry. For example, Google’s search algorithm is a source
of competitive advantage for the search company, and it’s a barrier of entry for new entrants that would have to cre-
ate something better to compete against Google. New entrants have failed to erode Google’s market share, which
holds fast at 65% in the United States and at over 90% in Europe. 6
Walmart, another example, effectively blocks
competition with its inventory control system, which helps it drive down expenses and ultimately offer lower costs
to customers. Any company entering Walmart’s marketplace would have to spend millions of dollars to build the
inventory control system and IS required to provide its operations with the same capabilities. Therefore, the system
at Walmart may be a barrier to entry for new companies. Search engine optimization (actions that a rm can take to improve its prominence in search results) has served
as a barrier to entry for some businesses. Consider the Web site that has the number one position in a user’s search.
There is only one number one position, making it an advantage for the company enjoying that position and a barrier
for all other Web sites seeking that position.
Bargaining Power of Suppliers
3
Bargaining Power of Buyers
2
Strategic use• Cost effectiveness
• Market access
• Differentiation of
product or service Strategic use
• Switching costs
• Access to distribution channels
• Economies of scale
Strategic use • Selection of supplier
• Threat of backward
integration Strategic use
• Buyer selection
• Switching costs
• Differentiation
Strategic use • Redefine products and
services
• Improve price/performance
Potential Threat of New Entrants
1
Threat of Substitute Products
4
Industry Competitors
5
FIGURE 2.3 Five competitive forces with potential strategic use of information resources.
Sources: Adapted from M. Porter, Competitive Strategy (New York: The Free Press, 1998); and Lynda M. Applegate, F. Warren
McFarlan, and James L. McKenney, Corporate Information Systems Management : The Issues Facing Senior Executives , 4th ed.
(Homewood, IL: Irwin, 1996).
6 “Viewed as a Monopoly in Europe, Google Takes on Role as a Wireless Trust‐Buster in U.S.,” New York Times (May 8, 2015), B1, B6.
Copyright © 2016 John Wiley & Sons, Inc. 39 How Can Information Resources Be Used Strategically?
Bargaining Power of Buyers
Customers often have substantial power to affect the competitive environment. This power can take the form of
easy consumer access to several retail outlets to purchase the same product or the opportunity to purchase in large
volumes at superstores like Walmart. Information resources can be used to build switching costs that make it less
attractive for customers to purchase from competitors. Switching costs can be any aspect of a buyer’s purchas-
ing decision that decreases the likelihood of “switching” his or her purchase to a competitor. Such an approach
requires a deep understanding of how a customer obtains the product or service. For example, Amazon.com’s
patented One Click option encourages return purchases by making buying easier. Amazon.com stores buyer
information, including a default credit card number, shipping method, and “ship‐to” address so that purchases
can be made with one click, saving consumers the effort of data reentry and further repetitive choices. Similarly,
Apple’s iTunes simple‐to‐use interface and proprietary software for downloading and listening to music makes
it difcult for customers to use other formats and technologies, effectively reducing the power of the buyers, the customers.
Bargaining Power of Suppliers
Suppliers’ bargaining power can reduce a rm’s options and ultimately its protability. Suppliers often strive to
“lock in” customers through the use of systems (and other mechanisms). For example, there are many options for
individuals to back up their laptop data, including many “cloud” options. The power of any one supplier is low
because there are a number of options. But Apple’s operating system enables easy creation of backups and increases
Apple’s bargaining power. Millions of customers nd it easy to use the iCloud, and they do. The force of bargaining power is strongest when a rm has few suppliers from which to choose, the quality of
supplier inputs is crucial to the nished product, or the volume of purchases is insignicant to the supplier. For
example, steel rms lost some of their bargaining power over the automobile industry because car manufacturers
developed technologically advanced quality control systems for evaluating the steel they purchase. Manufacturers
can now reject steel from suppliers when it does not meet the required quality levels. Through the Internet, rms continue to provide information for free as they attempt to increase their share of
visitors to their Web sites and gather information about them. This decision reduces the power of information sup-
pliers and necessitates nding new ways for content providers to develop and distribute information. Many Internet
rms are integrating backward or sideways within the industry, that is, creating their own information supply and
reselling it to other Internet sites. Well‐funded rms simply acquire these content providers, which is often quicker
than building the capability from scratch. One example of this was Amazon.com’s purchase of Zappos, the shoe
retailer. More recently, in 2015 LinkedIn acquired online learning company Lynda.com to add a capability to offer
professional development to the company’s business of networking, recruitment, and advertising.
Threat of Substitute Products
The potential of a substitute product in the marketplace depends on the buyers’ willingness to substitute, the
relative price‐to‐performance ratio of the substitute, and the level of switching costs a buyer faces. Information
resources can create advantages by reducing the threat of substitution. Substitutes that cause a threat come from
many sources. Internal innovations can cannibalize existing revenue streams for a rm. For example, new iPhones
motivate current customers to upgrade, essentially cannibalizing the older product line revenue. Of course, this is
also a preemptive move to keep customers in the iPhone product family rather than to switch to another competi-
tor’s product. The threat might come from potentially new innovations that make the previous product obsolete.
Tablets have reduced the market for laptops and personal computers. GPS systems have become substitutes for
paper maps, digital cameras have made lm and lm cameras obsolete, and MP3 music has sharply reduced the
market for vinyl records, record players, CDs, and CD players. Free Web‐based applications are a threat to soft-
ware vendors who charge for their products and who do not have Web‐based delivery. Revolutions of many kinds
and levels of maturity seem to be lurking everywhere. Cloud services are a substitute for data centers. Uber offers a
substitute for taxicabs. Managers must watch for potential substitutes from many different sources to fully manage
this competitive threat.
Copyright © 2016 John Wiley & Sons, Inc. 40 Strategic Use of Information Resources
Industry Competitors
Rivalry among the rms competing within an industry is high when it is expensive for a rm to leave the industry,
the growth rate of the industry is declining, or products have lost differentiation. Under these circumstances, the
rm must focus on the competitive actions of rivals to protect its own market share. Intense rivalry in an industry
ensures that competitors respond quickly to any strategic actions. Facebook enjoys a competitive advantage in the
social networking industry. Other sites have tried to compete with Facebook by offering a different focus, either a
different type of interface or additional ways to network. Competition is erce and many start‐ups hope to “be the
next Facebook.” However, Facebook continues to lead the industry, in part by continued innovation and in part by its huge customer base, which continues to raise the bar for competitors. The processes that rms use to manage their operations and to lower costs or increase efciencies can provide
an advantage for cost‐focus rms. However, as rms within an industry begin to implement standard business
processes and technologies—often using enterprisewide systems such as those of SAP and Oracle—the industry
becomes more attractive to consolidation through acquisition. Standardizing IS lowers the coordination costs of
merging two enterprises and can result in a less competitive environment in the industry. One way competitors differentiate themselves with an otherwise undifferentiated product is through creative use
of IS. Information provides advantages in such competition when added to an existing product. For example, the
iPod, iPhone, iPad, and iWatch are differentiated in part because of the iTunes store and the applications available
only to users of these devices. Competitors offer some of the same information services, but Apple was able to take
an early lead by using information systems to differentiate their products. Credit card companies normally compete
on nancial services such as interest rate, fees, and payment period. But Capital One differentiated its credit cards
by adding information to its services; it provided customers their credit scores. Each of the competitive forces identied by Porter’s model is acting on rms at all times, but perhaps to a greater
or lesser degree. There are forces from potential new entrants, buyers, sellers, substitutes, and competitors at all
times, but their threat varies. Consider Zara, the case discussed in at the beginning of this chapter. See Figure 2.4
for a summary of these ve forces working simultaneously at the retailer and manufacturer. General managers can use the ve competitive forces model to identify the key forces currently affecting compe-
tition, to recognize uses of information resources to inuence forces, and to consider likely changes in these forces FIGURE 2.4 Application of ve competitive forces model for Zara.
Competitive Force IT Inuence on Competitive Force
Threat of New Entrant Zar s IT supports its tightly knit group of designers, market specialists, production managers, and production planners. New entrants are unlikely to
be able to provide IT to support such relationships that have been built over
time at Zara. Further, it has a rich information repository about customers that
would be hard to replicate.
Bargaining Power of Buyers Recently, Zara has employed laser technology to measure 10,000 women volunteers so that it can add the measurements of “real” customers into its
information repositories. This means that the new products will be more likely
to t Zara customers.
Bargaining Power of Suppliers Its computer‐controlled cutting machine cuts up to 1,000 layers at a time. A large number of sellers are available for the simple task of sewing the
pieces together. Zara has great exibility in choosing the sewing companies.
Industry Competitors Zara tracks breaking trends and focuses on meeting customer preferences for trendy, low‐cost fashion. The result is the highest sales per square foot in its
industry, virtually no advertising, only 10% of stock remaining unsold, very low
inventory levels, new products offered in 15 days from idea to shelves, and
extremely efcient manufacturing and distribution operations.
Threat of Substitute Products IT helps Zara offer extremely fashionable lines that are expected to last for approximately 10 wears. IT enables Zara to offer trendy, appealing apparel at
hard‐to‐beat prices, making substitutes difcult.
Copyright © 2016 John Wiley & Sons, Inc. 41 How Can Information Resources Be Used Strategically?
over time. The changing forces drive both the business strategy and IS strategy, and this model provides a way to
think about how information resources can create competitive advantage for a business unit and, even more broadly,
for the rm. The forces also can reshape an entire industry—compelling general managers to take actions to help
their rm gain or sustain competitive advantage.
Using Information Resources to Alter the Value Chain
A second lens for describing the strategic use of information systems is Porter’s value chain. The value chain model
addresses the activities that create, deliver, and support a company’s product or service. Porter divided these activ-
ities into two broad categories (Figure 2.5): support and primary activities. Primary activities relate directly to the
value created in a product or service whereas support activities make it possible for the primary activities to exist
and remain coordinated. Each activity may affect how other activities are performed, suggesting that information
resources should not be applied in isolation. For example, more efcient IS for repairing a product may increase
the possible number of repairs per week, but the customer does not receive any value unless his or her product is
repaired, which requires that the spare parts be available. Changing the rate of repair also affects the rate of spare
parts ordering. If information resources are focused too narrowly on a specic activity, then the expected value may
not be realized because other parts of the chain have not adjusted. The value chain framework suggests that competition stems from two sources: lowering the cost to perform
activities and adding value to a product or service so that buyers will pay more. To achieve true competitive
advantage, a rm requires accurate information on elements outside itself. Lowering activity costs achieves an
advantage only if the rm possesses information about its competitors’ cost structures. Even though reducing
isolated costs can improve prots temporarily, it does not provide a clear competitive advantage unless the
rm can lower its costs below a competitor’s. Doing so enables the rm to lower its prices as a way to grow its
market share. For example, many Web sites sell memory to upgrade laptops. But some sites, such as crucial.com, have an
option that automates the process prior to the sales process. These sites have the “Crucial System Scanner Tool,”
which scans the customer’s laptop, identies the current conguration and the capacity, and then suggests com-
patible memory upgrade kits. The customer uses the scanner, which identies the conguration of the laptop, and
automatically opens a Web page with the appropriate memory upgrades. The customer does not have to gure out
the conguration or requirements; it’s done automatically. By combining a software program like its congurator
with the sales process, crucial.com has added value to the customer’s experience by automating a key process.
Organization
Human Resources
TechnologyPurchasing
Inbound Logistics OutboundLogistics
Operations Marketing
and SalesService
Materials handling
DeliveryManufacturing
Assembly
Order
processingShippingProduct
Pricing
PromotionPlace Customer service
Repair
Primary Activities Support Activities
FIGURE 2.5
Value chain of the rm.
Source: Adapted from Michael Porter and Victor Millar, “How Information Gives You Competitive Advantage,” Harvard Business
Review (July–August 1985), reprint no. 85415.
Copyright © 2016 John Wiley & Sons, Inc. 42 Strategic Use of Information Resources
Although the value chain framework emphasizes the activities of the individual rm, it can be extended, as
in Figure 2.6, to include the rm in a larger value system. This value system is a collection of rm value chains
connected through a business relationship and through technology. From this perspective, a variety of strategic
opportunities exist to use information resources to gain a competitive advantage. Understanding how information is
used within each value chain of the system can lead to new opportunities to change the information component of
value‐added activities. It can also lead to shakeouts within the industry as rms that fail to provide value are forced
out and as surviving rms adopt new business models. Opportunity also exists in the transfer of information across value chains. For example, sales forecasts gener-
ated by a manufacturer, such as a computer or automotive company, and linked to supplier systems create orders
for the manufacture of the necessary components for the computer or vehicle. Often this coupling is repeated from
manufacturing company to vendor/supplier for several layers, linking the value chains of multiple organizations. In
this way, each member of the supply chain adds value by directly linking the elements of its value chains to others. Optimizing a company’s internal processes, such as its supply chain, operations, and customer relationship
processes, can be another source of competitive advantage. Tools are routinely used to automate the internal oper-
ations of a rm’s value chain, such as supply chain management (SCM) to source materials for operations,
enterprise resource planning (ERP) systems to automate functions of the operations activities of the value chain,
and customer relationship management (CRM) systems to optimize the processing of customer information.
These systems are discussed in more detail in Chapter 5. In an application of the value chain model to the Zara example discussed earlier, Figure 2.7 describes the value
added to Zara’s primary and support activities provided by information systems. The focus in Figure 2.7 is on
value added to Zara’s processes, but suppliers and customers in its supply chain also realize the value added by
information systems. Most notably, the customer is better served as a result of the systems. For example, the stores
place orders twice a week over personal digital assistants (PDAs). Each night, managers use their PDAs to learn
about newly available garments. The orders are received and promptly processed and delivered. In this way, Zara
can be very timely in responding to customer preferences. Unlike the ve competitive forces model, which focuses on industry dynamics, the focus of the value chain is
on the rm’s activities. Yet, using the value chain as a lens for understanding strategic use of information resources
affects competitive forces because technology innovations add value to suppliers, customers, or even competitors
and potential new entrants.
Supplier’s Value
Chains Firm’s
Value
Chain Channel’s
Value
Chains Buyer’s
Value
Chains
FIGURE 2.6 The value system: Interconnecting relationships between organizations.
Copyright © 2016 John Wiley & Sons, Inc. 43 Sustaining Competitive Advantage
Sustaining Competitive Advantage
It might seem obvious that a rm would try to sustain its competitive advantage. After all, the rm might have
worked very hard to create advantages, such as those previously discussed. However, there is some controversy
about trying to sustain a competitive advantage. On one side are those who warn of hypercompetition as discussed in Chapter 1. 7
In an industry facing hyper-
competition, recall that trying to sustain an advantage can be a deadly distraction. Consider the banking industry as
a good example that has undergone much change over the past ve decades. In the 1960s, people needed to visit a
physical bank for all transactions, including withdrawing from or depositing to their accounts and transferring among
accounts. In the 1970s, some banks took a chance and invested in automated teller machines (ATMs) and were
among the innovators in the industry. In the 1980s, some banks pioneered “bank‐by‐phone” services that enabled
customers to pay bills by phone, attempting to establish competitive advantage with technology. In the late 1990s,
Web sites served to augment banking services, and “bank‐by‐web” was the new, exciting way to compete. Most
recently, many banks are providing mobile banking, enabling customers to make deposits by using their smartphone
camera to take photos of checks that previously needed to be turned in physically. Then the checks can be destroyed. The obvious picture to paint here is that competitors caught up with the leaders very quickly, and competitive
advantage was brief. When ATMs were introduced, it did not take long for others to adopt the same technology.
Even small banks found that they could band together with competitors and invest in the same technologies. The
same imitation game took place with “bank by phone,” “bank by Web,” and mobile banking. More interestingly, what sounds like an exciting way to show off the power of technology can also be interpreted
as a way to increase the cost of doing business. Although some investments, such as using ATMs to replace tellers,
lowered costs, other investments raised costs (such as needing to offer phone, Web, and mobile banking options to
customers). FIGURE 2.7
Application of value chain model to Zara.
Activity Zar s Value Chain
Primary Activities
Inbound Logistics IT‐enabled just‐in‐time (JIT) strategy results in inventory being received when needed. Most
dyes are purchased from its own subsidiaries to better support JIT strategy and reduce
costs. Many suppliers are located near its production facilities.
Operations Information systems support decisions about the fabric, cut, and price points. Cloth is ironed and products are packed on hangers so they do t need ironing when they arrive at stores.
Price tags are already on the products. Zara produces 60% of its merchandise in house.
Fabric is cut and dyed by robots in 23 highly automated Spanish factories.
Outbound Logistics Clothes move on miles of automated conveyor belts at distribution centers and reach stores within 48 hours of the order.
Marketing and Sales Limited inventory allows low percentage of unsold inventory (10%); POS at stores linked to headquarters track how items are selling; customers ask for what they want, and this
information is transmitted daily from stores to designers over handheld computers.
Service No focus on service on products.
Support Activities
Organization IT supports tightly knit collaboration among designers, store managers, market specialists, production managers, and production planners.
Human Resources Managers are trained to understand wha s selling and report data to designers every day. The manager is key to making customers feel listened to and to communicating with head-
quarters to keep each store and the entire Zara clothing line at the cutting edge of fashion.
Technology Technology is integrated to support all primary activities. Zar s IT staff works with vendors to develop automated conveyors to support distribution activities.
Purchasing Vertical integration reduces amount of purchasing needed.
7 Don Goeltz, “Hypercompetition,” vol. 1 of The Encyclopedia of Management Theory, ed. Eric Kessler (Los Angeles: Sage, 2013), 359–60.
Copyright © 2016 John Wiley & Sons, Inc. 44 Strategic Use of Information Resources
Rather than arguing that sustaining a competitive advantage is a deadly distraction, Piccoli and Ives 8
provide
a framework that outlines the ways in which a rm can provide barriers to competitors, which would build sus-
tainability. The framework outlines four types of barriers: IT project barrier, IT resources and capabilities barrier,
complementary resources barrier, and preemption barrier. See Figure 2.8 for a brief denition and a few examples of each. So, should a rm focus attention on building barriers to the competition, or should it just give up on the
established competitive advantage and focus on seeking the next revolution? Given that some technologies can be
copied quickly, or even just purchased from the same well‐known vendor who supplied it to the leader, it seems
prudent to spend some time to explore each technological option in the Piccoli and Ives’ framework and determine
where the rm can increase sustainability. If the project is rather small, then the rm should focus on the other
three barriers. If the rm can build loyalty with customers who appreciate innovation, a two‐month competitive
advantage might turn into a two‐year or longer advantage (thus building a preemption barrier). If a rm can capture
valuable data right at the beginning, a copycat rm may fall further behind. Also, building partnerships or securing
exclusive rights to some of the technologies can further slow down a competitor. It would not be wise to stop there, however. The rm should continue to seek ways in which IT can improve
offerings or service to customers. And the rm should go beyond those steps, focusing on how it might change
its entire industry. One example is the way in which Netix continued to speed its DVD delivery service while
focusing on movie streaming, a technology that will someday make the delivery service obsolete. Netix was more
than aware that its revenue was falling every quarter, but it expected and embraced the shortfall with its strategic
move into streaming. 9
Given that other services such as Amazon and many cable companies had begun streaming,
Netix has created original series offerings such as House of Cards and Orange Is the New Black.
Therefore, a rm might (1) seek ways to build sustainability by looking into each of the four potential barriers
to identify promising ways to block the competition and at the same time (2) continue to innovate and change the
industry. Netix has done both by building a dependable and efcient mailing business and creating new business
models such as streaming and series production. Focusing only on building sustainability has the potential effect of
ghting a losing battle, and focusing only on new business models might be too risky as the sole source of growth.
The last strategic framework, resource‐based view, is more general and emphasizes ways in which to exploit its
many potential resources. The framework, described next, can be helpful for sustaining and creating competitive
advantage. FIGURE 2.8
Barriers to competition and building sustainability.
Barrier Denition Examples
IT project barrier It would be a large undertaking for a competitor to build the system to copy
the capability. • Requires a large investment
• Requires a long time to build
• Complicated to build
IT assets and capabilities barrier Competitors might lack the IT resources to copy the capability. • Database of customers that cannot
be copied
• Expert developers or project managers
Complementary resources barrier The rm has other resources that create a synergy with the IT that provides
competitive advantage. • Respected brand
• Partnership agreements
• Exclusivity arrangements
• Good location
Preemption barrier The rm “got there rst.” • Loyal customer base built at the beginning
• Firm known as “the” source
8 Piccoli and Ives, “IT‐Dependent Strategic Initiatives and Sustained Competitive Advantage,” 755.
9 Greg Sandoval, “Netflix CEO, DVD Subscribers to Decline Now and Forever,” CNET, http://www.cnet.com/news/netflix‐ceo‐dvd‐subscribers‐to‐
decline‐now‐and‐forever (accessed August 19, 2015).
Copyright © 2016 John Wiley & Sons, Inc. 45 Sustaining Competitive Advantage
Using the Resource‐Based View (RBV)
A fourth framework, the resource‐based view (RBV) ,10
is useful for determining whether a rm’s strategy has
created value by using IT. Like the value chain model, the RBV concentrates on areas that add value to the rm.
Whereas the value chain model focuses on a rm’s activities, the resource‐based view focuses on the resources that
it can manage strategically in a rapidly changing competitive environment. Like the Piccoli and Ives framework,
the RBV focuses on sustaining competitive advantage but through use of resources rather than by raising compet-
itive barriers. The RBV has been applied in the area of IS to help identify two types of information resources: those that enable
a rm to attain competitive advantage and those that enable a rm to sustain the advantage over the long term.
From the IS perspective, 11
some types of resources are better than others for creating attributes that enable a rm to
attain competitive advantage (i.e., value, rarity) whereas other resources are better for creating attributes to sustain
competitive value (e.g., low substitutability, low mobility, low imitability).
Resources to Attain Competitive Advantage
Valuable and rare resources that rms must leverage to establish a superior resource position help companies attain
competitive advantage. A resource is considered valuable when it enables the rm to become more efcient, effec-
tive, or innovative. It is a rare resource when other rms do not possess it. For example, many banks today would
not think of doing business without a mobile banking app. Mobile banking apps are very valuable to the banks in
terms of their operations. A bank’s customers expect it to provide a mobile banking app that can be used on any
mobile device. However, because many other banks also have mobile banking apps, they are not a rare resource,
and they do not offer a strategic advantage. Some call them table stakes or resources required just to be in the
business. Many systems in Eras I and II, and especially Era III, were justied on their ability to provide a rare and
valuable resource. In some cases these very systems have become table stakes.
Resources to Sustain Competitive Advantage
Many rms that invested in systems learned that gaining a competitive advantage does not automatically mean that
they could sustain it over the long term. The only way to do that is to continue to innovate and to protect against
resource imitation, substitution, or transfer. For example, Walmart’s complex logistics management is deeply
embedded in both its own and its suppliers’ operations so that imitations by other rms is unlikely. The Oakland
Athletics’ use of information systems propelled it to victory, as depicted in the movie Moneyball, but as soon as
other teams learned about the secret behind the success Oakland was having with analytics and information sys-
tems, they, too began to use similar techniques, reducing the advantage Oakland initially enjoyed. Finally, to sustain
competitive advantage, resources must be difcult to transfer or replicate, or relatively immobile. Some information
resources can be easily bought. However, technical knowledge—especially that which relates to a rm’s opera-
tion—an aggressive and opportunistic company culture, deep relationships with customers, and managerial experi-
ence in the rm’s environment is less easy to obtain and, hence, considered harder to transfer to other rms. Some IT management skills are general enough in nature to make them easier to transfer and imitate. Although
it clearly is important for IS executives to manage internally oriented resources such as IS infrastructure, systems
development, and running cost‐effective IS operations, these skills can be acquired in many different forms. They
are basic IT management skills possessed by virtually all good IS managers. Other skills, however, are unique to a
rm and require considerable time and resources to develop. For example, it takes time to learn how the rm oper-
ates and to understand its critical processes and socially complex working relationships. However, the message sug-
gested by the RBV is that IS executives must look beyond their own IS shop and concentrate on cultivating resources
10 The resource‐based view was originally proposed by management researchers, most prominently Jay Barney, “Firm Resources and Sustained Compet-
itive Advantage,” Journal of Management 17, no. 1 (1991), 99–120 and “Is the Resource‐Based ‘View’ a Useful Perspective for Strategic Management
Research? Yes,” Academy of Management Review 26, no. 1 (2001), 41–56; M. Wade and J. Hulland, “Review: The Resource‐Based View and Information
Systems Research: Review, Extension and Suggestions for Future Research,” MIS Quarterly 28, no. 1 (2004), 107–42. This article reviewed the resource‐
based view’s application in the MIS literature and derived a framework to better understand its application to IS resources. 11 http://www.minonline.com/best_of_web/Best‐of‐the‐Web‐CommunitySocial‐Networking_10185.html (accessed January 1, 2012).
Copyright © 2016 John Wiley & Sons, Inc. 46 Strategic Use of Information Resources
that help the rm understand changing business environments and allow it to work well with all its external stake-
holders. Even when considering internally oriented information resources, there are differences in the extent to
which these resources add value. Many argue that IS personnel are willing to move, especially when offered higher
salaries by rms needing these skills. Yet, some technical skills, such as knowledge of a rm’s use of technology to
support business processes, and technology integration skills are not easily exported to, or imported from, another
rm. Further, hardware and many software applications can be purchased or outsourced, making them highly imita-
ble and transferrable. Because it is unlikely that two rms have exactly the same strategic alternatives, resources at
one rm might have only moderate substitutability in the other rm.
Zara and RBV
Figure 2.9 indicates the extent to which the attributes of each information resource may add value to Zara, the
company discussed earlier in the chapter. Zara’s advantage did not come from the specic hardware or software
technologies it employed. Its management spent ve to ten times less on technology than its rivals. In contrast, FIGURE 2.9 Information resources at Zara, by attribute.
Source: Based on M. Wade and J. Hulland, “The Resource‐Based View and Information Systems Research: Review, Extension and
Suggestions for Future Research,”
MIS Quarterly 28, no. 1 (2004), 107–42.
Value Creation Value Sustainability
Resource/Attribute Value Rarity Imitation Substitution Transfer
IT ASSET
IT Infrastructure
Moderate because of its skillful use
of the POS equipment, handheld
computers, automated conveyors,
and computer‐controlled equipment
to cut patterns, but similar
technology could be purchased
and used by competitors Easy to imitate and transfer its infrastructure
Moderate for substitution of infrastructure (automated
conveyers)
Information Repository
High value and rarity because of
its information about customer
preferences and body types, which
Zara leverages strategically; well
integrated with Zar s operations
and personnel; retail information
analyzed by designers to identify
future products Difcult to imitate and transfer
Extremely difcult to substitute because of the volume
and nature of the data
IT CAPABILITY
Technical Skills
Low value/rarity because IS
professionals could be hired
relatively easily to perform the
technical work Moderately difcult to imitate, substitute, or transfer;
some sustainability results because the skills are used to
integrate across a range of systems
IT Management Skills
High value/rarity because they were
acquired over time Difcult to imitate, substitute, or transfer; resources
leveraged well
Relationship Skills—
Externally
Focused High value from relationships with
European manufacturers
Moderate rarity because other
companies also have relationships
with manufacturers although required
time to develop the relationship
Difcult to imitate, substitute, or transfer; turnaround time
of under 5 weeks from conception to distribution
Relationship Skills—
Spanning High rarity of spanning Difcult to imitate, substitute, or transfer spanning; unusual
tight‐knit teams at headquarters not easy to imitate or
purchase in the marketplace, allowing the ability to
correctly interpret and quickly respond to customer needs
Copyright © 2016 John Wiley & Sons, Inc. 47 Strategic Alliances
Zara has created considerable value from the other information asset—its valuable information repository with cus-
tomers ’ preferences and body types.
In terms of information capability, much of Zara ’ s value creation is from its valuable and rare IT management
skills. Zara ’ s relationship skills also serve as a tool for value creation and sustainability. Overall, Zara is able to
create high value from its IT management and relationship skills. It would be moderately to extremely dif cult to
substitute, imitate, or transfer them. The resource‐based theory, although highly cited, has received its share of criticism. 12
The major criticism is that
it doesn ’ t clearly distinguish between value and strategic competitive advantage. Another criticism of the original
theory is that it doesn ’ t consider different types of resources. However, IS researchers addressed this concern when
they categorized resources into assets and capabilities and then provided examples of each. In applying the theory, it is important to recognize that it is focused on internal sources of a rm ’ s competitive advantage and, thus, does
not thoroughly take into account the environment in which the rm is embedded, especially when the environment is quite dynamic. Most rms don ’ t really have a choice of creating competitive advantage by manipulating industry forces either
through their use of information resources or IT‐enhanced activities. Yet, like Zara , they can leverage the IT
resources they do have to create and sustain strategic value for their rms.
Strategic Alliances
The value chain helps a rm focus on adding value to the areas of most value to its partners. The resource‐based
view suggests adding value using externally oriented relationship skills. The Eras framework emphasizes the
importance of collaborative partnerships and relationships. The increasing number of Web applications focused on
collaboration and social networking only foreshadow even more emphasis on alliances. These relationships can
take many forms, including joint ventures, joint projects, trade associations, buyer–supplier partnerships, or car-
tels. Often such partnerships use information technologies to support strategic alliances and integrate data across
Social Business Lens: Social Capital
A management theory that is gaining in popularity as a tool in understanding a social business is the social capital
theory.
Social capital
is the sum of the actual and potential resources embedded within, available through, and
derived from the network of relationships possessed by an individual or social unit. Relationships associated with
networks have the potential of being a valuable resource for businesses. The theory s focus is not on managing
individuals but on managing relationships.
The value from networks may be derived in one of three interrelated ways: structural, relational, and cognitive.
The
structural dimension is concerned with the pattern of relationships in the network—who is connected to whom.
The
relational dimension looks at the nature of relationships among members in the network (i.e., respect, friend-
ship)—how the connected people interact. The third
cognitive dimension looks at the way people think about
things in the network, in particular whether they have a shared language, system of meanings or interpretations—
how the connected people think. The unusual thing about social capital is that no one person owns it. Rather, the
people in the relationship own it jointly. Thus, it can t be traded easily, but it can be used to do certain things more
easily. In particular, in social business applications, social capital may make it easier to get the information needed
to perform a task or connect with certain key people. In IS development teams, social capital may improve the
willingness and ability of team members to coordinate their tasks in completing a project.
Source:
J. Nahapiet and S. Ghosal , “ Social Capital, Intellectual Capital and the Organizational Value , “
Academy of Management
Review
, 23 , no. 2 ( 1998 ), 242 – 66 .
12
For an excellent discussion of criticisms of the resource‐based view, see J. Kraaijenbrink , J‐C Spender , and A. J. Groen “ The Resource‐Based View:
A Review and Assessment of Its Critiques ,” Journal of Management
, 36 , no. 1 , ( 2010 ), 349 – 72 .
Copyright © 2016 John Wiley & Sons, Inc. 48 Strategic Use of Information Resources
partners’ information systems. A strategic alliance is an interorganizational relationship that affords one or more
companies in the relationship a strategic advantage. An example is the strategic alliance between game maker
Zynga and Facebook. As documented in Facebook’s IPO ling in January 2012, the relationship is a mutually
benecial one. Zynga developed some of the most popular games found on Facebook, including Maa Wars,
Farmville, and WordsWithFriends. Facebook has exclusive rights to Zynga’s games, many of which have generated
thousands of new members for Facebook. It also gained access to Zynga’s customer database. The alliance gen-
erates signicant revenue for both parties because players of these games purchase virtual goods with real money
and Zynga purchases signicant advertising space from Facebook to promote its games. Zynga benets from the
revenue resulting from its gamers on Facebook community. 13
Business ecosystems are often groups of strategic alliances in which a number of partners provide important ser-
vices to each other and jointly create value for customers. The Facebook ecosystem could be said to include many
of the companies that use that platform to deliver their apps, that allow customers to post directly on their Facebook
page from the app, or that allow customers to log on to their site using their Facebook account. This adds value
for customers by providing greater convenience, and by offering the ability to automatically update their activity
stream with information from the app, and both Facebook and the app provider benet from their alliance. IS often provides the platform upon which a strategic alliance functions. Technology can help produce the prod-
uct developed by the alliance, share information resources across the partners’ existing value systems, or facilitate
communication and coordination among the partners. Because many services are information based today, an IS
platform is used to deliver these services to customers. The Facebook– Zynga alliance is an example of this type of
IS platform. Further, linking value chains through supply chain management (SCM) is another way that rms build
an IT‐facilitated strategic alliance. Co‐opetition
Clearly, not all strategic alliances are formed with suppliers or customers as partners. Rather, co‐opetition is an
increasingly popular alternative model. As dened by Brandenburg and Nalebuff in their book of the same name, co‐opetition is a strategy whereby companies cooperate and compete at the same time with companies in their
value net. 14
The value net includes a company and its competitors and complementors as well as its customers and
suppliers and the interactions among all of them. A complementor is a company whose product or service is used in
conjunction with a particular product or service to make a more useful set for the customer. For example, Goodyear
is a complementor to Ford and GM because tires are a complementary product to vehicles. Likewise, Amazon is a
complementor to Apple in part because the Amazon reading application, the Kindle, the reading tablet that Amazon
sells, is one of the most popular apps for the iPad. Finally, a cellular service is a complementor to Google’s search
engine because the service allows more consumers to use Google’s search function. Co‐opetition, then, is the strategy for creating the best possible outcome for a business by optimally combining
competition and cooperation. It can also be used as a strategy for sourcing as discussed in Chapter 10. It fre-
quently creates competitive advantage by giving power in the form of information to other organizations or groups.
For example, Covisint.com hosts the auto industry’s e‐marketplace, which grew out of a consortium of compet-
itors, including General Motors, Ford, DaimlerChrysler, Nissan, and Renault. By addressing multiple automo-
tive functional needs across the entire product life cycle, Covisint offers support for collaboration, supply chain
management, procurement, and quality management. Covisint.com has extended this business‐to‐partner platform
to other industries including health care, manufacturing, life sciences, food and beverage, and oil and gas. Thus,
co‐opetition as demonstrated by Covisint not only streamlines the internal operations of its backers but also has the
potential to transform an industry.
13 Adapted from N. Wingfield, “Virtual Products, Real Profits” The Wall Street Journal (September 9, 2011), A1, 16; L. B. Baker, “Zynga’s Sales Soar
on Facebook Connection,” Reuters News (February 2, 2012), http://www.reuters.com/article/2012/02/02/us‐zynga‐shares‐idUSTRE8111PO20120202
(accessed September 14, 2015); Jackie Cohen, “So Much for the Facebook Effect: Zynga Sees $978.6 Million Loss In 2011,” Yahoo News (February 14,
2012), http://www.allfacebook.com/facebook‐zynga‐eps‐2012‐02 (accessed February 20, 2012). 14 A. Brandenburg and B. Nalebuff, Co‐opetition (New York: Doubleday, 1996).
Copyright © 2016 John Wiley & Sons, Inc. 49 Risks
Risks
As demonstrated throughout this chapter, information resources may be used to gain strategic advantage even if that
advantage is eeting. When information systems are chosen as the tool to outpace a rm’s competitors, executives
should be aware of the many risks that may surface. Some of these risks include the following: • Awakening a sleeping giant: A rm can implement IS to gain competitive advantage only to nd that it
nudged a larger competitor with deeper pockets into implementing an IS with even better features. FedEx
offered its customers the ability to trace the transit and delivery of their packages online. FedEx’s much
larger competitor, UPS, rose to the challenge. UPS not only implemented the same services but also added
a new set of features eroding some of the advantages FedEx enjoyed, causing FedEx to update its offerings.
Both the UPS and FedEx sites passed through multiple Web site iterations as the dueling delivery companies
continue to struggle for competitive advantage.
• Demonstrating bad timing: Sometimes customers are not ready to use the technology designed to gain
strategic advantage. For example, Grid Systems created the GRiDPAD in 1989. It was a tablet computer
designed for businesses to use in the eld and was well reviewed at that time. But it didn’t get traction.
Three decades later, in 2010, Apple introduced the iPad, and tablet computing took off.
• Implementing IS poorly: Stories abound of information systems that fail because they are poorly imple-
mented. Typically, these systems are complex and often global in their reach. An implementation asco took
place at Hershey Foods when it attempted to implement its supply and inventory system. Hershey devel-
opers brought the complex system up too quickly and then failed to test it adequately. Related systems prob-
lems crippled shipments during the critical Halloween shopping season, resulting in large declines in sales
and net income. More recently, in 2012, more than 100,000 Austin Energy customers received incorrect util-
ity bills due to problems with the company’s vendor‐supplied bill collection system. Some customers went
months without a bill, and others were incorrectly billed. Some businesses that owed $3,000 were billed $300,000. Still others tried to pay their bill online only to be told that the payment had not recorded when it
had been. The utility calculated that the problems cost it more than $8 million. 15
• Failing to deliver what users want: Systems that do not meet the needs of the rm’s target market are likely
to fail. For example, in 2011, Netix leadership divided the company into two, calling the DVD‐rental
business Qwikster and keeping the streaming business under Netix. But customers complained, and worse,
closed their accounts, and less than a month later, Qwikster was gone. Netix reunited both businesses under the Netix name. 16
• Running afoul of the law: Using IS strategically may promote litigation if the IS results in the violation of
laws or regulations. Years ago, American Airlines’ reservation system, Sabre, was challenged by the airline’s
competitors on the grounds that it violated antitrust laws. More recently, in 2010, Google said it was no
longer willing to adhere to Chinese censorship. The Chinese government responded by banning searching
via all Google search sites (not only google.cn but all language versions, e.g., google.co.jp. google.com.au),
including Google Mobile. Google then created an automatic redirect to Google Hong Kong, which stopped
June 30, 2010, so that Google would not lose its license to operate in China. Today, Google, Inc. is acting
in compliance with the Chinese government’s censorship laws and Chinese users of Google.cn see ltered
results as before. More recently, European antitrust ofcials claimed that Google’s search engine unfairly
generates results that favor its shopping sites over those of its competitors and that its Android mobile phone
operating system unfairly features Google as the default search engine. 17
15
Marty Toohey, “More Than 100,000 Austin Energy Customers Hit by Billing Errors from $55 Million IBM System,” Statesman (February 18, 2012),
http://www.statesman.com/news/local/more‐than‐100‐000‐austin‐energy‐customers‐hit‐2185031.html (accessed February 20, 2012). 16 Qwikster = Gonester (October 10, 2011), http://www.breakingcopy.com/netflix‐kills‐qwikster (accessed February 20, 2012).
17 “Viewed as a Monopoly in Europe, Google Takes on Role as a Wireless Trust‐Buster in U.S.,” The New York Times (May 8, 2015), B1, B6.
Copyright © 2016 John Wiley & Sons, Inc. 50 Strategic Use of Information Resources
Every business decision has risks associated with it. However, with the large expenditure of IT resources needed
to create sustainable, strategic advantages, the manager should carefully identify and then design a mitigation strat-
egy to manage the associated risks.
Co‐Creating IT and Business Strategy
This chapter has discussed the alignment of IT strategy with business strategy. Certainly, the two strategies must
be carefully choreographed to ensure receiving maximum value from IT investments and obtaining the maximum
opportunity to achieve the business strategy. However, in the fast‐paced business environment where information
is increasingly a core component of the product or service offered by the rm, managers must co‐create IT and
business strategy. That is to say that IT strategy is business strategy; one cannot be created independently of the
other. In many cases, they are now one in the same. For companies whose main product is information, such as nancial services companies, it ’ s clear that information
management is the core of the business strategy itself. How an investment rm manages the clients ’ accounts, how
its clients interact with the company, and how investments are made are all done through the management of
information. A nancial services company must co‐create business and IT strategy.
But consider a company like FedEx , most well known as the package delivery company. Are customers paying
to have a package delivered or to have information about that package ’ s delivery route and timetable? One could
argue that they are one in the same and that increasingly the company ’ s business strategy is its IS strategy. Certainly,
there are components of the operation that are more than just information. There are actual packages to be loaded
on actual trucks and planes, which are then actually delivered to their destinations. However, to make it all work,
the company must rely on IS. Should the IS stop working or have a serious failure, FedEx would be unable to do
business. A company like this must co‐create IT strategy and business strategy. This was not true a few years ago. Companies could often separate IS strategy from business strategy in part
because their products or services did not have a large information component. For example, a few years ago,
should the IS of a trucking company stop working, the trucks would still be able to take their shipments to their
destination and pick up new ones. It might be slower or a bit more chaotic, but the business wouldn ’ t stop. Today,
that ’ s not the case. Complicated logistics are the norm, and IS are the foundation of the business as seen at FedEx . With the increasing number of IS applications on the Web and on mobile devices, rms increasingly need to
co‐create business and IT strategy. Managers who think they can build a business model without considering the
opportunities and impact of information systems, using both the resources owned by the rm and those available on
the Web, will nd they have signi cant dif culties creating business opportunities as well as sustainable advantage
in their marketplace.
Geographic Box: Mobile‐Only Internet Users Dominate Emerging Countries
More than 25% of mobile Web users in emerging markets connect to the Internet solely through mobile devices.
This is the case for 70% of mobile Web users in Egypt, 59% in India, and 50% in Nigeria but only for 25% of U.S. and
22% of U.K. mobile Web users. Malaysia is emerging as a test case for a mobile‐only Internet. It has rolled out a
next‐generation, high‐speed broadband network that covers most of its population. This infrastructure makes it
possible to make video calls with Apple
s FaceTime application in locations throughout the country using a tiny
pocket router that accesses a WiMAX wireless‐broadband network set up by a local conglomerate, YTL Corp.
Bhd . To further encourage the spread of Internet, Malaysia s leaders have pledged not to censor the Internet.
Sources:
G. Dunaway , “ Mobile Only Internet Users Dominate Emerging Markets ” Adotas.com (October 24, 2011), http://www.adotas.
com/201w1/10/mobile only internet users dominate emerging markets/ (accessed August 19, 2015) ;
J. Hookway , “ Broadband in
the Tropics ,”
The Wall Street Journal (September 21, 2011 ) , B6.
Copyright © 2016 John Wiley & Sons, Inc. 51 Discussion Questions
SUMMARY • Information resources include data, technology, people, and processes within an organization. Information resources can be either assets or capabilities.
• IT infrastructure and information repositories are IT assets. Three major categories of IT capabilities are technical skills, IT management skills, and relationship skills.
• Using IS for strategic advantage requires an awareness of the many relationships that affect both competitive business
and information strategies.
• The ve competitive forces model implies that more than just the local competitors inuence the reality of the business
situation. Analyzing the ve competitive forces—threat of new entrants, buyers’ bargaining power, suppliers’ bargaining
power, industry competitors, and threat of substitute products—from both a business view and an information systems
view helps general managers use information resources to minimize the effect of these forces on the organization.
• The value chain highlights how information systems add value to the primary and support activities of a rm’s internal
operations as well as to the activities of its customers and of other components of its supply chain.
• The resource‐based view (RBV) helps a rm understand the value created by its strategy. RBV maintains that compet-
itive advantage comes from a rm’s information resources. Resources enable a rm to attain and sustain competitive
advantage.
• IT can facilitate strategic alliances. Ecosystems are groups of strategic alliances working together to deliver goods and
services. Supply chain management (SCM) is a mechanism that may be used for creating strategic alliances.
• Co‐opetition is the complex arrangement through which companies cooperate and compete at the same time with other
companies in their value net.
• Numerous risks are associated with using information systems to gain strategic advantage: awaking a sleeping giant,
demonstrating bad timing, implementing poorly, failing to deliver what customers want, avoiding mobile‐based alterna-
tives, and running afoul of the law.
KEY TERMS
business ecosystem (p. 34) co‐opetition (p. 48)customer relationship management(CRM) (p. 42)enterprise resource planning (ERP) (p. 42) information resources (p. 36)IT asset (p. 36)IT capability (p. 36)
network effects (p. 34)
resource‐based view (RBV) (p. 45)
strategic alliance (p. 48) social capital (p. 47)supply chain management
(SCM) (p. 42)
DISCUSSION QUESTIONS 1. How can information itself provide a competitive advantage to an organization? Give two or three examples. For each
example, describe its associated risks.
2. Use the five competitive forces model as described in this chapter to describe how information technology might be used to
provide a winning position for each of these businesses:
a. A global advertising agency
b. A local restaurant
c. A mobile applications provider
d. An insurance company
e. A Web‐based audio book service
Copyright © 2016 John Wiley & Sons, Inc. 52 Strategic Use of Information Resources
3. Using the value chain model, describe how information technology might be used to provide a winning position for each of
these businesses:
a. A global advertising agency
b. A local restaurant
c. A mobile applications provider
d. An insurance company
e. A Web‐based audio book service
4. Use the resource‐based view as described in this chapter to describe how information technology might be used to provide
and sustain a winning position for each of these businesses:
a. A global advertising agency
b. A local restaurant
c. A mobile applications provider
d. An insurance company
e. A Web‐based audio book service
5. Some claim that the only sustainable competitive advantage for an organization is its relationships with its customers. All
other advantages eventually erode. Do you agree or disagree? How can information systems play a role in maintaining the
organization ’ s relationship with its customers? Defend your position.
6. Cisco Systems has a network of component suppliers, distributors, and contract manufacturers that are linked through
Cisco ’ s extranet. When a customer orders a Cisco product at its Web site, the order triggers contracts to manufacturers of
printed circuit board assemblies when appropriate and alerts distributors and component suppliers. Cisco ’ s contract manu-
facturers are aware of the order because they can log on to its extranet and link with Cisco ’ s own manufacturing execution
systems. What are the advantages of Cisco ’ s strategic alliances? What are the risks to Cisco? To the suppliers?
Groupon, Inc. raised $700 million at its IPO in the fall of 2011, instantly providing a valuation of almost $13 billion for a
company that was only three years old at the time. Some question the value, claiming Groupon has no sustainable compet-
itive advantage. Others see Groupon as an innovative company with high potential. Groupon sells Internet coupons for events, services, and other popular items that customers might want to buy. Customers
sign up for daily e‐mails targeted to their local market. The daily deal, offered for one‐day only and only if a predetermined
minimum number of customers buy it, gives customers 50% off the “retail” price. For example, a $100 three‐month health
club membership would sell for $50 on Groupon . The customer pays $50 to Groupon and prints a certi cate to redeem at the
health club. Groupon keeps 50% of the revenue, or $25 in this case, and gives the rest to the health club. Effectively, retail ers
are offering 75% off with the customer saving 50% and Groupon taking the rest. Groupon pays the retailer when the coupon is redeemed, making money both on the oat between the time revenue is
collected and the time the retailer is paid and on the certi cates that are never redeemed at all, which the industry calls break-
age. Retailers make money in the long run by introducing customers to their products, selling them additional products and
services when they come in to redeem their coupons, and turning them into repeat customers. And retailers bene t from the
buzz created when their business is on Groupon . In August 2010, Groupon launched its rst national deal, a coupon worth $50 of Gap apparel and accessories for $25.
It sold over 440,000 coupons, netting Groupon and the Gap close to $11 million. But not all vendors are the size of the
Gap , and smaller vendors have been overwhelmed with too many coupons. One local business owner said the company lost
$8,000 on its Groupon promotion when too many coupons were issued. In fact, a study of 150 retailers showed that only 66% found their deals pro table.
Around the time of the IPO, analysts and observers alike claimed that Groupon ’ s business model was not sustainable. In
addition to the large number of retailers who found their deals unpro table, observers noted that Groupon does not produce
anything of value, and it isn ’ t adding value to the retailers. Further, there are no barriers to entry to stop competitors. In May
2011, more than 450 competitors offering discounts and deals included LivingSocial , another daily deal site; restaurant.com,
a site for restaurant gift certi cates at a deep discount; and overstock.com and woot.com , sites offering discounted merchan-
dise, not to mention deep‐pocketed competitors like Amazon.com .
■
CASE STUDY 2‐1
Groupon
Copyright © 2016 John Wiley & Sons, Inc. 53 Case Study
Zipcar is an answer for customers who want to rent a car for a few hours in their home city rather than for a few days from
a traditional rental agency. Car reservations are for a speci c pick‐up time and location around the city, often in neighbor-
hoods so the customers need only to walk to pick up their reserved car. Customers apply for a Zipcard, which enables them
to reserve a car online and unlock their car when they arrive at its location.
The company operates with a very small staff compared to traditional rental agencies. Very little human interaction is
required between the customer and Zipcar for a transaction. A customer reserves a car online, enters into the reserved car by
waving the RFID‐enabled Zipcard against the card reader mounted behind the driver ’ s side windshield, returns the car to the same location, and is billed on the credit card already on le. The customer can check all rental records and print receipts
from the online reservation system. The system also has a color‐coded time chart showing the availability and location of all
rental cars in the vicinity. This transparent information exchange allows a customer to pick the car he or she wants, if avail-
able, or delay the reservation until that car is returned by another customer. Zipcar also created and installed a GPS‐enabled
wireless device in each car, which allows members to nd and reserve a vehicle nearby using a cell phone. Customers also
can use an iPhone or Android app on their iPhone or Android mobile device to nd and reserve a Zipcar on a 24/7 basis.
Zipcar sends text alerts near the end of the rental period, and customers can text back if they want to extend their rental ti me.
All cars were out tted with patented wireless technology. Zipcar ’ s proprietary IT platform carries information ow bet-
ween customers, vehicles, and the company. It is used to monitor car security, ful ll reservations, record hourly usage, and
maintain mileage information. The platform also relays vital technical information such as battery voltage and fuel level. It
even informs the central system if a customer forgot to turn off headlights, which can quickly drain battery power. This business model provides unique advantages over traditional car rentals. Customers do not have to stand in line or
ll out papers to rent a car. They know exactly which make and model they will be getting. Unlike most off‐airport rental
agency locations, which are open only during business hours, Zipcar locations are open 24 hours. The company ’ s rates also
include the cost of gas and insurance as well as reserved parking spots at some locations. Additionally, the company uses social networking technologies to develop an online community of Zipcar members—
Zipsters. It encourages Zipsters to talk about their Ziptrips (i.e., share their personal experiences with Zipcar ). Thus, information technology is not only the key enabler of this business model but also a facilitator in creating a
buzz and encouraging community development around the concept. Zipcar changed the rules of the rental car industry by
■
CASE STUDY 2‐2
Zipcar
But Groupon added to its business strategy with mobile capability and new services. In February 2012, it purchased
Kima Labs , a mobile payment specialist, and Hyperpublic , a company that builds databases of local information. In May
2011, in a few cities, the company launched Groupon Now, a time‐based local application that gives customers instant deals
at merchants nearby using location‐based software. CEO Andrew Mason told Wall Street analysts in February 2012 that he
saw signi cant growth potential, including working on new features that will help customers personalize offers and avoid
deals they don ’ t want.
Discussion Questions
1. How does information technology help Groupon compete?
2. Do you agree or disagree with the statement that “Groupon has no sustainable competitive advantage?” Please explain your point of view.
3. How does Groupon add value to the companies whose offers are sold on the site?
4. What impact, if any, will Groupon Now have on Groupon ’ s competitive position? Explain.
5. What would you advise Groupon leaders to consider as their next application?
6. Analyze the business model of Groupon using Porter ’ s five forces model.
Sources: Adapted from http://mashable.com/2010/08/19/gap‐groupon/ (accessed February 21, 2012); http://www.forbes.com/sites/
petercohan/2011/06/06/memo‐to‐sec‐groupon‐has‐no‐competitive‐advantage‐stop‐its‐ipo/ (accessed February 21, 2012); http://blogs .
wsj.com/venturecapital/2010/09/29/rice‐university‐study‐groupon‐renewal‐rate‐not‐so‐hot/ (accessed February 21, 2012); http://a rticles.
chicagotribune.com/2011‐05‐18/business/ct‐biz‐0519‐groupon‐now‐20110518_1_groupon‐chief‐executive‐andrew‐mason‐ rst‐phase
(accessed February 21, 2012); http://www.reuters.com/article/2012/02/09/us‐groupon‐idUSTRE81727 B20120209 (accessed February 21 ,
2012).
Copyright © 2016 John Wiley & Sons, Inc. 54 Strategic Use of Information Resources
bringing the new Web 2.0 mind‐set of focusing on automation, customer empowerment, transparency, and community.
Zipcar is very successful; as of August 2015, its Website boasts over 900,000 paying members and renting over 10,000
vehicles in 30 major metro markets in the United States, Canada, and the United Kingdom, as well as 400 college cam-
puses and 50 airports.
Discussion Questions
1. Apply the resource‐based view to Zipcar ’ s business model to show how information resources may be used to gain and sustain competitive advantage.
2. Discuss the synergy between the business strategy of Zipcar and information technology.
3. What network effects are part of Zipca r ’ s strategy? How do they add value?
4. As the CEO of Zipca r, what is your most threatening competition? What would you do to sustain a competitive advantage?
Sources: Adapted from Paul Boutin , “ A Self‐Service Rental Car ,”
Businessweek
(May 3 , 2006 ), http://www.bloomberg.com/bw/
stories/2006‐05‐03/a‐self‐service‐rental‐car (accessed August 19, 2015)
; Mary K. Pratt
, “ RFID: A Ticket to Ride ,” Computerworld
(Decem-
ber 18, 2006 ), http://www.computerworld.com/article/2554153/mobile‐wireless/r d—a‐ticket‐to‐ride.html (accessed August 19, 2015) ;
“Zipcar: Our Technology Downloaded,” http://www.zipcar.com/how/technology; Zipcar: “Zipcar Overview,” http://www.zipcar.com/
press/overview (accessed August 19, 2015).
Copyright © 2016 John Wiley & Sons, Inc. 55
3
chapter
In order for information systems (IS) to support an organization in achieving its goals, the
organization must re ect the business strategy and be coordinated with the organizational
strategy. This chapter focuses on linking and coordinating the IS strategy with the three
components of organizational strategy:
•
Organizational design (decision rights, formal reporting relationships and structure,
informal networks)
• Management control systems (planning, data collection, performance measurement,
evaluation, incentives, and rewards)
• Internal culture (values, locus of control)
Organizational Strategy
and Information Systems
After 20 years of fast growth, in 2014 Cognizant Technology Solutions was a company with $8.84
billion in revenues from providing IS outsourcing services. However, growing at such a breakneck
speed, it had to reinvent its organizational structure many times to make sure that it facilitated the ow of information. Initially, its India‐centric structure located managers of each group in India
along with software engineers. Employees at customer locations worldwide reported to the man-
agers. As the company grew and its focus shifted from simple, cost‐based solutions to complex, relationship‐based solutions, this structure had to be changed to be more customer oriented. Under
the redesigned reporting structure, managers were moved to customer locations but software engi-
neers remained in India. This change improved customer relations but brought about new headaches
on the technical side. Under the new arrangement, managers had to spend their days with cus-
tomers and unexpectedly ended up spending their nights with software engineers to clarify customer
requirements and x bugs. This created a tremendous strain on managers, who threatened to quit.
It also hampered the company ’ s business of systems development. Thus, neither of these organiza-
tional structures was working well. Neither structure was well aligned with the business strategy
and the IS strategy. However, Cognizant found that despite these problems, some work teams were working and
performing well. Upon an extensive analysis of those groups, the company decided to adopt a matrix
structure of comanagement throughout the company. In this matrix structure, each project has two managers equally responsible for the project in a location. One manager is in India and the other
is at the client site. They work out among themselves how and when to deal with issues. And both
managers are equally responsible for customer satisfaction, project deadlines, and group revenue.
The new structure (Figure 3.1 ) enables Cognizant to work more closely with its clients to focus on
improving operations. That is, the new matrix structure makes it possible to build IS that the cus-
tomers wanted. During the same time period in 2008, the largest outsourcing company and software exporter
in India, Tata Consultancy Services (TCS), also found that growth led to problems. “As we scale
up over 100,000 employees, TCS needs a structure that allows us to build a nimble organization to
Copyright © 2016 John Wiley & Sons, Inc. 56 Organizational Strategy and Information Systems
capture new growth opportunities,” said then TCS CEO and Managing Director S. Ramadorai. 1
Growth led to a
high volume of issues that needed the attention of the CEO and COO, and eventually it was difcult to keep up.
At the same time, there was a need to spend signicantly more time investigating new potential markets and new
strategic initiatives than the CEO/COO could spare. In 2011, the new TCS CEO N. Chandrasekaran modied the
structure and added a new layer of leaders to oversee the businesses and free up their time to work on strategy (see
Figure 3.2). The new layer focuses on customers and aims to boost revenue growth. 2
While both Cognizant and TCS are large Indian outsourcing companies that found they needed to reorganize
to respond to problems resulting from growth, their problems were profoundly different. Cognizant’s main prob-
lem was its lack of necessary information ows between the software engineers in India and the customer service
managers on the client location. Its complex problems resulted in a correspondingly complex matrix structure. It
focused on the delivery of information systems that reect rened technical solutions to their problems to its cus-
tomers. Its new organization structure both improves customer responsiveness and necessary information ows.
It focuses on system development and delivery and seeks to address the information ow problem that Cognizant
previously experienced in building systems. In contrast, TCS’s organization chart reects a focus not only on current customers but also on future markets.
That is why it added major units called “New Growth Markets” and “Strategic Initiative Unit.” The Business Pro-
cess Outsourcing and Small and Medium Enterprise solutions in this latter major unit indicate the strategic direc-
tions that TCS wants to take. The organizational structure is designed to emphasize these new growth areas and
facilitate information ows along these lines in the organization. Its focus is on building an ever bigger market for
its IS and the IS services that it provides.
CEO
Vertical Functions Software Engineer
Business Manager Customer 1 USA
Horizontal Functions
Business Manager Customer 2 UK
Business Manager Customer 3 China Database Manager
Telecommunication
Specialist
FIGURE 3.1 Example of possible cognizant matrix structure.
Source: Adapted from “The Issue: For Cognizant, Tw s Company,”
Businessweek (January 17, 2008), http://www.bloomberg.
com/bw/stories/2008‐01‐17/the‐issue‐for‐cognizant‐twos‐companybusinessweek‐business‐news‐stock‐market‐and‐nancial‐advice
(accessed August 20, 2015).
1 “Reinvented Blog by Prashanth Rai” (March 19, 2008), http://cio‐reinvented.typepad.com/cioreinvented/2008/03/tcs—new‐organ.html (accessed
December 19, 2011).
2 N. Shivapriya, “TCS CEO N Chandrasekaran Creates New Layer to Oversee Verticals” (May 25, 2011), http://articles.economictimes .indiatimes.
com/2011‐05‐25/news/29581999_1_tcs‐ceo‐n‐chandrasekaran‐tcs‐spokesperson‐structure (accessed December 19, 2011).
Copyright © 2016 John Wiley & Sons, Inc. 57 Organizational Strategy and Information Systems
Cognizant and TCS are both in the same business but chose different organizational structures to carry out
their objectives. The point is that different organizational structures reect different organizational strategies
that are used to implement business strategies and accomplish organizational goals. These organizational strat-
egies need to be aligned with IS strategies. When used appropriately, IS leverage human resources, capital, and
materials to create an organization that optimizes performance. Companies that design organizational strategy
without considering IS strategies run into problems like those Cognizant experienced. A synergy results from
designing organizations with IS strategy in mind—a synergy that cannot be achieved when IS strategy is just added on. Chapter 1 introduced a simple framework for understanding the role of IS in organizations. The Information
Systems Strategy Triangle relates business strategy with IS strategy and organizational strategy. In an organization
that operates successfully, an overriding business strategy drives both organizational strategy and information strat-
egy. The most effective businesses optimize the interrelationships between the organization and its IS, maximizing
efciency and productivity. Organizational strategy includes the organization’s design, as well as the managerial choices that dene, set
up, coordinate, and control its work processes. As discussed in Chapter 1, many models of organizational strategy
are available. One is the managerial levers framework that includes the complementary design variables shown
in Figure 3.3. Optimized organizational designs support optimal business processes, and they, in turn, reect the
rm’s values and culture. Organizational strategy may be considered as the coordinated set of actions that lever-
ages the use of organizational design, management control systems, and organizational culture to make the orga-
nization effective by achieving its objectives. The organizational strategy works best when it meshes well with
the IS strategy. This chapter builds on the managerial levers model. Of primary concern is how IS impact the three types of
managerial levers: organizational, control, and cultural. This chapter looks at organizational designs that incorpo-
rate IS to dene the ow of information throughout the organization, explores how IS can facilitate management
control at the organizational and individual levels, and concludes with some ideas about how culture impacts IS
and organizational performance. It focuses on organizational‐level issues related to strategy. The next two chapters
complement these concepts with a discussion of new approaches to work and organizational processes. Chief Executive
Officer
Chief Operating Officer Director,
Industry
Solutions Unit
Director,
Organization
Infrastructure
Director,
Strategic
Initiative Unit
Director,
Major
Markets
Director, New
Growth
Markets
India
APAC
Emerging Markets EuropeUK
USA
BusinessProcess
Outsourcing Solutions SME
Solutions Financial
Solutions Process
Excellence
Resource
Management Shared
Services
Technology
Excellence Multiple units
FIGURE 3.2
Tata Consultancy Services.
Source: “TCS Plans New Organizational Structure” (February 12, 2008), http://www.livemint.com/Companies/2ODg7L1mCcRlFow
K1ktX5N/TCS‐plans‐new‐organisational‐structure.html (accessed August 20, 2015).
Copyright © 2016 John Wiley & Sons, Inc. 58 Organizational Strategy and Information Systems
Information Systems and Organizational Design
Organizations must be designed in a way that enables them to perform effectively. Different designs accomplish
different goals. This section examines organizational variables. It focuses on how IS are designed in conjunction
with an organization’s structure. Ideally, an organizational structure is designed to facilitate the communication
and work processes necessary for it to accomplish the organization’s goals, and the use of IS is often the way
coordination and workow are done. The organizational structures of Cognizant and TCS, while very different,
reect and support the goals of each company. Perhaps intuitively, organizational designers at those companies used
organizational variables described in Figure 3.3 to build their structures. Those variables include decision rights
that underlie formal structures, formal reporting relationships, and informal networks. Organizational processes are another important design component discussed in more detail in Chapter 5. Decision Rights Decision rights indicate who in the organization has the responsibility to initiate, supply information for, approve,
implement, and control various types of decisions. Ideally, the individual who has the most information about a
decision and who is in the best position to understand all of the relevant issues should be the person who has its
decision rights. But this may not happen, especially in organizations in which senior leaders make most of the
important decisions. Much of the discussion of IT governance and accountability in Chapter 9 is based upon who
has the decision rights for critical IS decisions. When talking about accountability, one has to start with the person
who is responsible for the decision—that is