What is an organization? Technical, behavioral
Tech:
- Formal social structure that processes resources from environment to produce outputs
- A formal legal entity with internal rules and procedures, as well as a social structure
Behavioral:
- A collection of rights, privileges, obligations, and responsibilities that is delicately balanced over a period of time through conflict and conflict resolution
- Formal social structure that processes resources from environment to produce outputs
- A formal legal entity with internal rules and procedures, as well as a social structure
Behavioral:
- A collection of rights, privileges, obligations, and responsibilities that is delicately balanced over a period of time through conflict and conflict resolution
Disruptive Technologies
- Substitute products that perform as well as or better than existing product
- Technology that brings sweeping change to businesses, industries, markets
Ex: personal computers, word processing software, the Internet. markets
First mover - inventors of disruptive technologies
Fast followers - firms with the size and resources to capitalize on that technology
- Technology that brings sweeping change to businesses, industries, markets
Ex: personal computers, word processing software, the Internet. markets
First mover - inventors of disruptive technologies
Fast followers - firms with the size and resources to capitalize on that technology
Organizational factors in planning a new system
- Environment
- Structure (Hierarchy, specialization, routines, business processes)
- Culture and politics
- Type of organization and style of leadership
- Main interest groups affected by system; attitudes of end users
- Tasks decisions, and business processes the system will assist
- Structure (Hierarchy, specialization, routines, business processes)
- Culture and politics
- Type of organization and style of leadership
- Main interest groups affected by system; attitudes of end users
- Tasks decisions, and business processes the system will assist
Extending the Value Chain: The Value Web
- Firm´s value chain is linked to value chain of suppliers, distributors, customers
- Industry value chain
- Value Web --> Collection of independent firms using highly synchronized collectively. More customer driven, less linear operation than traditional value chain
- Industry value chain
- Value Web --> Collection of independent firms using highly synchronized collectively. More customer driven, less linear operation than traditional value chain
What Is a Computer Network?
• Two or more connected computers
• Major components in simple network
– Client and server computers
– Network interfaces (NICs)
– Connection medium
– Network operating system (NOS)
– Hubs, switches, routers
• Software-defined networking (SDN)
– Functions of switches and routers managed by central program
• Major components in simple network
– Client and server computers
– Network interfaces (NICs)
– Connection medium
– Network operating system (NOS)
– Hubs, switches, routers
• Software-defined networking (SDN)
– Functions of switches and routers managed by central program
Client/server computing
–Distributed computing model
–Clients linked through network controlled by network server computer
–Server sets rules of communication for network and provides every client with an address so others can find it on the network
–Has largely replaced centralized mainframe computing
– The Internet: largest implementation of client/server computing
–Clients linked through network controlled by network server computer
–Server sets rules of communication for network and provides every client with an address so others can find it on the network
–Has largely replaced centralized mainframe computing
– The Internet: largest implementation of client/server computing
Packet switching
– Method of slicing digital messages into parcels (packets), sending packets along different communication paths as they become available, and then reassembling packets at destination
– Previous circuit-switched networks required assembly of complete point- to-point circuit
– Packet switching more efficient use of network’s communications capacity
Practical:
Technology that breaks messages into small, fixed bundles of data and routes them in the most economical way through any available communications channel.
– Previous circuit-switched networks required assembly of complete point- to-point circuit
– Packet switching more efficient use of network’s communications capacity
Practical:
Technology that breaks messages into small, fixed bundles of data and routes them in the most economical way through any available communications channel.
TCP/IP and connectivity
– Protocols: rules that govern transmission of information between two points
– Transmission Control Protocol/Internet Protocol (TCP/IP)
• Common worldwide standard that is basis for the Internet
– Department of Defense reference model for TCP/IP
• Four layers
1. Application layer
2. Transport layer
3. Internet layer
4. Network interface layer
– Transmission Control Protocol/Internet Protocol (TCP/IP)
• Common worldwide standard that is basis for the Internet
– Department of Defense reference model for TCP/IP
• Four layers
1. Application layer
2. Transport layer
3. Internet layer
4. Network interface layer
Voice over IP (VoIP): Internet Services and Communication Tools
Digital voice communication using IP, packet
switching
The Internet has also become a popular platform for voice transmission and corporate networking. Voice over IP (VoIP) technology delivers voice information in digital form using packet switching*, avoiding the tolls charged by local and long- distance telephone networks
switching
The Internet has also become a popular platform for voice transmission and corporate networking. Voice over IP (VoIP) technology delivers voice information in digital form using packet switching*, avoiding the tolls charged by local and long- distance telephone networks
Searching for Information on the Web
• Search engines
– Google’s PageRank System
• Mobile search
• Semantic search
• Social search
• Visual search and the visual web
– Tagging – Pinterest
• Intelligent agent shopping bots
• Search engine marketing
• Search engine optimization (SEO)
– Link farms
• Search engine algorithms
– Google’s PageRank System
• Mobile search
• Semantic search
• Social search
• Visual search and the visual web
– Tagging – Pinterest
• Intelligent agent shopping bots
• Search engine marketing
• Search engine optimization (SEO)
– Link farms
• Search engine algorithms
Web 3.0 and the Future Web
• More tools to make sense of trillions of pages on the Internet
• Pervasive web
• Internet of Things (IoT aka IoD)
• Internet of People (IoP)
• App Internet
• Increased cloud computing and SaaS
• Ubiquitous mobile connectivity
• Greater seamlessness of web as a whole
• Pervasive web
• Internet of Things (IoT aka IoD)
• Internet of People (IoP)
• App Internet
• Increased cloud computing and SaaS
• Ubiquitous mobile connectivity
• Greater seamlessness of web as a whole
Wireless Sensor Networks (WSNs)
• Networks of hundreds or thousands of interconnected wireless devices
• Used to monitor building security, detect hazardous substances in air, monitor environmental changes, traffic, or military activity
• Devices have built-in processing, storage, and radio frequency sensors and antennas
• Require low-power, long-lasting batteries and ability to endure in the field without maintenance
• Major sources of “Big Data” and fueling “Internet of Things”
• Used to monitor building security, detect hazardous substances in air, monitor environmental changes, traffic, or military activity
• Devices have built-in processing, storage, and radio frequency sensors and antennas
• Require low-power, long-lasting batteries and ability to endure in the field without maintenance
• Major sources of “Big Data” and fueling “Internet of Things”
Important dimensions of knowledge
– Knowledge is a firm asset.
• Intangible
• Creation of knowledge from data, information, requires organizational resources
• As it is shared, experiences network effects
– Knowledge has different forms.
• May be explicit (documented) or tacit (residing in minds) • Know-how, craft, skill
• How to follow procedure
• Knowing why things happen (causality)
– Knowledge has a location.
• Cognitive event
• Both social and individual
• “Sticky” (hard to move), situated (enmeshed in firm’s culture), contextual (works only in certain situations)
– Knowledge is situational.
• Conditional: Knowing when to apply procedure
• Contextual: Knowing circumstances to use certain tool
• Intangible
• Creation of knowledge from data, information, requires organizational resources
• As it is shared, experiences network effects
– Knowledge has different forms.
• May be explicit (documented) or tacit (residing in minds) • Know-how, craft, skill
• How to follow procedure
• Knowing why things happen (causality)
– Knowledge has a location.
• Cognitive event
• Both social and individual
• “Sticky” (hard to move), situated (enmeshed in firm’s culture), contextual (works only in certain situations)
– Knowledge is situational.
• Conditional: Knowing when to apply procedure
• Contextual: Knowing circumstances to use certain tool
Knowledge management value chain
– Each stage adds value to raw data and information as they are transformed into usable knowledge
– Knowledge acquisition
Documenting tacit and explicit knowledge. Storing documents, reports, presentations, best practices. Unstructured documents (e.g., e-mails). Developing online expert networks. Creating knowledge. Tracking data from TPS and external sources
– Knowledge storage
Databases. Document management systems. Role of management: Support development of planned knowledge storage systems. Encourage development of corporate-wide schemas for indexing documents. Reward employees for taking time to update and store documents properly.
– Knowledge dissemination
Portals, wikis. E-mail, instant messaging. Search engines. Collaboration tools
• A deluge of information?
Training programs, informal networks, and shared management experience help managers focus attention on important information.
– Knowledge application
To provide return on investment, organizational knowledge must become systematic part of management decision making and become situated in decision-support systems ; New business practices, New products and services, New markets
– Knowledge acquisition
Documenting tacit and explicit knowledge. Storing documents, reports, presentations, best practices. Unstructured documents (e.g., e-mails). Developing online expert networks. Creating knowledge. Tracking data from TPS and external sources
– Knowledge storage
Databases. Document management systems. Role of management: Support development of planned knowledge storage systems. Encourage development of corporate-wide schemas for indexing documents. Reward employees for taking time to update and store documents properly.
– Knowledge dissemination
Portals, wikis. E-mail, instant messaging. Search engines. Collaboration tools
• A deluge of information?
Training programs, informal networks, and shared management experience help managers focus attention on important information.
– Knowledge application
To provide return on investment, organizational knowledge must become systematic part of management decision making and become situated in decision-support systems ; New business practices, New products and services, New markets
Three major types of knowledge management systems:
1. Enterprise-wide knowledge management systems
• General-purpose firm-wide efforts to collect, store, distribute, and apply digital content and knowledge
2. Knowledge work systems (KWS)
• Specialized systems built for engineers, scientists, other knowledge workers charged with discovering and creating new knowledge
3. Intelligent techniques
• Diverse group of techniques such as data mining used for various goals: discovering knowledge, distilling knowledge, discovering optimal solutions
• General-purpose firm-wide efforts to collect, store, distribute, and apply digital content and knowledge
2. Knowledge work systems (KWS)
• Specialized systems built for engineers, scientists, other knowledge workers charged with discovering and creating new knowledge
3. Intelligent techniques
• Diverse group of techniques such as data mining used for various goals: discovering knowledge, distilling knowledge, discovering optimal solutions
Enterprise content management systems
– Help capture, store, retrieve, distribute, preserve
• Documents, reports, best practices • Semistructured knowledge (e-mails)
– Bring in external sources • News feeds, research
– Tools for communication and collaboration • Blogs, wikis, and so on
– Key problem—Developing taxonomy
• Knowledge objects must be tagged with categories for retrieval
– Digital asset management systems
• Specialized content management systems for classifying, storing, managing unstructured digital data
• Photographs, graphics, video, audio
• Documents, reports, best practices • Semistructured knowledge (e-mails)
– Bring in external sources • News feeds, research
– Tools for communication and collaboration • Blogs, wikis, and so on
– Key problem—Developing taxonomy
• Knowledge objects must be tagged with categories for retrieval
– Digital asset management systems
• Specialized content management systems for classifying, storing, managing unstructured digital data
• Photographs, graphics, video, audio
Knowledge network systems
– Provide online directory of corporate experts in well-
defined knowledge domains
– Search tools enable employees to find appropriate expert in a company
– Some knowledge networking capabilities included in leading enterprise content management and collaboration products
defined knowledge domains
– Search tools enable employees to find appropriate expert in a company
– Some knowledge networking capabilities included in leading enterprise content management and collaboration products
Learning management systems (LMS)
– Provide tools for management, delivery, tracking, and assessment of various types of employee learning and training
– Support multiple modes of learning
• CD-ROM, Web-based classes, online forums, live instruction,
and so on
– Automates selection and administration of courses
– Assembles and delivers learning content
– Measures learning effectiveness
– Support multiple modes of learning
• CD-ROM, Web-based classes, online forums, live instruction,
and so on
– Automates selection and administration of courses
– Assembles and delivers learning content
– Measures learning effectiveness
Knowledge workers
– Researchers, designers, architects, scientists, engineers who
create knowledge for the organization
– Three key roles:
1. Keeping organization current in knowledge
2. Serving as internal consultants regarding their areas of expertise
3. Acting as change agents, evaluating, initiating, and promoting change projects
create knowledge for the organization
– Three key roles:
1. Keeping organization current in knowledge
2. Serving as internal consultants regarding their areas of expertise
3. Acting as change agents, evaluating, initiating, and promoting change projects
Requirements of knowledge work systems
– Sufficient computing power for graphics, complex
calculations
– Powerful graphics and analytical tools
– Communications and document management
– Access to external databases
– User-friendly interfaces
– Optimized for tasks to be performed (design engineering, financial analysis)
calculations
– Powerful graphics and analytical tools
– Communications and document management
– Access to external databases
– User-friendly interfaces
– Optimized for tasks to be performed (design engineering, financial analysis)
Examples of knowledge work systems
CAD (computer-aided design):
• Creation of engineering or architectural designs • 3-Dprinting
Virtual reality systems:
• Simulate real-life environments
• 3-D medical modeling for surgeons
• Augmentedreality(AR)systems
• VRML
Investment workstations:
• Streamline investment process and consolidate internal, external data for brokers, traders, portfolio managers
• Creation of engineering or architectural designs • 3-Dprinting
Virtual reality systems:
• Simulate real-life environments
• 3-D medical modeling for surgeons
• Augmentedreality(AR)systems
• VRML
Investment workstations:
• Streamline investment process and consolidate internal, external data for brokers, traders, portfolio managers
Intelligent techniques
Used to capture individual and collective knowledge and to extend
knowledge base:
– To capture tacit knowledge: Expert systems, case-based reasoning, fuzzy logic
– Knowledge discovery: Neural networks and data mining
– Generating solutions to complex problems: Genetic algorithms
– Automating tasks: Intelligent agents
knowledge base:
– To capture tacit knowledge: Expert systems, case-based reasoning, fuzzy logic
– Knowledge discovery: Neural networks and data mining
– Generating solutions to complex problems: Genetic algorithms
– Automating tasks: Intelligent agents
Expert systems
– Capture tacit knowledge in very specific and limited
domain of human expertise
– Capture knowledge of skilled employees as set of rules in software system that can be used by others in organization
– Typically perform limited tasks that may take a few minutes or hours, for example:
• Diagnosing malfunctioning machine
• Determining whether to grant credit for loan
– Used for discrete, highly structured decision making
domain of human expertise
– Capture knowledge of skilled employees as set of rules in software system that can be used by others in organization
– Typically perform limited tasks that may take a few minutes or hours, for example:
• Diagnosing malfunctioning machine
• Determining whether to grant credit for loan
– Used for discrete, highly structured decision making
Case-based reasoning (CBR)
– Descriptions of past experiences of human specialists (cases),
stored in knowledge base
– System searches for cases with characteristics similar to new one and applies solutions of old case to new case
– Successful and unsuccessful applications are grouped with case
– Stores organizational intelligence: Knowledge base is continuously expanded and refined by users
– CBR found in
• Medical diagnostic systems • Customer support
stored in knowledge base
– System searches for cases with characteristics similar to new one and applies solutions of old case to new case
– Successful and unsuccessful applications are grouped with case
– Stores organizational intelligence: Knowledge base is continuously expanded and refined by users
– CBR found in
• Medical diagnostic systems • Customer support
Fuzzy logic systems
– Rule-based technology that represents imprecision used in linguistic categories (e.g., “cold,” “cool”) that represent range of values
– Describe a particular phenomenon or process linguistically and then represent that description in a small number of flexible rules
– Provides solutions to problems requiring expertise that is difficult to represent with IF-THEN rules
• Autofocus in cameras
• Detecting possible medical fraud
• Sendai’s subway system acceleration controls
– Describe a particular phenomenon or process linguistically and then represent that description in a small number of flexible rules
– Provides solutions to problems requiring expertise that is difficult to represent with IF-THEN rules
• Autofocus in cameras
• Detecting possible medical fraud
• Sendai’s subway system acceleration controls
Neural networks
– Find patterns and relationships in massive amounts of
data too complicated for humans to analyze
– “Learn” patterns by searching for relationships, building models, and correcting over and over again
– Humans “train” network by feeding it data inputs for which outputs are known, to help neural network learn solution by example
– Used in medicine, science, and business for problems in pattern classification, prediction, financial analysis, and control and optimization
data too complicated for humans to analyze
– “Learn” patterns by searching for relationships, building models, and correcting over and over again
– Humans “train” network by feeding it data inputs for which outputs are known, to help neural network learn solution by example
– Used in medicine, science, and business for problems in pattern classification, prediction, financial analysis, and control and optimization
Genetic algorithms
– Useful for finding optimal solution for specific problem by examining very large number of possible solutions for that problem
– Conceptually based on process of evolution
• Search among solution variables by changing and
reorganizing component parts using processes such as inheritance, mutation, and selection
– Used in optimization problems (minimization of costs, efficient scheduling, optimal jet engine design) in which hundreds or thousands of variables exist
– Able to evaluate many solution alternatives quickly
– Conceptually based on process of evolution
• Search among solution variables by changing and
reorganizing component parts using processes such as inheritance, mutation, and selection
– Used in optimization problems (minimization of costs, efficient scheduling, optimal jet engine design) in which hundreds or thousands of variables exist
– Able to evaluate many solution alternatives quickly
Intelligent agents
Work without direct human intervention to carry out specific, repetitive, and predictable tasks for user, process, or application
– Deleting junk e-mail
• Finding cheapest airfare
Use limited built-in or learned knowledge base; Some are capable of self-adjustment, for example: Siri
Agent-based modeling applications:
• Systems of autonomous agents
• Model behavior of consumers, stock markets, and supply chains; used to predict spread of epidemics
– Deleting junk e-mail
• Finding cheapest airfare
Use limited built-in or learned knowledge base; Some are capable of self-adjustment, for example: Siri
Agent-based modeling applications:
• Systems of autonomous agents
• Model behavior of consumers, stock markets, and supply chains; used to predict spread of epidemics
The value chain
The value chain model highlights specific activities in the business where competitive strategies can best be applied and where information systems are most likely to have a strategic impact.
Primary activities are most directly related to the production and distribution of the firm’s products and services, which create value for the customer.
Support activities make the delivery of the primary activities possible.
Primary activities are most directly related to the production and distribution of the firm’s products and services, which create value for the customer.
Support activities make the delivery of the primary activities possible.
Defining IT infrastructure
An IT infrastructure consists of a set of physical devices and software applications that are required to operate the entire enterprise.
But an IT infrastructure is also a set of firmwide services budgeted by management and comprising both human and technical capabilities.
But an IT infrastructure is also a set of firmwide services budgeted by management and comprising both human and technical capabilities.
Cloud computing consists of 3 different types of services:
Cloud infrastructure as a service:
Customers use processing, storage, networking, and other computing resources from cloud service providers to run their information systems.
Cloud platform as a service:
Customers use infrastructure and programming tools supported by the cloud service provider to develop their own applications.
Cloud software as a service:
Customers use software hosted by the vendor on the vendor’s cloud infrastructure and delivered over a network.
Customers use processing, storage, networking, and other computing resources from cloud service providers to run their information systems.
Cloud platform as a service:
Customers use infrastructure and programming tools supported by the cloud service provider to develop their own applications.
Cloud software as a service:
Customers use software hosted by the vendor on the vendor’s cloud infrastructure and delivered over a network.
Private, public or hybrid clouds
Public cloud:
A cloud maintained by an external service provider (eg Amazon), accessed through the Internet, and available to the general public.
Private cloud:
A proprietary network or a data center that ties together servers, storage, networks, data, and applications as a set of virtualized services that are shared by users inside a company.
Hybrid:
Computing model where firms use both their own IT infrastructure and also public cloud computing services.
A cloud maintained by an external service provider (eg Amazon), accessed through the Internet, and available to the general public.
Private cloud:
A proprietary network or a data center that ties together servers, storage, networks, data, and applications as a set of virtualized services that are shared by users inside a company.
Hybrid:
Computing model where firms use both their own IT infrastructure and also public cloud computing services.
Capacity Planning, Scalability and Total Cost of Ownership
Capacity planning:
Companies need to determine acceptable levels of computer response time and availability for the firm’s mission-critical systems.
Scalability:
The ability of a computer, product, or system to expand to serve a large number of users without breaking down.
TCO:
Original cost of acquiring and installing hardware and software plus ongoing administration costs
Companies need to determine acceptable levels of computer response time and availability for the firm’s mission-critical systems.
Scalability:
The ability of a computer, product, or system to expand to serve a large number of users without breaking down.
TCO:
Original cost of acquiring and installing hardware and software plus ongoing administration costs
Software Vulnerability
• Commercial software contains flaws that create security vulnerabilities
–Bugs (program code defects)
–Zero defects cannot be achieved because complete testing is not possible
with large programs
–Flaws can open networks to intruders
• Patches
–Small pieces of software to repair flaws
–Exploits often created faster than patches can be released and implemented
–Bugs (program code defects)
–Zero defects cannot be achieved because complete testing is not possible
with large programs
–Flaws can open networks to intruders
• Patches
–Small pieces of software to repair flaws
–Exploits often created faster than patches can be released and implemented
What Are the Most Important Tools and Technologies for Safeguarding Information Systems?
1. Identity management software
– Automates keeping track of all users and privileges
–Authenticates users, protecting identities, controlling access •
2. Authentication
–Password systems
–Tokens
–Smart cards
–Biometric authentication
–Two-factor authentication
3. Firewall
–Combination of hardware and software that prevents unauthorized users from accessing private networks
–Technologies include:
• Packet filtering
• Stateful inspection
• Network address translation (NAT)
• Application proxy filtering
– Automates keeping track of all users and privileges
–Authenticates users, protecting identities, controlling access •
2. Authentication
–Password systems
–Tokens
–Smart cards
–Biometric authentication
–Two-factor authentication
3. Firewall
–Combination of hardware and software that prevents unauthorized users from accessing private networks
–Technologies include:
• Packet filtering
• Stateful inspection
• Network address translation (NAT)
• Application proxy filtering
Encryption
–Transforming text or data into cipher text that cannot be read by
unintended recipients
–Two methods for encryption on networks
- Two methods of encryption
1. Symmetric key encryption
• Sender and receiver use single, shared key
2. Public key encryption
• Uses two, mathematically related
keys: public key and private key
• Sender encrypts message with recipient’s public key
• Recipient decrypts with private key
- Digital certificate : Data file used to establish the identity of users and electronic assets for protection of online transactions
- Public key infrastructure (PKI): Use of public key cryptography working with
certificate authority
unintended recipients
–Two methods for encryption on networks
- Two methods of encryption
1. Symmetric key encryption
• Sender and receiver use single, shared key
2. Public key encryption
• Uses two, mathematically related
keys: public key and private key
• Sender encrypts message with recipient’s public key
• Recipient decrypts with private key
- Digital certificate : Data file used to establish the identity of users and electronic assets for protection of online transactions
- Public key infrastructure (PKI): Use of public key cryptography working with
certificate authority
Business process management (BPM), and 5 steps
Variety of tools, methodologies to analyze, design, optimize processes. Used by firms to manage business process redesign
Steps in BPM
1. Identify processes for change
2. Analyze existing processes
3. Design the new process
4. Implement the new process
5. Continuous measurement
Steps in BPM
1. Identify processes for change
2. Analyze existing processes
3. Design the new process
4. Implement the new process
5. Continuous measurement
Rapid Application Development (RAD), Joint application design (JAD), Agile Development, and DevOps
Rapid application development (RAD)
– Process of creating workable systems in a very short period of time
Joint application design (JAD)
– Used to accelerate generation of information requirements and to develop initial
systems design
Agile development
– Focuses on rapid delivery of working software by breaking large project into several
small subprojects
DevOps
– Builds on Agile development principles as an organizational strategy
– Process of creating workable systems in a very short period of time
Joint application design (JAD)
– Used to accelerate generation of information requirements and to develop initial
systems design
Agile development
– Focuses on rapid delivery of working software by breaking large project into several
small subprojects
DevOps
– Builds on Agile development principles as an organizational strategy
Mobile Application Development
• Mobile websites
• Mobile web apps
• Native apps
• Special requirements for mobile platform
–Smaller screens, keyboards, multitouch gestures, saving resources (memory, processing)
• Responsive web design
–Websites programmed so that layouts change automatically according to user’s computing device
• Mobile web apps
• Native apps
• Special requirements for mobile platform
–Smaller screens, keyboards, multitouch gestures, saving resources (memory, processing)
• Responsive web design
–Websites programmed so that layouts change automatically according to user’s computing device
Why E-commerce Is Different
1. Ubiquity
– Marketspace is virtual
– Transaction costs reduced • Global reach
– Transactions cross cultural and national boundaries
2. Universal standards
– One set of technology standards: Internet
standards
3. Richness
– Supports video, audio, and text messages
4. Interactivity
5. Information density
– Greater price and cost transparency – Enables price discrimination
6. Personalization/customization
– Technology permits modification of messages,
goods
7. Social technology
– Promotes user content generation and social networking
– Marketspace is virtual
– Transaction costs reduced • Global reach
– Transactions cross cultural and national boundaries
2. Universal standards
– One set of technology standards: Internet
standards
3. Richness
– Supports video, audio, and text messages
4. Interactivity
5. Information density
– Greater price and cost transparency – Enables price discrimination
6. Personalization/customization
– Technology permits modification of messages,
goods
7. Social technology
– Promotes user content generation and social networking
Digital Goods
• Goods that can be delivered over a digital network • Cost of producing first unit is almost entire cost of
product
• Costs of delivery over the Internet very low
• Marketing costs remain the same; pricing highly variable
• Industries with digital goods are undergoing revolutionary changes (publishers, record labels, etc.)
product
• Costs of delivery over the Internet very low
• Marketing costs remain the same; pricing highly variable
• Industries with digital goods are undergoing revolutionary changes (publishers, record labels, etc.)
New Ways of B2B Buying and Selling
1. Private industrial networks
– Private exchanges
– Large firm using a secure website to link to suppliers and partners
2. Net marketplaces (e-hubs)
– Single digital marketplace for many buyers
and sellers
– May focus on direct or indirect goods
– May be vertical or horizontal marketplaces
3. Exchanges
– Independently owned third-party Net marketplaces for spot purchasing
– Private exchanges
– Large firm using a secure website to link to suppliers and partners
2. Net marketplaces (e-hubs)
– Single digital marketplace for many buyers
and sellers
– May focus on direct or indirect goods
– May be vertical or horizontal marketplaces
3. Exchanges
– Independently owned third-party Net marketplaces for spot purchasing
Flashcard set info:
Author: CoboCards-User
Main topic: Jölgalen 2
Topic: Jölgalen 2
Published: 29.11.2018
Card tags:
All cards (80)
no tags