SlideShare a Scribd company logo
1 of 18
Download to read offline
1
1
Using Information
Technology for Competitive
Advantage
Lecture 4
Abdisalam Issa-Salwe
Business Information Systems
MSc Finance and Legal Management
Thames Valley University
Abdisalam Issa-Salwe, Thames Valley University
2
Topic list
 Porter’s five forces model
 Value chain
 EDI
 Data warehousing
 Data mining
 Intelligent agents
 Value added networks
2
Abdisalam Issa-Salwe, Thames Valley University
3
Abdisalam Issa-Salwe, Thames Valley University
4
Porter’s five forces model
 All organisations operate in one or
more industries. By the nature of
their participation in an industry,
they are affected by existing or
potential uses of information
technology
3
Abdisalam Issa-Salwe, Thames Valley University
5
Porter’s five forces model
 Professor Michael Porter of Harvard
University maintained that in every
industry, competition depends on
the collective strength of five basic
forces
 Interacting with these forces are the
generic corporate strategies (see
below).
 IT can be a powerful agent to
change the balance of power in and
between these forces.
Abdisalam Issa-Salwe, Thames Valley University
6
Porter’s five forces model (cont…)
 New entrants can increase overall capacity
in the industry, thereby reducing prices and
incumbents' cost advantages.
 IT can help create or raise barriers to entry
by increasing mandatory investments in
hardware and software, facilitating control
over databases, or locking in customers to
existing distribution channels.
 There are many types of barriers to entry:
switching costs, economies of scale, high
investment in IT, economies of experience,
access to distribution channels, and
government policy
4
Abdisalam Issa-Salwe, Thames Valley University
7
Porter’s five forces model (cont…)
 Intensity of industry rivalry depends
on factors beyond the control of the
individual firm,
 such as degree of concentration,
diversity, or dependency; rate of industry
growth; or switching costs.
 It is critical to understand the strategies
of one's rivals in detail.
 For instance, Ford's strategy depends on
the strategies of Toyota, Nissan, GM, and
Volkswagen, and vice versa.
Abdisalam Issa-Salwe, Thames Valley University
8
Porter’s five forces model (cont…)
 Threat of substitute products may arise
from products and services in other
industries.
 Examples:
 * the products of stock brokers and insurance
companies now compete against banks for the
investment dollar.
 * the automobile eliminated the horse with buggy,
and the silicon chip eliminated electromechanical
adding machines. The life cycle of products can
be reduced through the use of IT, such as
Computer-Aided Design (CAD). IT has also
provided the basis for creating new information-
intensive products.
5
Abdisalam Issa-Salwe, Thames Valley University
9
Porter’s five forces model (cont…)
 Bargaining power of buyers
 Buyers drives prices down and the quality of
products up.
 Buyer power depends on the level of
switching costs, the competitive position of
the buyer in the industry (size, volume),
whether the buyer can purchase a
commodity product, or whether the buyer
poses a serious threat of backward
integration (i.e., buying out or merging with
its suppliers).
 Installing computer terminals at the buyers'
site is one way to raise the buyers' cost of
switching to other suppliers.
Abdisalam Issa-Salwe, Thames Valley University
10
Porter’s five forces model (cont…)
 Bargaining power of suppliers
 It is in some ways the antithesis of buyer
power.
 The threat of forward integration (i.e.,
buying out or merging with its customers)
is one determinant of supplier power.
 Influential suppliers drive prices up and
reduce the quality and quantity of
products and services.
 Supplier power also depends on size,
volume, and concentration relative to
other firms in the industry.
6
Abdisalam Issa-Salwe, Thames Valley University
11
Abdisalam Issa-Salwe, Thames Valley University
12
7
Abdisalam Issa-Salwe, Thames Valley University
13
Abdisalam Issa-Salwe, Thames Valley University
14
Value Chain Analysis
 The value chain is a systematic approach
to examining the development of
competitive advantage. It was created by
M. E. Porter in his book, Competitive
Advantage (1980). The chain consists of a
series of activities that create and build
value. They culminate in the total value
delivered by an organisation. The 'margin'
depicted in the diagram is the same as
added value. The organisation is split into
'primary activities' and 'support activities
8
Abdisalam Issa-Salwe, Thames Valley University
15
Value Chain Analysis (cont…)
 The value chain begins with the data
resource.
 Information is developed from the data
resource to support the knowledge
environment of an intelligent learning
organisation.
 Data is the raw material for information
which is the raw material for the
knowledge environment.
 Knowledge is the raw material for
business intelligence that supports
business strategies.
Abdisalam Issa-Salwe, Thames Valley University
16
Value Chain Analysis (cont…)
 Data is the individual raw facts that are
out of context, have no meaning and are
difficult to understand. Facts are
numbers, characters, character strings,
text, images, voice, video and any other
form in which a fact may be presented.
Data in context is facts that have
meaning and can be readily understood.
It is the raw facts in context with meaning
and understanding, but is not yet
information because it has no relevance
or time frame.
9
Abdisalam Issa-Salwe, Thames Valley University
17
Electronic Data Interchange (EDI)
 EDI was first developed by the
automobile/transportation industry in the
1970s.
 Today, it is widely used in a variety of
industries, including distribution, finance
and accounting, health care,
manufacturing, purchasing, retail, tax
form filing, and shipping.
 Early EDI packages used rather simple
standard forms that forced companies to
convert data to fit the forms.
 Newer EDI systems allow companies to
create custom systems using simple
programming or authoring tools.
Abdisalam Issa-Salwe, Thames Valley University
18
Electronic Data Interchange (EDI) (cont…)
 Electronic Data Interchange is the electronic exchange
of routine business transactions.
 Typical transactions include such documents as
purchase orders, invoices, advance shipping
notification, payments, etc.
 Exchange of electronic data using inter-organisational
information systems
 Set of hardware, software, and standards that
accommodate the EDI process
 EDI defines the electronic exchange of structured
business data, such as purchase orders, invoices, and
shipping notices, typically between one organisation
and another.
 The relationship is usually between a vendor and
customer.
10
Abdisalam Issa-Salwe, Thames Valley University
19
Electronic Data Interchange (EDI) (cont…)
 It is important to differentiate between EDI
and electronic commerce.
 Electronic commerce encompasses all aspects of
electronic business exchanges, including person-to-
person interaction (collaboration), money transfers,
data sharing and exchange, Web site merchant
systems, and so on.
 EDI as a subset of electronic commerce that
encompasses the exchange of business information
in a standardised electronic form.
Abdisalam Issa-Salwe, Thames Valley University
20
Electronic Data Interchange (EDI) (cont…)
 EDI can reduce costs, workforce
requirements, and errors associated
with retyping orders, invoices, and
other documents.
 With EDI, computer data already
entered by one organisation is
made available to a business
partner.
 EDI is typically handled using store-
and-forward technologies similar to
e-mail.
11
Abdisalam Issa-Salwe, Thames Valley University
21
Electronic Data Interchange (EDI) (cont…)
 Two approaches in the
implementation of EDI.
 Many large organisations acquire or build
their own proprietary systems, often in
association with their business partners.
 To work with a VAN (value added
network) provider, which provides EDI
transaction services, security, document
interchange assistance, standard message
formats, communication protocols, and
communication parameters for EDI. Most
VANs also provide a network on which to
transmit information.
Abdisalam Issa-Salwe, Thames Valley University
22
12
Abdisalam Issa-Salwe, Thames Valley University
23
Value Added Network (VAN)
 A (VAN) Value Added Network is a
third party who stores the data to
be communicated. It serves as a
middle person, so neither party can
access the other’s private network.
The main key to a VAN is that the
other partner does not touch your
network, as business partners
initiate the sending or retrieving of
the data from the VAN.
Abdisalam Issa-Salwe, Thames Valley University
24
Value Added Network (VAN) (cont…)
 With the data being sent to or
received from the VAN by the
business partners initiating the
communication, business partners
are insuring a safe method of data
transportation.
 The different ways of
communicating to the VAN include
dialup as well as FTP protocols.
13
Abdisalam Issa-Salwe, Thames Valley University
25
Business Intelligent
 Business intelligence represent a popular
trend in many public and private sector
organisations.
 Ideally, any manager or knowledge
worker should be able to compose
information requests without programmer
assistance and achieve answers at the
speed of thought.
 Follow-up questions should be
immediately asked and answered in order
to maintain continuity of thought on a
particular topic of importance.
Abdisalam Issa-Salwe, Thames Valley University
26
14
Abdisalam Issa-Salwe, Thames Valley University
27
Data warehouse, data marts
 Data warehouses are computer based information
systems that are home for "secondhand" data
that originated from either another application or
from an external system or source.
 Warehouses optimize database query and
reporting tools because of their ability to analyse
data, often from disparate databases and in
interesting ways.
 They are a way for managers and decision
makers to extract information quickly and easily
in order to answer questions about their business.
 In other words, data warehouses are read-only,
integrated databases designed to answer
comparative and "what if" questions.
Abdisalam Issa-Salwe, Thames Valley University
28
Data warehouse, data marts (cont…)
 Data Marts:
 Data in a data warehouse should be
reasonably current, but not necessarily up to
the minute, although developments in the
data warehouse industry have made frequent
and incremental data dumps more feasible.
 Data marts are smaller than data warehouses
and generally contain information from a
single department of a business or
organisation. The current trend in data
warehousing is to develop a data warehouse
with several smaller related data marts for
specific kinds of queries and reports.
15
Abdisalam Issa-Salwe, Thames Valley University
29
A Data Warehouse Architecture
Abdisalam Issa-Salwe, Thames Valley University
30
Data mining
 Data mining is primarily used today by
companies with a strong consumer focus -
retail, financial, communication, and
marketing organisations.
 It enables these companies to determine
relationships among "internal" factors
such as price, product positioning, or staff
skills, and "external" factors such as
economic indicators, competition, and
customer demographics.
16
Abdisalam Issa-Salwe, Thames Valley University
31
Data mining
 Data mining, or knowledge discovery, is the
computer-assisted process of digging through and
analysing enormous sets of data and then
extracting the meaning of the data.
 Data mining tools predict behaviors and future
trends, allowing businesses to make proactive,
knowledge-driven decisions.
 Data mining tools can answer business questions
that traditionally were too time consuming to
resolve.
 They scour databases for hidden patterns, finding
predictive information that experts may miss
because it lies outside their expectations.
Abdisalam Issa-Salwe, Thames Valley University
32
Data mining (cont…)
 With data mining, a retailer could
use point-of-sale records of
customer purchases to send
targeted promotions based on an
individual's purchase history.
 By mining demographic data from
comment or warranty cards, the
retailer could develop products and
promotions to appeal to specific
customer segments
17
Abdisalam Issa-Salwe, Thames Valley University
33
Data mining (cont…)
 Data mining consists of five major
elements:
 Extract, transform, and load transaction
data onto the data warehouse system.
 Store and manage the data in a
multidimensional database system.
 Provide data access to business analysts
and information technology professionals.
 Analyse the data by application software.
 Present the data in a useful format, such
as a graph or table.
Abdisalam Issa-Salwe, Thames Valley University
34
18
Abdisalam Issa-Salwe, Thames Valley University
35
Tutorial Question
Michael Porter described a
concept that has become
known as the "five forces
model". This concept involves
a relationship between
competitors within an
industry, potential
competitors, suppliers,
buyers and alternative
solutions to the problem
being addressed.
Could you critical discus
Porter’s five force
model?

More Related Content

What's hot

Our presentation on Management Information System
Our presentation on Management Information SystemOur presentation on Management Information System
Our presentation on Management Information SystemRudrika
 
Management Information System (MIS)
Management Information System (MIS)Management Information System (MIS)
Management Information System (MIS)Navneet Jingar
 
MIS-CH11: Managing Knowledge
MIS-CH11: Managing KnowledgeMIS-CH11: Managing Knowledge
MIS-CH11: Managing KnowledgeSukanya Ben
 
Information Technology in Supply Chain Management
Information Technology in Supply Chain ManagementInformation Technology in Supply Chain Management
Information Technology in Supply Chain ManagementMd Adnan
 
Knowledge Management
Knowledge ManagementKnowledge Management
Knowledge ManagementYaw Chooi Fun
 
Knowledge Management Lecture 1: definition, history and presence
Knowledge Management Lecture 1: definition, history and presenceKnowledge Management Lecture 1: definition, history and presence
Knowledge Management Lecture 1: definition, history and presenceStefan Urbanek
 
Knowledge Management
Knowledge ManagementKnowledge Management
Knowledge ManagementSagar PATEL
 
Chapter 2 competing with it
Chapter 2 competing with itChapter 2 competing with it
Chapter 2 competing with itAG RD
 
Laudon mis12 ppt03
Laudon mis12 ppt03Laudon mis12 ppt03
Laudon mis12 ppt03Faisal14H
 
Achieving competitive advantage with information systems
Achieving competitive advantage with information systemsAchieving competitive advantage with information systems
Achieving competitive advantage with information systemsProf. Othman Alsalloum
 
Knowledge management system
Knowledge management systemKnowledge management system
Knowledge management systemJerrin Mary John
 
Sustainable Supply Chain Managment Presentation
Sustainable Supply Chain Managment PresentationSustainable Supply Chain Managment Presentation
Sustainable Supply Chain Managment PresentationTaiga Company
 
MIS-CH6: Foundation of BUsiness Intelligence: Databases & IS
MIS-CH6: Foundation of BUsiness Intelligence: Databases & ISMIS-CH6: Foundation of BUsiness Intelligence: Databases & IS
MIS-CH6: Foundation of BUsiness Intelligence: Databases & ISSukanya Ben
 

What's hot (20)

Our presentation on Management Information System
Our presentation on Management Information SystemOur presentation on Management Information System
Our presentation on Management Information System
 
Management Information System (MIS)
Management Information System (MIS)Management Information System (MIS)
Management Information System (MIS)
 
Management information system
Management information systemManagement information system
Management information system
 
MIS-CH11: Managing Knowledge
MIS-CH11: Managing KnowledgeMIS-CH11: Managing Knowledge
MIS-CH11: Managing Knowledge
 
Chapter 2 MIS
Chapter 2 MISChapter 2 MIS
Chapter 2 MIS
 
Information Technology in Supply Chain Management
Information Technology in Supply Chain ManagementInformation Technology in Supply Chain Management
Information Technology in Supply Chain Management
 
Knowledge Management
Knowledge ManagementKnowledge Management
Knowledge Management
 
Knowledge Management Lecture 1: definition, history and presence
Knowledge Management Lecture 1: definition, history and presenceKnowledge Management Lecture 1: definition, history and presence
Knowledge Management Lecture 1: definition, history and presence
 
Knowledge management
Knowledge management Knowledge management
Knowledge management
 
Laudon mis14 ch02
Laudon mis14 ch02Laudon mis14 ch02
Laudon mis14 ch02
 
MIS Chapter 2
MIS Chapter 2MIS Chapter 2
MIS Chapter 2
 
Knowledge Management
Knowledge ManagementKnowledge Management
Knowledge Management
 
Chapter 3 MIS
Chapter 3 MISChapter 3 MIS
Chapter 3 MIS
 
Chapter 2 competing with it
Chapter 2 competing with itChapter 2 competing with it
Chapter 2 competing with it
 
Laudon mis12 ppt03
Laudon mis12 ppt03Laudon mis12 ppt03
Laudon mis12 ppt03
 
Achieving competitive advantage with information systems
Achieving competitive advantage with information systemsAchieving competitive advantage with information systems
Achieving competitive advantage with information systems
 
Sustainability and the Supply Chain
Sustainability and the Supply ChainSustainability and the Supply Chain
Sustainability and the Supply Chain
 
Knowledge management system
Knowledge management systemKnowledge management system
Knowledge management system
 
Sustainable Supply Chain Managment Presentation
Sustainable Supply Chain Managment PresentationSustainable Supply Chain Managment Presentation
Sustainable Supply Chain Managment Presentation
 
MIS-CH6: Foundation of BUsiness Intelligence: Databases & IS
MIS-CH6: Foundation of BUsiness Intelligence: Databases & ISMIS-CH6: Foundation of BUsiness Intelligence: Databases & IS
MIS-CH6: Foundation of BUsiness Intelligence: Databases & IS
 

Viewers also liked

Ppt competitive advantage
Ppt competitive advantagePpt competitive advantage
Ppt competitive advantagezhouguoqing
 
Case study of Competitive advantage at Dell Inc
Case study of  Competitive advantage at Dell IncCase study of  Competitive advantage at Dell Inc
Case study of Competitive advantage at Dell IncMehvish Rehman
 
Individual behavior
Individual behaviorIndividual behavior
Individual behaviorroyneelima
 
Big 5 Model ppt
Big 5 Model pptBig 5 Model ppt
Big 5 Model pptSankuD
 
workforce diversity
workforce diversityworkforce diversity
workforce diversitykumudu737sjp
 
Diversity in the workplace
Diversity in the workplaceDiversity in the workplace
Diversity in the workplaceaet0719
 
Stable environment/Dynamic environment
Stable environment/Dynamic environmentStable environment/Dynamic environment
Stable environment/Dynamic environmentVJIMPGDM
 
Amazon.com Strategic Analysis
Amazon.com Strategic AnalysisAmazon.com Strategic Analysis
Amazon.com Strategic AnalysisMax Jallifier
 
OB - INDIVIDUAL BEHAVIOUR
OB - INDIVIDUAL BEHAVIOUROB - INDIVIDUAL BEHAVIOUR
OB - INDIVIDUAL BEHAVIOURsandhyaanil
 

Viewers also liked (11)

Ppt competitive advantage
Ppt competitive advantagePpt competitive advantage
Ppt competitive advantage
 
Case study of Competitive advantage at Dell Inc
Case study of  Competitive advantage at Dell IncCase study of  Competitive advantage at Dell Inc
Case study of Competitive advantage at Dell Inc
 
Individual behavior
Individual behaviorIndividual behavior
Individual behavior
 
Individual differences
Individual differencesIndividual differences
Individual differences
 
Big 5 Model ppt
Big 5 Model pptBig 5 Model ppt
Big 5 Model ppt
 
workforce diversity
workforce diversityworkforce diversity
workforce diversity
 
Diversity in the workplace
Diversity in the workplaceDiversity in the workplace
Diversity in the workplace
 
Stable environment/Dynamic environment
Stable environment/Dynamic environmentStable environment/Dynamic environment
Stable environment/Dynamic environment
 
Amazon.com Strategic Analysis
Amazon.com Strategic AnalysisAmazon.com Strategic Analysis
Amazon.com Strategic Analysis
 
Dell Case Study
Dell Case StudyDell Case Study
Dell Case Study
 
OB - INDIVIDUAL BEHAVIOUR
OB - INDIVIDUAL BEHAVIOUROB - INDIVIDUAL BEHAVIOUR
OB - INDIVIDUAL BEHAVIOUR
 

Similar to Lecture 4(Using Information Technology for Competitive Advantage)

BizDay: Marco Polo: Making Trade Finance Smarter, More Transparent & Better C...
BizDay: Marco Polo: Making Trade Finance Smarter, More Transparent & Better C...BizDay: Marco Polo: Making Trade Finance Smarter, More Transparent & Better C...
BizDay: Marco Polo: Making Trade Finance Smarter, More Transparent & Better C...R3
 
SIM - Mc leod ch03
SIM - Mc leod ch03SIM - Mc leod ch03
SIM - Mc leod ch03Welly Tjoe
 
Addressing Storage Challenges to Support Business Analytics and Big Data Work...
Addressing Storage Challenges to Support Business Analytics and Big Data Work...Addressing Storage Challenges to Support Business Analytics and Big Data Work...
Addressing Storage Challenges to Support Business Analytics and Big Data Work...IBM India Smarter Computing
 
Modmeters Case Study
Modmeters Case StudyModmeters Case Study
Modmeters Case StudyKate Loge
 
How banks reinvent themselves through enterprise systems
How banks reinvent themselves through enterprise systemsHow banks reinvent themselves through enterprise systems
How banks reinvent themselves through enterprise systemsProf. Dr. Alexander Maedche
 
Using Information Technology to Engage in Electronic Commerce
Using Information Technology to Engage in Electronic CommerceUsing Information Technology to Engage in Electronic Commerce
Using Information Technology to Engage in Electronic CommerceElla Mae Ayen
 
Electronic Commerce
Electronic CommerceElectronic Commerce
Electronic Commerceellamee27
 
Virtual Data Room Industry Growth Statistics and Trends.pdf
Virtual Data Room Industry Growth Statistics and Trends.pdfVirtual Data Room Industry Growth Statistics and Trends.pdf
Virtual Data Room Industry Growth Statistics and Trends.pdfHokme
 

Similar to Lecture 4(Using Information Technology for Competitive Advantage) (20)

Lecture 7 (business-level strategy and the value chain model)
Lecture 7  (business-level strategy and the value chain model)Lecture 7  (business-level strategy and the value chain model)
Lecture 7 (business-level strategy and the value chain model)
 
Mc leod ch03
Mc leod ch03Mc leod ch03
Mc leod ch03
 
2008 4
2008 42008 4
2008 4
 
IDC Rethinking the datacenter
IDC Rethinking the datacenterIDC Rethinking the datacenter
IDC Rethinking the datacenter
 
Essay It
Essay ItEssay It
Essay It
 
5-Unit (CAB).pdf
5-Unit (CAB).pdf5-Unit (CAB).pdf
5-Unit (CAB).pdf
 
BizDay: Marco Polo: Making Trade Finance Smarter, More Transparent & Better C...
BizDay: Marco Polo: Making Trade Finance Smarter, More Transparent & Better C...BizDay: Marco Polo: Making Trade Finance Smarter, More Transparent & Better C...
BizDay: Marco Polo: Making Trade Finance Smarter, More Transparent & Better C...
 
SIM - Mc leod ch03
SIM - Mc leod ch03SIM - Mc leod ch03
SIM - Mc leod ch03
 
Addressing Storage Challenges to Support Business Analytics and Big Data Work...
Addressing Storage Challenges to Support Business Analytics and Big Data Work...Addressing Storage Challenges to Support Business Analytics and Big Data Work...
Addressing Storage Challenges to Support Business Analytics and Big Data Work...
 
Ash cis 500 preview full class
Ash cis 500 preview full classAsh cis 500 preview full class
Ash cis 500 preview full class
 
Modmeters Case Study
Modmeters Case StudyModmeters Case Study
Modmeters Case Study
 
IBM: Redefining Enterprise Systems
IBM: Redefining Enterprise SystemsIBM: Redefining Enterprise Systems
IBM: Redefining Enterprise Systems
 
IBM: Redefining Enterprise Systems
IBM: Redefining Enterprise SystemsIBM: Redefining Enterprise Systems
IBM: Redefining Enterprise Systems
 
Lecture 4 (using information technology for competitive advantage)
Lecture 4 (using information technology for competitive advantage)Lecture 4 (using information technology for competitive advantage)
Lecture 4 (using information technology for competitive advantage)
 
MIS.ppt
MIS.pptMIS.ppt
MIS.ppt
 
How banks reinvent themselves through enterprise systems
How banks reinvent themselves through enterprise systemsHow banks reinvent themselves through enterprise systems
How banks reinvent themselves through enterprise systems
 
Using Information Technology to Engage in Electronic Commerce
Using Information Technology to Engage in Electronic CommerceUsing Information Technology to Engage in Electronic Commerce
Using Information Technology to Engage in Electronic Commerce
 
Electronic Commerce
Electronic CommerceElectronic Commerce
Electronic Commerce
 
Virtual Data Room Industry Growth Statistics and Trends.pdf
Virtual Data Room Industry Growth Statistics and Trends.pdfVirtual Data Room Industry Growth Statistics and Trends.pdf
Virtual Data Room Industry Growth Statistics and Trends.pdf
 
Tft2 Task3 Essay
Tft2 Task3 EssayTft2 Task3 Essay
Tft2 Task3 Essay
 

More from Taibah University, College of Computer Science & Engineering

More from Taibah University, College of Computer Science & Engineering (20)

Lecture 1- Computer Organization and Architecture.pdf
Lecture 1- Computer Organization and Architecture.pdfLecture 1- Computer Organization and Architecture.pdf
Lecture 1- Computer Organization and Architecture.pdf
 
The paper the welfare state of the somali nation - a possible solution to t...
The paper   the welfare state of the somali nation - a possible solution to t...The paper   the welfare state of the somali nation - a possible solution to t...
The paper the welfare state of the somali nation - a possible solution to t...
 
Colonial intrusion and_the_somali_resistance
Colonial intrusion and_the_somali_resistanceColonial intrusion and_the_somali_resistance
Colonial intrusion and_the_somali_resistance
 
Lecture 3 (Contemporary approaches to Information Systems)
Lecture 3 (Contemporary approaches to Information Systems)Lecture 3 (Contemporary approaches to Information Systems)
Lecture 3 (Contemporary approaches to Information Systems)
 
Lecture 2 (major types of information systems in organizations)
Lecture 2 (major types of information systems in organizations)Lecture 2 (major types of information systems in organizations)
Lecture 2 (major types of information systems in organizations)
 
Practical session 1 (critical path analaysis)
Practical session 1 (critical path analaysis)Practical session 1 (critical path analaysis)
Practical session 1 (critical path analaysis)
 
Chapter 2 modeling the process and life-cycle
Chapter 2  modeling the process and life-cycleChapter 2  modeling the process and life-cycle
Chapter 2 modeling the process and life-cycle
 
Historical Perspective on the Challenge Facing the Somali Sacral Unity
Historical Perspective on the Challenge Facing the Somali Sacral UnityHistorical Perspective on the Challenge Facing the Somali Sacral Unity
Historical Perspective on the Challenge Facing the Somali Sacral Unity
 
Colonial intrusion and the Somali Resistance
Colonial intrusion and the Somali ResistanceColonial intrusion and the Somali Resistance
Colonial intrusion and the Somali Resistance
 
Lecture 8 (information systems and strategy planning)
Lecture 8  (information systems and strategy planning)Lecture 8  (information systems and strategy planning)
Lecture 8 (information systems and strategy planning)
 
Lecture1 data structure(introduction)
Lecture1 data structure(introduction)Lecture1 data structure(introduction)
Lecture1 data structure(introduction)
 
Lecture2 is331 data&infomanag(databaseenv)
Lecture2 is331 data&infomanag(databaseenv)Lecture2 is331 data&infomanag(databaseenv)
Lecture2 is331 data&infomanag(databaseenv)
 
Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)
 
Lecture6 is353(ea&data viewpoint )
Lecture6 is353(ea&data viewpoint )Lecture6 is353(ea&data viewpoint )
Lecture6 is353(ea&data viewpoint )
 
Lecture4 is353-ea(fea)
Lecture4 is353-ea(fea)Lecture4 is353-ea(fea)
Lecture4 is353-ea(fea)
 
Lecture3 is353-ea(togaf)
Lecture3 is353-ea(togaf)Lecture3 is353-ea(togaf)
Lecture3 is353-ea(togaf)
 
Lecture2 is353-ea(the zachma framework)
Lecture2 is353-ea(the zachma framework)Lecture2 is353-ea(the zachma framework)
Lecture2 is353-ea(the zachma framework)
 
Lecture1 is353-enterprise architectureconcept)
Lecture1 is353-enterprise architectureconcept)Lecture1 is353-enterprise architectureconcept)
Lecture1 is353-enterprise architectureconcept)
 
Lecture1 is313-(is-innovation&tech)
Lecture1 is313-(is-innovation&tech)Lecture1 is313-(is-innovation&tech)
Lecture1 is313-(is-innovation&tech)
 
Lab 1 (cs351) (computer tech & c++)
Lab 1 (cs351) (computer tech & c++)Lab 1 (cs351) (computer tech & c++)
Lab 1 (cs351) (computer tech & c++)
 

Recently uploaded

4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinojohnmickonozaleda
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 

Recently uploaded (20)

4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipino
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 

Lecture 4(Using Information Technology for Competitive Advantage)

  • 1. 1 1 Using Information Technology for Competitive Advantage Lecture 4 Abdisalam Issa-Salwe Business Information Systems MSc Finance and Legal Management Thames Valley University Abdisalam Issa-Salwe, Thames Valley University 2 Topic list  Porter’s five forces model  Value chain  EDI  Data warehousing  Data mining  Intelligent agents  Value added networks
  • 2. 2 Abdisalam Issa-Salwe, Thames Valley University 3 Abdisalam Issa-Salwe, Thames Valley University 4 Porter’s five forces model  All organisations operate in one or more industries. By the nature of their participation in an industry, they are affected by existing or potential uses of information technology
  • 3. 3 Abdisalam Issa-Salwe, Thames Valley University 5 Porter’s five forces model  Professor Michael Porter of Harvard University maintained that in every industry, competition depends on the collective strength of five basic forces  Interacting with these forces are the generic corporate strategies (see below).  IT can be a powerful agent to change the balance of power in and between these forces. Abdisalam Issa-Salwe, Thames Valley University 6 Porter’s five forces model (cont…)  New entrants can increase overall capacity in the industry, thereby reducing prices and incumbents' cost advantages.  IT can help create or raise barriers to entry by increasing mandatory investments in hardware and software, facilitating control over databases, or locking in customers to existing distribution channels.  There are many types of barriers to entry: switching costs, economies of scale, high investment in IT, economies of experience, access to distribution channels, and government policy
  • 4. 4 Abdisalam Issa-Salwe, Thames Valley University 7 Porter’s five forces model (cont…)  Intensity of industry rivalry depends on factors beyond the control of the individual firm,  such as degree of concentration, diversity, or dependency; rate of industry growth; or switching costs.  It is critical to understand the strategies of one's rivals in detail.  For instance, Ford's strategy depends on the strategies of Toyota, Nissan, GM, and Volkswagen, and vice versa. Abdisalam Issa-Salwe, Thames Valley University 8 Porter’s five forces model (cont…)  Threat of substitute products may arise from products and services in other industries.  Examples:  * the products of stock brokers and insurance companies now compete against banks for the investment dollar.  * the automobile eliminated the horse with buggy, and the silicon chip eliminated electromechanical adding machines. The life cycle of products can be reduced through the use of IT, such as Computer-Aided Design (CAD). IT has also provided the basis for creating new information- intensive products.
  • 5. 5 Abdisalam Issa-Salwe, Thames Valley University 9 Porter’s five forces model (cont…)  Bargaining power of buyers  Buyers drives prices down and the quality of products up.  Buyer power depends on the level of switching costs, the competitive position of the buyer in the industry (size, volume), whether the buyer can purchase a commodity product, or whether the buyer poses a serious threat of backward integration (i.e., buying out or merging with its suppliers).  Installing computer terminals at the buyers' site is one way to raise the buyers' cost of switching to other suppliers. Abdisalam Issa-Salwe, Thames Valley University 10 Porter’s five forces model (cont…)  Bargaining power of suppliers  It is in some ways the antithesis of buyer power.  The threat of forward integration (i.e., buying out or merging with its customers) is one determinant of supplier power.  Influential suppliers drive prices up and reduce the quality and quantity of products and services.  Supplier power also depends on size, volume, and concentration relative to other firms in the industry.
  • 6. 6 Abdisalam Issa-Salwe, Thames Valley University 11 Abdisalam Issa-Salwe, Thames Valley University 12
  • 7. 7 Abdisalam Issa-Salwe, Thames Valley University 13 Abdisalam Issa-Salwe, Thames Valley University 14 Value Chain Analysis  The value chain is a systematic approach to examining the development of competitive advantage. It was created by M. E. Porter in his book, Competitive Advantage (1980). The chain consists of a series of activities that create and build value. They culminate in the total value delivered by an organisation. The 'margin' depicted in the diagram is the same as added value. The organisation is split into 'primary activities' and 'support activities
  • 8. 8 Abdisalam Issa-Salwe, Thames Valley University 15 Value Chain Analysis (cont…)  The value chain begins with the data resource.  Information is developed from the data resource to support the knowledge environment of an intelligent learning organisation.  Data is the raw material for information which is the raw material for the knowledge environment.  Knowledge is the raw material for business intelligence that supports business strategies. Abdisalam Issa-Salwe, Thames Valley University 16 Value Chain Analysis (cont…)  Data is the individual raw facts that are out of context, have no meaning and are difficult to understand. Facts are numbers, characters, character strings, text, images, voice, video and any other form in which a fact may be presented. Data in context is facts that have meaning and can be readily understood. It is the raw facts in context with meaning and understanding, but is not yet information because it has no relevance or time frame.
  • 9. 9 Abdisalam Issa-Salwe, Thames Valley University 17 Electronic Data Interchange (EDI)  EDI was first developed by the automobile/transportation industry in the 1970s.  Today, it is widely used in a variety of industries, including distribution, finance and accounting, health care, manufacturing, purchasing, retail, tax form filing, and shipping.  Early EDI packages used rather simple standard forms that forced companies to convert data to fit the forms.  Newer EDI systems allow companies to create custom systems using simple programming or authoring tools. Abdisalam Issa-Salwe, Thames Valley University 18 Electronic Data Interchange (EDI) (cont…)  Electronic Data Interchange is the electronic exchange of routine business transactions.  Typical transactions include such documents as purchase orders, invoices, advance shipping notification, payments, etc.  Exchange of electronic data using inter-organisational information systems  Set of hardware, software, and standards that accommodate the EDI process  EDI defines the electronic exchange of structured business data, such as purchase orders, invoices, and shipping notices, typically between one organisation and another.  The relationship is usually between a vendor and customer.
  • 10. 10 Abdisalam Issa-Salwe, Thames Valley University 19 Electronic Data Interchange (EDI) (cont…)  It is important to differentiate between EDI and electronic commerce.  Electronic commerce encompasses all aspects of electronic business exchanges, including person-to- person interaction (collaboration), money transfers, data sharing and exchange, Web site merchant systems, and so on.  EDI as a subset of electronic commerce that encompasses the exchange of business information in a standardised electronic form. Abdisalam Issa-Salwe, Thames Valley University 20 Electronic Data Interchange (EDI) (cont…)  EDI can reduce costs, workforce requirements, and errors associated with retyping orders, invoices, and other documents.  With EDI, computer data already entered by one organisation is made available to a business partner.  EDI is typically handled using store- and-forward technologies similar to e-mail.
  • 11. 11 Abdisalam Issa-Salwe, Thames Valley University 21 Electronic Data Interchange (EDI) (cont…)  Two approaches in the implementation of EDI.  Many large organisations acquire or build their own proprietary systems, often in association with their business partners.  To work with a VAN (value added network) provider, which provides EDI transaction services, security, document interchange assistance, standard message formats, communication protocols, and communication parameters for EDI. Most VANs also provide a network on which to transmit information. Abdisalam Issa-Salwe, Thames Valley University 22
  • 12. 12 Abdisalam Issa-Salwe, Thames Valley University 23 Value Added Network (VAN)  A (VAN) Value Added Network is a third party who stores the data to be communicated. It serves as a middle person, so neither party can access the other’s private network. The main key to a VAN is that the other partner does not touch your network, as business partners initiate the sending or retrieving of the data from the VAN. Abdisalam Issa-Salwe, Thames Valley University 24 Value Added Network (VAN) (cont…)  With the data being sent to or received from the VAN by the business partners initiating the communication, business partners are insuring a safe method of data transportation.  The different ways of communicating to the VAN include dialup as well as FTP protocols.
  • 13. 13 Abdisalam Issa-Salwe, Thames Valley University 25 Business Intelligent  Business intelligence represent a popular trend in many public and private sector organisations.  Ideally, any manager or knowledge worker should be able to compose information requests without programmer assistance and achieve answers at the speed of thought.  Follow-up questions should be immediately asked and answered in order to maintain continuity of thought on a particular topic of importance. Abdisalam Issa-Salwe, Thames Valley University 26
  • 14. 14 Abdisalam Issa-Salwe, Thames Valley University 27 Data warehouse, data marts  Data warehouses are computer based information systems that are home for "secondhand" data that originated from either another application or from an external system or source.  Warehouses optimize database query and reporting tools because of their ability to analyse data, often from disparate databases and in interesting ways.  They are a way for managers and decision makers to extract information quickly and easily in order to answer questions about their business.  In other words, data warehouses are read-only, integrated databases designed to answer comparative and "what if" questions. Abdisalam Issa-Salwe, Thames Valley University 28 Data warehouse, data marts (cont…)  Data Marts:  Data in a data warehouse should be reasonably current, but not necessarily up to the minute, although developments in the data warehouse industry have made frequent and incremental data dumps more feasible.  Data marts are smaller than data warehouses and generally contain information from a single department of a business or organisation. The current trend in data warehousing is to develop a data warehouse with several smaller related data marts for specific kinds of queries and reports.
  • 15. 15 Abdisalam Issa-Salwe, Thames Valley University 29 A Data Warehouse Architecture Abdisalam Issa-Salwe, Thames Valley University 30 Data mining  Data mining is primarily used today by companies with a strong consumer focus - retail, financial, communication, and marketing organisations.  It enables these companies to determine relationships among "internal" factors such as price, product positioning, or staff skills, and "external" factors such as economic indicators, competition, and customer demographics.
  • 16. 16 Abdisalam Issa-Salwe, Thames Valley University 31 Data mining  Data mining, or knowledge discovery, is the computer-assisted process of digging through and analysing enormous sets of data and then extracting the meaning of the data.  Data mining tools predict behaviors and future trends, allowing businesses to make proactive, knowledge-driven decisions.  Data mining tools can answer business questions that traditionally were too time consuming to resolve.  They scour databases for hidden patterns, finding predictive information that experts may miss because it lies outside their expectations. Abdisalam Issa-Salwe, Thames Valley University 32 Data mining (cont…)  With data mining, a retailer could use point-of-sale records of customer purchases to send targeted promotions based on an individual's purchase history.  By mining demographic data from comment or warranty cards, the retailer could develop products and promotions to appeal to specific customer segments
  • 17. 17 Abdisalam Issa-Salwe, Thames Valley University 33 Data mining (cont…)  Data mining consists of five major elements:  Extract, transform, and load transaction data onto the data warehouse system.  Store and manage the data in a multidimensional database system.  Provide data access to business analysts and information technology professionals.  Analyse the data by application software.  Present the data in a useful format, such as a graph or table. Abdisalam Issa-Salwe, Thames Valley University 34
  • 18. 18 Abdisalam Issa-Salwe, Thames Valley University 35 Tutorial Question Michael Porter described a concept that has become known as the "five forces model". This concept involves a relationship between competitors within an industry, potential competitors, suppliers, buyers and alternative solutions to the problem being addressed. Could you critical discus Porter’s five force model?