Pac Text
Pac Text
CHAPTER NO. 10
IT STRATEGY
Contents
1 IT strategy
2 Principles of e-business
3 Infrastructure
4 E-marketing
5 Customer relationship management
6 IT control
CHAPTER-10 IT STRATEGY (3)
1. IT Strategy
Section overview
IT helps organizations to develop new products and service, make use of advanced technological
systems and explore new opportunities to meet strategic targets.
2. Principles of E-business
Section overview
◼ Definition of e-business
◼ The impact of the internet on business strategy and competition
◼ Main business and marketplace models for delivering e-business
◼ E-commerce and the globalisation of business
◼ Barriers to e-business
The impact of the internet on competition in many industries can be analysed within the framework of
Porter’s Five Forces model.
• Competitive rivalry with existing competitors. The internet encourages greater competition.
Companies provide a large amount of information about themselves and their products on their
websites. This makes it easier for competitors to copy what they are doing. As a result of the
stronger competition, selling prices are depressed.
• Threat of new entrants. In many industries, the barriers to entry have been lowered. By using
the internet, new competitors can enter the market more quickly and more cheaply. Companies
are able to enter the market using the internet to market their products or services. They do not
need to employ an expensive full-time sales force, or distribute their products through
(expensive) traditional retail networks.
• Bargaining power of suppliers. Suppliers are able to use the internet to increase the number
of clients or customers for their products. As a result, the bargaining power of suppliers is
likely to increase.
• Bargaining power of customers. The internet has increased the bargaining power of
customers substantially. Customers are able to obtain information about the rival products of
many different competitors, by using search engines such as Google and visiting many
different websites. ‘The reality is that customers using the internet are finding it easier to
switch suppliers, and the openness of the internet and its standards makes it difficult for a
customer to maintain its customer network intact.’
Customer relationships. The internet provides opportunities for companies to build customer
relationships, for example by providing support, user forums and FAQ (frequently asked questions)
pages.
2.4 E-commerce and globalization of businesses
E-commerce has been a major factor in the globalisation of business. Geographical distance can still
be a barrier to the globalisation of markets, but e- commerce reduces those barriers, and can even
remove them.
The earlier concept of e-procurement helps firms to globalize based on e-commerce models
2.5 Barriers to E-business
Although many companies engage in some form of e-business, there are barriers to setting up e-
business activities and maintaining them so that they remain an effective way of developing the
business. The difficulties with e-business can include the following.
Set-up costs. It can be fairly expensive for a small company to establish a website for selling its
products and taking payment by credit card, debit card, Interswitch or PayPal. For example, it will be
expensive for a small company to set up a website showing an online catalogue with photographs,
keeping records of inventory balances, and with the facility to debit customer credit cards.
Type of business. Some products and services are easier to sell on the internet than others. For
example, computer firms sell products very successfully over the internet as their products can be
perfectly specified in writing. However, it is much more difficult to sell items of clothing.
On-going operating costs. A website has to be updated frequently, to keep it interesting (and
accurate), and it might be necessary to keep making special offers to encourage customers to revisit
the site.
Time to establish the system. It takes time to establish a website that customers know about and want
to visit.
No in-house skills. A company might not employee individuals with the knowledge or skills to
maintain a website. However, this should not be a serious barrier to e-business, especially if the
employer is prepared to give suitable training to staff.
CHAPTER-10 IT STRATEGY (8)
3. Infrastructure
Section overview
◼ Layers of infrastructure
◼ The internet
◼ Intranets and extranets
◼ Designing a website for e-commerce
Some web pages are static, always showing the same information, rather like a printed sheet. Other
web pages are dynamic, which means that they are updated in real time.
CHAPTER-10 IT STRATEGY (9)
Web Email
Web browser Regional
(client software) internet
company
Web Web pages
An extranet is a network in which the intranet of one company can connect with the intranet of
another company, usually a supplier or customer. An example of an extranet is a buyer’s purchasing
system communicating electronically with a seller’s sales order system, through their intranets, to
generate a purchase order and order delivery.
3.3 Designing website for e-commerce
The design of a website is extremely important, for persuading customers to use the site and buy from
it.
• The website must be easy to use. The user must be able to navigate through the site easily.
Icons must be clear. Users should be able to select goods for purchasing without any difficulty
or possible confusion. Any forms must be easy to fill in.
• Screens should also be visually attractive, to encourage users to browse through the site.
• Design features such as the ability to enlarge images of products, or obtain additional
information about a product, may also be very useful.
• The system must allow users to interact with it, so that the users can choose their
own route through the website easily.
• The website must be kept up to date. For example, the availability of products must be
kept up to date, so that buyers know whether a product is available for purchase or not. If
a website is not kept up to date, users will lose confidence in it.
• The website is an advertising medium as well as an electronic store. It can be designed
in such a way that the user’s attention is drawn to additional products that he or she
CHAPTER-10 IT STRATEGY (10)
4. E-marketing
Section overview
In addition to planning e-marketing strategy in terms of the 7Ps of the marketing mix, an e-marketing
mix can also be considered in terms of the ‘6Is’. These are:
• Interactivity
• Intelligence
• Individualization
• Integration
• Industry structure
• Independence of location
Interactivity
Traditional advertising media are ‘push media’, in the sense that the flow of information is all one
way, from the advertiser to the customers, and the advertiser is trying to persuade the customers to buy
its products.
A website is a pull medium, because the aim is to attract interest from customers and make them want
to visit the site.
The internet can also be used to establish interactivity with customers, and create a dialogue.
Interactivity is a very powerful marketing device. Interactivity takes several forms, such as:
• getting visitors to the site to provide details about themselves (and agree to receive e-mails
from the website owner in the future), perhaps in exchange for additional information or a free
service
• getting visitors to buy a product or service and pay for it using the internet.
Having obtained the e-mail address of an individual, opportunities exist for the continuation of the
dialogue in the future, through e-mail marketing messages and ‘information updates’. This connection
with the customer helps to establish a long-term relationship, which companies can try to benefit from.
Intelligence
The internet can be used as a relatively low-cost method of collecting market research data and data
about customers and other visitors to a website. This data can be analysed to produce marketing
information about what customers buy, and what information on a website interests them most.
‘Clickstream analysis’ of data on a website log file can be used to build up a picture of customer
preferences, and possibly also to identify different market segments.
Individualisation
In traditional media the same message tends to be broadcast to everyone. Communication via the
internet can sometimes be tailored or ‘personalised’ to the individual. For example, the activities of
every customer who visits a site can be recorded and whenever a customer next visits the site, relevant
information will be retrieved from the data files and used to produce an individualised message. (In
contrast, advertising messages in media such as television are ‘one-to-many’ messages, and the same
marketing message is sent to every potential customer.)
This can be done even if a visitor has not registered with the website as ‘cookies’ can be sent and
stored on visitors’ machines. Cookies are small pieces of information, which are used to customise
visitors’ experiences on subsequent visits to the website.
CHAPTER-10 IT STRATEGY (13)
Integration
The internet provides scope for integrated marketing communications: how can the internet
complement other marketing channels to deliver customer service?
Many companies are now considering how they integrate e-mail response and website call-back into
their existing call-centre or customer service operation. This may require a substantial investment in
training and new software.
Some practical examples of how the internet can be used as an integrated communications tool are as
follows:
• The website can have a call-back facility built into it. For example, a customer service
representative can contact a customer by telephone when the customer provides his name,
phone number and gives a suitable time for calling. Similarly when a customer logs on to the
website of his bank and looks at information about personal loans or mortgages mortgage
information, this can be notified to one of the bank’s mortgage advisers or loans advisers, who
can then telephone the customer.
• The internet can be used to support the buying decision even if the purchase does not take
place on the website. For example, the website might provide a telephone number to call in
order to speak to a sales representative and make an order. (This might be necessary for
companies that sell non-standard products or services.)
• The internet can be used to support customer service, for example, by encouraging users to
check a list of frequently asked questions (FAQ) compiled from previous customer enquiries
before contacting customer support via phone.
Industry restructuring
The internet can lead to a re-structuring of the industry supply chain. Disintermediation is the removal
of intermediaries such as distributors or agents: this occurs for example when a company starts selling
directly to end-consumers through its website, and reduces or abandons its use of sales agents,
distributors and sales representatives. In other markets there has been re-intermediation, where new
intermediary companies sell the products of other suppliers, when the suppliers had previously sold
direct to customers. An example, mentioned earlier, is the use of intermediaries such as
lastminute.com to sell holidays, travel arrangements, book hotel accommodation and buy theatre
tickets and tickets to other entertainment events.
Independence of location
The internet introduces the possibility of increasing the impact of an entity on a global market. Users
of a website cannot easily tell from the website whether it is owned by a small local company or a
large multinational or global company. This gives small companies opportunities to sell into global
markets.
The internet also makes it possible to sell to a country without a local sales force. In the UK, the
internet is used extensively to advertise residential property in other European countries, for purchase
or rental.
CHAPTER-10 IT STRATEGY (14)
Time consumed Expensive for the advertisers Expensive for the internet users
Advertising image Creating an image is usually The content of the message is usually
more important than the more important than creating an
content of the advertising image.
message
Communication Push, one-way from advertiser Pull, drawing the customers to the
to customers website.
Or interactive.
Interactivity with the customer allows a company to build up a relationship with the customer through
the internet. An important feature of interactivity (after obtaining the customer’s e-mail address and
agreement to receive messages) is the delivery of e-mail marketing messages.
Companies wanting to use e-mail marketing as a part of their marketing strategy should acquire
customer lists – a list of actual or potential customers and their e- mail addresses. These can be built
up ‘in house’ over time, by collecting e-mail addresses from visitors to the website.
Spam: ‘Spam’ has become a significant problem for electronic marketing, and has helped to give
direct mail advertising through the internet a ‘bad name’.
Spam is unsolicited and unwanted e-mail. Although many consumers receive ‘junk mail’ through the
post, spam is more of a problem simply because of the very high volumes of mail received. Unless
CHAPTER-10 IT STRATEGY (15)
software is installed for detecting and blocking spam messages, the likelihood is that by far the
greatest number of e- mail messages received by an internet user will be spam.
Nowadays many email service providers like Gmail and Hotmail have a built-in feature for protecting
users from ‘spam emails’
4.5 E-branding
E-branding refers to the use of internet and related technologies to build brand of a company and
develop its positioning in minds of the consumer.
A brand image can be defined as a collection of perceptions in the mind of the consumer. (These
perceptions can be positive or negative.)
A strong brand is important because it immediately confers a certain amount of recognition when
consumers are choosing products and services. To make their choice easier, consumers will choose a
brand that they have been happy with in the past.
Brand identity can be defined as the elements that are used by a customer to recognise a brand: logos,
symbols, colours, packaging etc. For example, part of Coca Cola’s brand identity in the past has been
the distinctive shape of their glass bottles.
When an established company is planning to market its products by internet for the first time, it has to
consider what to do about its brand identity. There are four choices:
• Duplicate its existing brand identity online. However, if the quality of the internet
site is poor, the brand could be damaged.
• Extend the traditional brand by creating a slightly different version of the brand. For
example, in the UK the BBC extended its name image to its online services, giving the
new services the slightly different name of BBC Online. This allowed the useful
associations of the BBC brand name to be retained, but also suggested to the customer
that the services offered by BBC Online might be different.
• Partner with an existing e-brand. For example, a chain of hotels could market itself
online through an airline website and so associate the hotels with the airline brand
name.
• Create a new brand for the web. For example TCS created www.yayvo.com as their e-
branding to sell goods online.
CHAPTER-10 IT STRATEGY (16)
Section overview
Section overview
6.1.2. Risks
• Loss of data, device or gadget
• Prone to attack by hackers and criminal sabotage
6.1.3. Cloud computing
Cloud computing is a general term for the delivery of hosted services over the internet.
It is the practice of using a network of remote servers hosted on the internet to store, manage, and
process data, rather than a local server or a personal computer. It enables use of a computing resource
without the need to build and maintain in-house computing infrastructures.
Characteristics:
• Hardware and software managed by vendor
• Service driven payments (not for the hardware infrastructure)
• Scalable services
6.1.4. Benefits
• Allowing minimized up-front cost
• Focus on core business instead of developing IT infrastructure
• Respond quickly to the changes
6.1.5. Risks
• Giving data access to third party
• More prone to cyberattack
generated in the past two years and will continue to double in volume every
two years. Aeroplanes generate around 2.5 billion terabytes of data per year
from sensors installed in their engines. Self-drive cars are estimated to
generate 2 petabyte of data every year. The energy company Shell uses ultra-
sensitive sensors for exploration - if each of their 10,000 wells had three
sensors each that would generate around 10 Exabyte of data annually.
Variety the wide range of data types and sources reflected within big data. Big data
comprises largely unstructured data which requires a different approach and
technique to store raw data. Furthermore, the wide variety of data facilitates
new ways of thinking and analysing. For example, social media such as
Facebook can provide insights such as sentiment analysis on a brand.
Velocity the incredibly high speed that data is created, stored, analysed and visualised.
Traditional batch processing might only update master files once per day on
an overnight batch run. Big data is updated real time (or near real-time) - for
example when you post a photo or comment on social media
Innovating new business models, products and services. Big data enables companies to enhance
existing products, create new products and services and invent entirely new business models.
Manufacturers such as airlines might use data obtained from the use of actual products to improve the
development of next generation products to create, say, innovative after-sales service offerings.
Performance management is probably the most traditional and best understood current big data
strategy. This involves understanding the meaning of big data in company databases and using
predetermined queries and multidimensional analysis. The underlying data is transactional - for
example
years’ worth of customer purchasing activity. Many businesses will already have some kind of
dashboard
capability that will allow limited drill-down and multiple reporting to identify trends and exceptions
Data exploration also leverages existing transactional data but involves using statistics to experiment
and challenge areas managers may not have previously considered. Cluster analysis is one technique
used to segment customers into groups based on similar attributes which may not have previously been
identified by managers. This will help to attract potential customers with an emphasis on digital,
inbound marketing through engaging, robust and targeted content.
Social analytics relates to the huge amount of non-transactional data which nowexists. Much of this
data is generated on social media platforms such as conversations and reviews on applications such as
Facebook, Twitter and WeChat. Social analytics measures three key areas: awareness, engagement and
word-of-mouth (reach). They are critical for businesses as they help inform managers of the success of
their external and internal social digital campaigns and activities.
Decision science. Unlike social analytics that focus on measuring knownobjectives, decision science
explores social big data in order to conduct field research and test hypotheses. This could include
initiatives such as crowdsourcing, ideas generation and polling.
6.2.5. Challenges of Big data
• When dealing with larger datasets, organisations face challenges in being able to create,
manipulate and manage big data, in particular in business analytics where standard tools and
procedures are not designed to search and analyse massive datasets.
• issues of privacy, security, intellectual property and liability
• Paradoxically the personal data such as health and financial records that might be most
sensitive could arguably offer the most significant human benefits, such as helping identify the
right medical treatment or most appropriate financial product
CHAPTER-10 IT STRATEGY (20)
7. IT control
Section overview
• Technical error. Technical errors in the computer hardware, the software or the
communications links can result in the loss or corruption of data.
• Natural disasters. Some computer systems may be exposed to risks of natural disasters, such
as damage from hurricanes, floods or earthquakes.
• Sabotage/criminal damage. Systems are also exposed to risk from criminal damage, or
simply theft. Risks from terrorist attack are well- publicised. Losses from theft and malicious
damage are much more common.
• Deliberate corruption. All computer systems are exposed to risk from viruses. Hackers may
also gain entry to a system and deliberately alter or delete software or data.
• The loss of key personnel with specialist knowledge about a system. For example, the risk
that a senior systems analyst will leave his job in the middle of developing a complex new
system.
• The exposure of system data to unauthorised users. For example hackers and industrial
espionage.
In addition, there are risks within the computer software itself:
• The software might have been written with mistakes in it, so that it fails to process all the data
properly.
• The software should contain controls as a check against errors in processing, such as human
errors with the input of data from keyboard and mouse. The software might not contain
enough in-built controls against the risk of input error and other processing errors.
CHAPTER-10 IT STRATEGY (22)
General controls are applied to all IT systems and in particular to the development, security and use
of computer programs. Examples of general controls are:
• General controls within the system software such as passwords, encryption software, and
software firewalls
• General controls over the introduction and use of new versions of a computer
program
• giving their passwords to other individuals who are not authorised to access the system.
Encryption
Encryption involves the coding of data into a form that is not understandable to the casual reader. Data
can be encrypted (converted into a coded language) using an encryption key in the software.
A widely-used example of encryption is for sending an individual’s bank details via the Internet. An
individual buying goods or services from a supplier’s web site may be required to submit credit card
details. The on-line shopping system should provide for the encryption of the sender’s details (using a
‘public key’ in the software for the encryption of the message) and the decryption of the message at
the seller’s end (using a ‘private key’ for the decryption).
• Audit trails, so that transactions can be traced through the system when hacking is suspected
• Network logs, whereby network servers record attempts to gain access to the system
• Firewalls.
Firewalls
Firewalls are either software or a hardware device between the user’s computer and modem. Computer
users might have both.
A firewall:
• Will block suspicious messages from the Internet, and prevent them from entering the user’s
computer, and
• May provide an on-screen report to the user whenever it has blocked a message, so that the
user is aware of the existence of the messages.
CHAPTER-10 IT STRATEGY (24)
Computer viruses
Viruses are computer software that is designed to deliberately corrupt computer systems. Viruses can
be introduced into a system on a file containing the virus. A virus may be contained:
Term Description
Trojan A Trojan horse is a type of virus that disguises itself often hidden within
horses other software or files. Whilst the user thinks that the system is carrying
out one program, the Trojan horse secretly carries on another.
Worms This is corrupt data that replicates itself within the system, moving from
one file or program to another.
Trap A trap door is an entry point to a system that bypasses normal controls
doors to prevent unauthorised entry.
Logic This is a virus that is designed to start ‘working’ (corrupting the files or
bombs data processing) when a certain event occurs.
Time This is a virus that is designed to start ‘working’ (corrupting the files or
bombs data processing) on a certain date.
New viruses are being written continually. Some software producers specialise in providing anti-virus
software, which is updated regularly (perhaps every two weeks). This includes software for dealing
with the most recently-discovered viruses.
Anti-virus software is able to:
• Isolate the virus so that it is not able to corrupt software or data in the computer.
IT standards
A range of IT Standards have been issued. For example, the International Standards Organisation
(ISO) has issued IT security system standards. There are also IT Standards for the development and
testing of new IT systems.
7.4 Application controls in IT
Application controls are controls that are designed for a specific IT system. One example of
application controls is data validation. Data validation checks are checks on specific items of data that
are input to a computer system, to test the logical ‘correctness’ of the data.
CHAPTER-10 IT STRATEGY (25)
Introduction
COBIT is an IT governance tool that has been of tremendous benefits to IT professionals and has
contributed immensely to effective control of information systems. Linking information technology
and control practices, COBIT consolidates and harmonises standards from prominent global sources
into a critical resource for management control professionals and auditors. As such, COBIT represents
an authoritative, up-to-date control framework, a set of generally accepted control objectives and a
complementary product that enables the easy application of the Framework and Control Objectives,
referred to as the Audit Guidelines.
COBIT applies to enterprise-wide information systems, including personal computers, mini-
computers, mainframes and distributed processing environments. It is based on the philosophy that IT
resources need to be managed by a set of naturally grouped processes in order to provide the pertinent
and reliable information which an organisation needs to achieve its objectives.
With the addition of the management guidelines, COBIT now supports self- assessment of strategic
organisational status, identification of actions to improve IT processes and monitoring of the
performance of these IT processes. Since the first edition of COBIT was released in 1997 it has been
sold and implemented in over 100 countries of the world.
Purpose of COBIT
The purpose of COBIT is to provide management and business process owners with an information
technology (IT) governance model that helps in understanding and managing the risks associated with
IT. COBIT helps to bridge the gaps between business risks, control needs and technical issues. It is a
control model to meet the needs of IT governance and ensure the integrity of information and
information system.
Users of COBIT
COBIT is used by:
• Anyone who has the primary responsibilities for business processes and technology
• those who depend on technology for relevant and reliable information
• those providing quality, reliability and control of information technology
• procurement
• marketing
• sales
• sales
• finance and accounting
The process owners are responsible for the performance of their processes of which IT has become an
integral part. In other words, they are empowered, but also accountable. As a consequence, the
business process owners bear the final responsibility for the information technology as deployed
within the confines of business processes.
CHAPTER-10 IT STRATEGY (26)
The addition of the Management Guidelines in the third edition of COBIT provides management with
a new set of tools. These allow self-assessment in order to make choices for control implementation
and improvements over IT, measure the achievement of goals and the proper performance of IT
processes. The Management Guidelines include maturity models, critical success factors, key goal
indicators and key performance indicators to support managerial decision making.
COBIT components
COBIT, issued by the IT Governance Institute and now in its third edition, is increasingly
internationally accepted as good practice for control over information, IT and related risks. Its
guidance enables an enterprise to implement effective governance over the IT that is pervasive and
intrinsic throughout the enterprise. In particular, COBIT’s Management Guidelines component
contains a framework which responds to management’s need for control and measurability of IT by
providing tools to assess and measure the enterprise’s IT capability for the 34 COBIT IT processes.
The tools include:
• Performance measurement elements (outcome measures and performance drivers for all IT
processes)
• A list of critical success factors that provides succinct, non-technical best practices for each IT
process; and
• Maturity models to assist in benchmarking and decision-making for capability improvements.
COBIT comprises six specific components:
• Management Guidelines;
• Executive Summary;
• Framework;
• Control Objectives;
• Audit Guidelines; and
• Implementation Tool Set.
Management Guidelines
To ensure a successful enterprise, one has to effectively manage the union between business processes
and information systems. The Management Guidelines are composed of:
• Maturity models, to help determine the stages and expectation levels of control and compare
them against industry norms
• Critical Success Factors, to identify the most important actions for achieving control over the
IT processes
• Key Goal Indicators, to define target levels of performance; and Key Performance Indicators,
to measure whether an IT control process is meeting its objective.
These Management Guidelines will help answer the questions of immediate concern to all those who
have a stake in enterprise success.
Executive Summary
Sound business decisions are based on timely, relevant and concise information. Specifically designed
for time pressed senior executives and managers, COBIT includes an executive overview which
CHAPTER-10 IT STRATEGY (27)
provides thorough awareness and understanding of COBIT’s key concepts and principles. Also
included is a synopsis of the Framework providing a more detailed understanding of the concepts and
principles, while identifying COBIT’s four domains (Planning & Organisation, Acquisition &
Implementation, Delivery and Support, and Monitoring) and 34 IT processes.
Framework
A successful organisation is built on a solid framework of data and information. The Framework
explains how IT processes deliver the information that the business requires to achieve its objectives.
This delivery is controlled through 34 high-level control objectives, one for each IT process, contained
in the four domains. The Framework identifies which of the seven information criteria (effectiveness,
efficiency, confidentiality, integrity, availability, compliance and reliability), as well as which IT
resources (people, applications, technology, facilities and data) are important for the IT processes to
fully support the business objective.
Control Objectives
The key to maintaining profitability in a technologically changing environment is how well control is
maintained. COBIT’s Control Objectives provide the critical insight needed to delineate a clear policy
and good practice for Information Technology controls. Included are the statements of desired results
or purposes to be achieved by implementing the specific and detailed control objectives throughout the
34 Information Technology processes.
Audit Guidelines
To achieve desired goals and objectives one has to constantly and consistently audit one’s procedures.
Audit Guidelines outline and suggest actual activities to be performed corresponding to each of the 34
high level IT control objectives, while substantiating the risk of control objectives not being met. Audit
Guidelines are an invaluable tool for information system auditors in providing management assurance
and/ or advice for improvement.
Web Trust enables consumers and businesses to purchase goods and services over the Internet with the
confidence that vendors' web sites have historically met specific high standards for privacy, security,
business practices, transaction integrity and more.