22.12.10

Session 6

Drivers of Mobile Computing & M-commerce
·         Widespread availability of mobile devices จะมีประชากรโลกใช้มือถือ 50% ในปี 2008 ในไทย จำนวนเบอร์มือถือมีทั้งหมดกว่า 60 ล้านเลขหมาย
·          No need for PC >> juz smart phone is enough
·          Handset culture >> widespread use of cellphones
·          Declining prices, increased functionalities
·          Improvement of bandwidth >> 3G, 3.5G
·          Centrino chip >> connects to wireless LAN, low usage of electricity, high level security
·          Availability of internet access in automobile
·          Networks >> 3G, 4G, Wi-fi
·          The service economy
·          Vendor’s push >> mobile network company tries to sell content (ex. Ringtone) besides main service
·          Mobile workforce

M-commerce
·          Mobile shopping
·          Mobile banking
·          Info-based service
·          Location-based service
·          Mobile auction
·          Mobile access to corp. Intranet
·          Mobile travel info
·          Mobile marketing &advertising

Mobile computing infrastructure
·          WAP (Wireless App Protocol) >> standard to extend internet service
·          Markup languages: WML, HTML >> internet language
·          Mobile development: .NET, JAVA
·          Mobile emulators >> make software usable for mobile
·          Microbrowsers: Android, Safari, IE, Firefox
·          HTML5

3G


WiMax >> a huge network of wireless


RFID

Operating system ex. Android OS, iPhone OS, Blackberry OS


M-commerce biz model
·          Usage fee model (subscription/usage-based)
·          Shopping biz model
·          Marketing biz model

15.12.10

E-Business and E-Commerce


·        Click-&-mortar vs Brick-&-mortar organizations
·        Online Advertisers, Marketers & Students  
>> Facebook, collegerecruiting.com
·        Company-sponsored Socially Oriented Sites
>> forbes.com
·        Application Programming Interface
>> Youtube, Google

IS Major EC Mechanisms

·        E-Market Trends
>> Youtube
·        Electronic Catalogs
>> JCPenny
·        E-Auctions
>> ebay
·        E-Classifieds
>> ebay business, ebay store
·        Bartering & Negotiations
>> Lala
·        B2B auction
·        Electronic Storefronts
>> Office Depot
·        Electronic Malls
>> MSN Shopping
·        Online Job Market
>> Job Central
·        Travel Services
>> Travelocity
·        Real Estate Online
>> housevalue.com
·        Market Research Online
>> Accu tips

Major Models of E-Business:  From E-Government to C2C

      B2E – organizations disseminate information to employees over company intranet.
      E2E – employees communicate with each other.  I.e.: goods & services bought & sold among fellow employees.
      E-Collaborative – digital technologies that enable collaboration.
      E-Government – delivers information & services to citizens, business partners & suppliers.  I.e.: G2C, G2B, G2G.


8.12.10

Session 5

Information Technology Economics

Productivity Paradox
= the contradiction between the advances in computer power and the slow growth of productivity at the level of the whole economy, individual firms and many specific applications

Why Justify IT Investments?
      Increased pressure for financial justification
      IT is not necessarily the solution to all problems.
      Heavy competition for limited funding requires sound analysis for justification.
      Stock prices typically increase when IT investment is announced.
      Companies need to assess the success of IT projects after completion, and later on a periodic basis.
      The success of IT projects may be assessed in order to pay bonuses to those involved with the project.

Difficulties in Measuring Productivity & Performance Gains
      Incorrectly defining what is measured
      Time lags
      Relationship between IT investment & organizational performance difficult to find.

Handling Intangible Benefits
      Rough estimates
      Think broadly and softly
      Pay your freight first
      Follow the unanticipated

Costing IT Investment
      fixed costs
      Transaction costs
o   search
o   information
o   negotiation
o   decision
o   monitoring

Revenue Models Generated by IT & Web
      Sales
      Transaction fees
      Subscription fees
      Advertising fees
      Affiliate fees

Cost-Benefit Analysis
1.    Identifying & estimating all the costs & benefits of carrying out the project & operating the system.
2.    Expressing these costs & benefits in common units.
Costs:
      Development costs
      Setup costs
      Operational costs
Benefits:
      Direct benefits
      Assessable indirect benefits
      Intangible benefits
Intangible benefits
      Increased levels of service
      Customer satisfaction
      Survival
      Need to develop in-house expertise
Intangible costs
      Reduced employee morale
      Lost productivity
      Lost customers or sales

Cost-Benefit Evaluation Techniques
      Net profit
      Payback period
      Return on investment (ROI)
      Net present value (NPV)
      Interest rate of return (IRR)

Advanced Methods for Justifying IT Investment
      Financial
      Multicriteria
      Ratio
      Portfolio

TCO (Total Cost of Ownership)
      acquisition cost (hardware and software)
      operations cost (maintenance, training, operations, evaluation, technical support, installation, downtime, auditing, virus damage, and power consumption)
      control cost (standardization, security, and central services)

By Pornpitra Sithiprasasana 5302115224

30.11.10

Session 4


Outsourcing, Offshoring, and IT as a Subsidiary

Reasons To Outsource
       Desire to focus on core competency
       Cost reduction
       Improve quality
       Increase speed to market
       Faster innovation
Outsourced IT functions
       Application maintenance
       Telecommunications/LAN
       PC maintenance
Outsourcing Agreements
       Transactional outsourcing agreements ให้บริษัทที่เชี่ยวชาญในด้านนั้นเป็นคนทำแทน
       Co-sourcing alliances ทำร่วมกันระหว่างลูกค้าและผู้รับจ้าง
       Strategic partnership ผู้รับจ้างรับผิดชอบทั้งระบบ
Risks Associated with Outsourcing
       Shirking – ทำงานไม่ดีแต่ต้องจ่ายเต็ม
       Poaching – เอาข้อมูลไปให้ลูกค้าคนอื่นด้วย
       Opportunistic repricing – มีการเปลี่ยนแปลงสัญญา
Hidden Costs of Outsourcing
       Benchmarking & analysis
       Investigating & contracting with a vendor
       Transmitting work & knowledge to outsourcer
       Ongoing staffing & management of outsourcing relationship
       Transitioning back to in-house
Strategies for Risk Management in Outsourcing
       Understand project
       Divide & conquer
       Align incentives
       Write short-period contracts
       Control subcontracting
       Do selective outsourcing
Factors should be considered in offshore outsourcing
       Business & political environments in selected country
       Quality of infrastructure
       Risks e.g. IT competency, human capital, the economy, legal environment, and cultural differences
Risk & Uncertainties in offshore outsourcing
       Cost-reduction expectation
       Data Security/Protection
       Process discipline, which is use of the same process repeatedly without innovation
       Loss of business knowledge
       Vendor failure to deliver
       Scope creep, which is the request for additional services not included in the outsourcing agreement
       Government oversight/ regulation
       Differences in culture
       Turnover of key personnel
       Knowledge transfer

Acquiring and Developing Business
Applications and Infrastructure

The Framework of IT Application Acquisition
IT Application Acquisition Issues
       Wide range of sizes & types.
       Applications keep changing over time.
       Applications may involve several business partners.
       No single way to acquire IT applications.
       Diversity of IT applications requires variety of acquisition methodologies & approaches.
Acquisition Process of IT Application
       Step 1 – planning, identifying, & justifying IT-based systems – must be aligned with overall business plan.  May require process redesign.  Cost benefit analysis is critical.
       Step 2 – creating an IT architecture – plan for organizing underlying infrastructure & applications of IT project.
       Step 3 – selecting an acquisition option – 1. build in-house, 2. vendor build custom-made system, 3. buy existing application & install with/without modifications, 4. lease, 5. enter partnership or alliance, or 6. use combination.
       Step 4 – testing, installing, integrating & deploying IT applications.
       Step 5 – operations, maintenance & updating.  May take same effort as install.  Rapid changes to technology require frequent updates.

Acquiring IT Applications:  Available Options
·         Buy vs. Lease Options
·         Software-as-a-service (SaaS)
·         In-House Development (Insourcing)
o   Build from scratch
o   Build from components
o   Integrating applications

Methods Used in In-House Development
       Systems Development Life Cycle (SDLC)
       Prototyping
       Web 2.0 or Application 2.0 methodology
       End-user development

Business Process Redesign
Methods for Restructuring
       BPR – may include one or more processes.  Can be anything from redesign of individual process to redesign of group of processes to design of entire enterprise.
       BPM – combines workflow systems & redesign methods.  Covers:  people-to-people, systems-to-systems, & systems-to-people interactions.  Process-centered perspective.  Blends workflow, process management & applications integration.



 By Pornpitra Sithiprasasana 5302115224