Professional Documents
Culture Documents
ISM PPT Summary
ISM PPT Summary
Decision Analytics is the discipline of leveraging analytics and performance modeling to create a
tight link between key operational processes and desired strategic outcomes. Basically based
on fact based decision making and discarding decision making based on educated guesswork
The practice involves building performance models that highlight the key processes supporting
the strategy; developing cause-and-effect analytical models that highlight the key drivers of the
business; and leveraging technology solutions such as dashboards to provide insights to those
on the front lines of the business.
Organizational complements
Organizational complements are the organizational innovations, or changes in the way
companies get work done. Organizational complements which allow process GPTs to deliver
improved performance are-
Better skilled workers
Redesigned processes
Enterprise IT functions:
1. Redesigning business processes.
2. Standardizing work flows.
3. Monitoring activities and events efficiently.
Managing 3 Types of IT
Three tasks:
Selection: Executives have to select IT applications that will deliver organizational capabilities
Adoption: Executives must lead adoption methods that result in creation of complements
Exploitation: must shape exploitation of IT by ensuring that technologies, capabilities and
complements stay align
Inside-Out Approach
An inside-out approach puts the spotlight squarely on the business before evaluating the
technology landscape
Focuses on the capabilities that IT can provide rather than on the technologies themselves
Outside-in approach
Companies usually select technologies when something new comes into the market without
giving a thought that the technology is going to help or not.
A data mart
* small scaled-down version of a DW
* designed for a department or strategic business unit
* Contain less information compare to DW
* Response time better than DW
* Easier accessibility than DW.
An enterprise system imposes its own logic on a company’s strategy, culture, and organization
At the heart of the enterprise system is a central database that draws data from and feeds data
into a series of applications supporting diverse company functions
Using a single database dramatically streamlines the flow of information throughout a business
Companies are spending an aggregate of $10 billion/ year (approx.) on an ERP systems
(excluding the consulting fees)
Examples of Bad implementation: FoxMeyer Drug finds that ERP implementation lead the
organization towards its bankruptcy
Mobil Europe spent hundreds of millions of dollars on its ERP system only to abandon it when
its merger partner objected
Disadvantages of ERP
1. ERP pushes a company toward full integration even when a certain degree of
business-unit segregation may be in its best interests
2. ERP pushes a company toward generic processes instead of customized processes
3. If a company rushes to install an enterprise system without first having a clear
understanding of the business implications, it could prove to be disastrous
4. If the logic of the system may conflict with the logic of the business, then either the
implementation will fail, wasting huge sums of money or the system will weaken
important sources of competitive advantage
Trojan horses
Software that appears benign (legitimate software) but does something other than expected.
Users are typically tricked by some form of social engineering into loading and executing
Trojans on their systems.
Ransomware
Ransomware is a subset of malware in which the data on a victim's computer is locked, typically
by encryption, and payment is demanded before the ransomed data is decrypted and access
returned to the victim. The motive for ransomware attacks is nearly always monetary, and unlike
other types of attacks, the victim is usually notified that an exploit has occurred and is given
instructions for how to recover from the attack. Payment is often demanded in a virtual currency,
such as bitcoin, so that the cybercriminal's identity isn't known.
Spoofing
–Misrepresenting oneself by using fake e-mail addresses or masquerading as someone else
–Redirecting Web link to address different from intended one, with site masquerading as
intended destination
Sniffer
–Eavesdropping program that monitors information traveling over network
–Enables hackers to steal proprietary information such as e-mail, company files, and so on
• Botnets
Networks of “zombie” PCs infiltrated by bot malware
Deliver 90 percent of world spam, 80 percent of worlmalware
Eg: Grum botnet: controlled 560K to 840K computers
• Identity theft
Theft of personal Information (social security ID, driver’s license, or credit card numbers) to
impersonate someone else
• Phishing
Setting up fake Web sites or sending e-mail messages that look like legitimate businesses to
ask users for confidential personal data
• Evil twins
Wireless networks that pretend to offer trustworthy Wi-Fi connections to the Internet. An evil twin
is a fraudulent Wi-Fi access point that appears to be legitimate but is set up to eavesdrop on
wireless communications. The evil twin is the wireless LAN equivalent of the phishing scam.
Tools for protection: Firewall, Antivirus, Intrusion detection systems, Security Policy