Information systems i t essay

  • Category: Technology
  • Words: 1614
  • Published: 02.11.20
  • Views: 505
Download This Paper

Information Technology, Decision Support System, Management Details Systems, Managing Information Program

Excerpt from Essay:

The company’s steady top series revenue development also displays it has been powerful in modifying its dealer network as one that runs more on knowledge, much less on strictly price or product decisions. As a result the business is capable of competing more at the process level and fewer at the purely price-driven one particular (Reese, 2007).

In terms of you can actually factors for success, the greater opportunities is to move into the global houseware and specialties market additionally to increasing greater business in the global footwear market segments, relying on its supply cycle expertise to do this (Reese, 2007). The company’s give attention to the increasing market for global clothes, accessories and luxury items in its important countries and regions offered is also a critical factor in the long-term success of the company. Overall the cabability to continually increase its procurement and strategy sourcing processes however is likely to make the greatest potential impact on the positive growth of the business over the long lasting (Ayling, 2007).

4. (Apple)

a) Did Apple gain a competitive advantage from their decision to purchase an online music business?

b) Will this kind of competitive advantage last forever? Why?

c) Employing Michael Porter’s Five Forces Model, assess Apple’s client and supplier power. Which will of the 3 generic tactics is Apple following (cost leadership, difference, or concentrated strategy)?

d) Which of Porter’s Five Forces did Apple addresses through its introduction of the iPod? How can is the iPod a logical extension of Apple’s pre-existing production?

Apple developed an economic ecosystem that is supported by their continual progress of iPods, iTouch and iPhones to compliment digital video on the one hand and an online shop with at this point over 75 million digital items marketed on the other (Vossoughi, 2008). Apple has created an economic ecosystem that scales very well and provides several partnership and co-marketing possibilities. It is debatable if this will likely be a competitive advantage permanently as Nokia, ATT and many others who have digital convergence systems including cellular phones are working to replicate the success of Apple with this concept. In the end there will be fakes of the iTunes store yet the MP3 unit business will continue to discover price competition and continuous strategies for competitors to incorporate more features at a lower price. Using the Five Forces Version (Porter, 2008) to analyze the success of Apple’s purchaser and suppler power, all their focus on difference as a competitive strength is evident. Apple chose to incorporate the Digital Rights Management (DRM) technologies across the ipod device, iTouch and iPhone furthermore to its laptops and workstations that also can translate and mix seems using the DRM format the business has standardized on. The differentiation areas of the unit are also so that the product strategy is actually in catch-up mode today (Vossoughi, 2008). Sooner or later every MP3 player will have digital file viewing capability as well.

Apple has a exceptionally dedicated customer base, one of the most loyal in high tech, having a repurchase charge of nearly 90% in systems and accessories (Cuneo, 2003). Apple has comprehensive analytics on the customer base and realized that while using introduction with the iPod they could potentially risk alienating their most devoted fans the company noticed it necessary additional revenue to develop. As a result, the iPod tackles two areas in the context of the Tenir Five Pushes Model (Porter, 2008). These include Bargaining Benefits of Customers and Threat of New Entrants. The Bargaining Benefits of Customers can be exceptionally good in the Apple customer base (Cuneo, 2003). They have over time been fed a stable diet of exceptional innovation and brilliant products and software. The Threat of New Entrants even so is also incredibly significant since the Apple customer base is likewise one of the most profitable in the hi-tech industry too. Taken collectively these two elements within the Five Forces Model explain how Apple has become successful in attracting clients while keeping their the majority of loyal and profitable as time passes. In conclusion, the Apple iTunes concept will be actively copied by mobile phone services businesses and manufacturers in addition to other systems software program companies which includes Microsoft for his or her Zune program. non-e of those have been powerful as of yet because each is experiencing a lack of incorporation across the larger product lines of the firm. The success of Apple in this area is attributable to their concentrate on the bargaining power of consumers and alleviating threats coming from new entrants.

5. (iPremier, ChoicePoint) Personal privacy security.

a) What lessons were discovered through the iPremier ChoicePoint situations regarding the protection of personal data?

b) What else could you say regarding the business and public relations ramifications resulting from bargain ( potential compromise) of private information?

c) Analyze (describe) the relationship among ethical, cultural, and privateness issues that happen to be raised by simply these situations.

O f the many lessons learned in the iPremier and ChoicePoint cases the most critical is to have oversight and compliance applications in place to guard intellectual house in the coming from of consumers’ confidential info. As these happen to be service organizations who desire to be known as trusted advisors by their customers, their interior auditing and validation systems need to indicate his responsibilities over time. The teachings learned included defining far better means of monitoring and auditing the use of inner company information, defining in employment legal agreements and deals the right to keep an employee criminally liable for offering this info and a definition of periodic yet unannounced audits of systems to ensure they are in compliance. Just after these steps are taken can an organization such as iPremier or perhaps ChoicePoint have the ability to begin to expand their trustworthiness again over time. In conjunction with these periodic audits it is also crucial for the business to establish a series of rules and constraint-based checks and balances about transactions to identify this type of activity over time (Swartz, 2007). Obviously the need for better controls and audit approaches is necessary intended for the ciel at iPremier and ChoicePoint to be get over. Using a great enterprise-wise conformity and top quality management (ECQM) system could also especially assist in ensuring this would not happen while easily mainly because it had in the past.

From an enterprise and pr standpoint the problem is even more extreme as there has been a infringement of consumers’ and the publics’ trust. As luck would have it these companies keep themselves to be able to be trusted advisors in their industries, however sell information with millions of names in them that contain each person’s identity whose name is included. This breach of trust forced the companies to offer credit verification and fraud protection, yet in the world by many because merely a short-term solution. What needs to be performed from a business and advertising standpoint is usually that the companies ought to publish their particular audit outcomes and readily share all of them over the Internet. Simply by doing this action of visibility and visibility and additional ones like it will their credibility be retained.

From the standpoint of the moral, social and privacy concerns, the companies must admit that they failed in protecting the public’s rely upon them initial and then attempted to completely re-architect the devices they count on to do their jobs. Simply with a complete analysis and audit showing how these breaches happened and a continual openness over the results of improvement can either business hope to increase. Creating a governance framework (Swartz, 2007) after which actively managing to this and also posting scorecards with the extent of compliance is definitely critically important if both businesses are going to improve over time. To put it succinctly that to own role of trusted expert in their industries, these companies need to adopt totally new approaches to measuring, monitoring and managing the personal info they take care of as part of their particular core business. Without trust they will ultimately go out of organization and deal with regulatory action.

References

Ayling, J.. (1 December). just-style’s review of the apparel market in 2007: Management briefing: September. Merely – Style: just-style’s overview of the clothing industry in 2007:, 19-20.

Boulding, T. (2004). Environmentally friendly pioneering benefit? Profit ramifications of market entry order. Marketing Science, 22, three or more, 371-392.

Cuneo (2003) – “Apple Goes beyond as Lifestyle Brand, ” Advertising Grow older, Alice Z .. Cuneo (15 December 2003).

Di Gangi, P., Wasko, M.. (2009). Steal my own idea! Organizational adoption of user innovations from a user innovation community: A case research of Dell IdeaStorm. Decision Support Systems, 48(1), 303.

David S i9000. Evans, Karen L. Webster. (2007). Developing the Right Merchandise Offerings. ÜBER Sloan Supervision Review, 49(1), 44-50.

David Fontana, Jeff Jedras. (2007, July). Google enlists Ingram Micro to progress enterprise push. Computer Seller News, 23(10), 1, three or more.

Gunasekaran, A., Ngai, Electronic.. (2009). Building and evaluation of build-to-order supply stores. European Record of Functional Research, 195(2), 319.

Kunert, P.. (2008, June). Ingram Micro set to complete restructure. MicroScope, eleven.

John A. Matthews. (2006). Dragon multinationals: New players in 21st century globalization. Asia Pacific

Need writing help?

We can write an essay on your own custom topics!