Summer-DISC 6341© Andrew Schwarz, 2002Slide 1 Lecture 7 Session 1 Integration in a Complex...

30
Summer-DISC 6341 © Andrew Schwarz, 2002 Slide 1 Lecture 7 Session 1 Lecture 7 Session 1 Integration in a Integration in a Complex Environment Complex Environment

Transcript of Summer-DISC 6341© Andrew Schwarz, 2002Slide 1 Lecture 7 Session 1 Integration in a Complex...

Summer-DISC 6341 © Andrew Schwarz, 2002 Slide 1

Lecture 7 Session 1Lecture 7 Session 1Integration in a Complex Integration in a Complex

EnvironmentEnvironment

Summer-DISC 6341 © Andrew Schwarz, 2002 Slide 2

Questions to Explore

1. What is the new IT Infrastructure?

2. What are the complications?

3. How does IT ensure business continuity?

4. What about security?

5. What is the application of this lecture for you, as a manager, in the digital age?

Summer-DISC 6341 © Andrew Schwarz, 2002 Slide 3

Question #1:Question #1:What is the new IT What is the new IT

Infrastructure?Infrastructure?

Summer-DISC 6341 © Andrew Schwarz, 2002 Slide 4

The New IT Infrastructure

Traditional firms use an IT infrastructure to support their own business

Digital firms digitally connect with suppliers and customers

The connectivity means more complexity and a new IT infrastructure– But how does it all fit together?

Summer-DISC 6341 © Andrew Schwarz, 2002 Slide 5

Choices, Choices, Choices…

In the past, users only completed work on their PC

Now, there are a proliferation of devices– PDA’s– Information Appliances– Mobile Phones– Mobile Devices

How do they all work together and integrate with kiosks, POS systems, etc…

Summer-DISC 6341 © Andrew Schwarz, 2002 Slide 6

Enterprise Networking An arrangement of the organization’s hardware,

software, network, and data resources to put more power on the desktop and create a company-wide network

Create a strong central backbone of several networks

Link the backbone to other networks through internetworking arrangements

The goal: connectivity or passing/sharing information without human intervention

Summer-DISC 6341 © Andrew Schwarz, 2002 Slide 7

Popular Internetworking Arrangement:Using the Internet

Began as a government program to connect universities

No formal owner, but agencies that convey standards

Collection of networks that are connected to one another

Summer-DISC 6341 © Andrew Schwarz, 2002 Slide 8

Internet Terms

http: hyper text transmission protocol SMTP: Simple Mail Transfer Protocol FTP: File Transfer Protocol Domain name: unique name of the node on the

Internet IP address: Internet Protocol address (4-part

numeric address) DNS server: Domain Name System Server Firewall: Protects data

Summer-DISC 6341 © Andrew Schwarz, 2002 Slide 9

New (and cool) e-Commerce Software

Clickstream tracking: tracking data about customer activities

Collaborative filtering: providing the user with what the company thinks they want to see by analyzing patterns

Personalized pricing: providing different prices to different users (Richness/reach revisited)

Summer-DISC 6341 © Andrew Schwarz, 2002 Slide 10

Making Devices Talk to Each Other

Remember from telecommunications: all of the devices must have the same protocol

So, all of the devices must use the protocol of the Internet if this is the backbone– TCP/IP: Transmission Control Protocol/Internet

Protocol

But, not all devices can output the same information due to bandwidth and telecommunication infrastructure limitations

Summer-DISC 6341 © Andrew Schwarz, 2002 Slide 11

An Example:Integrating a Complex Environment

TPSDatabase

LegacyDatabase

WAP Server

WebServer

CRMSoftware

WAPWML

HTMLXML

Summer-DISC 6341 © Andrew Schwarz, 2002 Slide 12

Question #2:Question #2:What are the complications?What are the complications?

Summer-DISC 6341 © Andrew Schwarz, 2002 Slide 13

Further Complications:Emerging Technologies

Voice over IP (VoIP): using the Internet Protocol to deliver phone service

VPN: Virtual Private Networks Internet2 Bluetooth: Allowing devices to connect

without wires Wi-Fi: 802.11 connection of devices Blackberry: handheld device for e-mail

Summer-DISC 6341 © Andrew Schwarz, 2002 Slide 14

Complications Could Lead to Tragic Results

Connectivity & “Internet Time” Integration—risk/reward? Control—who owns the Internet? Organizational change—where can work be

done now? Hidden costs—complexity understated? Bandwidth, bandwidth, bandwidth… Security

Summer-DISC 6341 © Andrew Schwarz, 2002 Slide 15

Managerial Suggestions

Proper planning is key to an enterprise infrastructure

Manage the change, understanding the sociotechnical view

Integration provides advantages, but benefits are to the business

Education and training—including at the top!

Summer-DISC 6341 © Andrew Schwarz, 2002 Slide 16

Question #3:Question #3:How does IT ensure business How does IT ensure business

continuity?continuity?

Summer-DISC 6341 © Andrew Schwarz, 2002 Slide 17

IT Business Continuity Planning

IT is vulnerable to many threats– Hackers within– Hackers from the outside– Natural disaster– Viruses– Failures of hardware, software,

telecommunications IT must develop a plan for business

continuity

Summer-DISC 6341 © Andrew Schwarz, 2002 Slide 18

Summer-DISC 6341 © Andrew Schwarz, 2002 Slide 19

Four Components of Disruption Planning

1 Portfolio analysis

3 Assessing capabilities

4 Determine stakeholders

affected

2 Stages of disruptive management

For A Specific Disruptive

Event

Overall risk assessment &

planning

Source: Chin, Schwarz, Todd, and Taylor, 2000

Summer-DISC 6341 © Andrew Schwarz, 2002 Slide 20

Portfolio Analysis Evaluate the risk of all disruptive events

from a portfolio perspective. Recognize that many disruptions share

similarities. Benefits of this approach

– efficiency– increased managerial effectiveness– strategic planning tool

1 Portfolio Analysis

3 Assessing capabilities

4 Determine stakeholders

affected

2 Stages of disruptive management

Source: Chin, Schwarz, Todd, and Taylor, 2000

Summer-DISC 6341 © Andrew Schwarz, 2002 Slide 21

Stages of a Disruption

1 Portfolio Analysis

3 Assessing capabilities

4 Determine stakeholders

affected

2Stages of disruptive management

Detection/Awareness

Preparation/Prevention

Containment/Mitigation

Recovery

Learning

For each disruption, examine how the disruption should be handled at each stage

Source: Chin, Schwarz, Todd, and Taylor, 2000

Summer-DISC 6341 © Andrew Schwarz, 2002 Slide 22

Assessing Capabilities

Consider what technical, political, and cultural capabilities are needed in your organization to handle the stages

If there are holes, determine what capabilities you need and create an action plan

1 Portfolio Analysis

3 Assessing capabilities

4 Determine stakeholders

affected

2 Stages of disruptive management

Source: Chin, Schwarz, Todd, and Taylor, 2000

Summer-DISC 6341 © Andrew Schwarz, 2002 Slide 23

Stakeholders

1 Portfolio Analysis

3 Assessing capabilities

4 Determine stakeholders

affected

2 Stages of disruptive management

Stakeholders

Suppliers Management

Competitors

Stockholders

RegulatorsEmployees

Consumers

UnionMedia

Source: Chin, Schwarz, Todd, and Taylor, 2000

Summer-DISC 6341 © Andrew Schwarz, 2002 Slide 24

The Result: BCP

The result of these stages is a business continuity plan that articulates:– The threats facing IT– What IT is doing now to detect these threat– What IT will do if the threats become a reality

This plan needs to be shared with all in the organization through training

BCP is an important post 9/11 area in business

Summer-DISC 6341 © Andrew Schwarz, 2002 Slide 25

Question #4:Question #4:What about security?What about security?

Summer-DISC 6341 © Andrew Schwarz, 2002 Slide 26

Integration Challenge: Security

IT needs to design policies, procedures, and technical measures to prevent unauthorized access, alteration, theft, or physical damage

Should include…– Who should get access (and why)– How they should get access (from where)– What they should be doing with that access– What to do when access has been violated

Summer-DISC 6341 © Andrew Schwarz, 2002 Slide 27

Security Approaches to Secure Data

As data is flowing between networks, it is susceptible

Options– VPN– Firewall– Encryption (Coding/Scrambling messages)– Authentication (Are you who you claim to be?)– Digital signatures (Unique ID)– Digital certificate (Verify ID)

SENDER SCRAMBLEDMESSAGE

RECIPIENT

Encrypt with public key

Decrypt with private key

How Encryption Works

Summer-DISC 6341 © Andrew Schwarz, 2002 Slide 29

Question #5:Question #5:What is the application of this What is the application of this

lecture for you, as a manager, in lecture for you, as a manager, in the digital age?the digital age?

Summer-DISC 6341 © Andrew Schwarz, 2002 Slide 30

Top 3 Applications from this Lecture

1. Planning is key, for both integration and business continuity

2. Educate and train users, so that they understand the complexity of the IT organization

3. Any change requires knowledge of the sociotechnical view