Wednesday, November 27, 2019

Armorial dish Supper at the House of Simon the Pharisee essay

Armorial dish Supper at the House of Simon the Pharisee essay Armorial dish: Supper at the House of Simon the Pharisee essay Armorial dish: Supper at the House of Simon the Pharisee essayArmorial dish: Supper at the House of Simon the PhariseeTin-glaze decoration pottery presents an amazing world of paints, ornaments and forms. Although several centuries have passed since maiolica gained popularity among the Italian artisans, the entire collection goes on fascinating and inspiring today’s visitors of the exhibition. Here, mythological and biblical subjects are met side by side, and together this thematic direction is known as ‘istoriato’ style. It goes without saying that historiated imagery is rather helpful and informative. On the one hand, it is a significant cultural and historical source because it reflects important events and facts of the past. On the other hand, most of the dishes fulfilled not only a decorative role, but were also used in household. In this way, maiolica also reflects the household realities and tableware nuances typical for Italy of the 16th century. Joined to gether with aesthetic significance, the facts listed above make this exclusive type of decorated pottery extremely attractive for both specialists and common people. This study is intended to analyze the attractiveness of Italian maiolica by the example of one of the most extraordinary works in the collection, Armorial dish: Supper at the House of Simon the Pharisee made by maestro Giorgio Andreoli in 1528.The subject of Armorial dish: Supper at the House of Simon the Pharisee is devoted to one of the Biblical scenes, conventionally known as the story of Jesus’ feet anointed in the house of a Pharisee. Jesus’ visit to Simon the Pharisee is described in the Gospel according to St. Luke (New Jerusalem Bible, Luke 7.36-50). To be more specific, the plate presents a scene of a feast. One of the guests is Jesus sitting on a divan. Together with a woman by His feet, He makes up a critical segment of the work. They are not placed in the center of the composition, still the fo cus is deliberately made on them. The dish is a traditionally round plate, and the Biblical subject is placed at the main part of it. The round shape of the plate creates an illusion of a peeped scene, as if the viewer looks at it through a round opening. Such an illusion fills the artwork with a mysterious allure and grabs the viewer’s attention the same moment he or she comes in touch with it.The rim of the plate is, meanwhile, decorated with an exquisite ornament. The ornament includes elaborately produced grotesques, arabesques, and strapworks. The elements of the ornament do not have a direct connection with the subject, but they edge the composition making it look completed and add the sense of relief to it.As it has been already mentioned, the literary source for the subject is the Gospel according to St. Luke. It is written that Simon the Pharisee invited Jesus to his house despite the common attitude of this sect to Him. Jesus could not decline the invitation because it was His rule to communicate with all the estates. Simon was probably driven by curiosity or had a will to assert himself through the act of condescending patronage to a poor man. What is more, he probably wanted to test Jesus and get an evidence of His fraud. As a result, however, he received an evidence of his own delusion. For Simon the Pharisee, Jesus was not among the respected guests, so he did not care to provide Him with traditional honors, such as washing the feet and anointing the head with oil. While rest of the guests were surrounded by slaves’ care and provided with comfort, there suddenly appeared a woman to eliminate the injustice. In that town, the woman was famous for her sins. Driven by sincere emotions, Mary came to Jesus, washed His feet with tears, dried them with her hair and anointed with an expensive ointment from an alabaster cruse. While Simon omitted all the traditional courtesies, Mary did more than the most respected guest could expect: â€Å" I entered into thy house, thou gavest me no water for my feet: but she hath wetted my feet with her tears, and wiped them with her hair. Thou gavest me no kiss: but she, since the time I came in, hath not ceased to kiss my feet. My head with oil thou didst not anoint: but she hath anointed my feet with ointment† (New Jerusalem Bible, Luke 7.44-46). It is this moment that is fixed at the dish made by maestro Giorgio Andreoli. Still, the full sense of the scene can be understood only if to read the chapter further. Simon the Pharisee is naturally struck by the event, but even more is he struck by Jesus’ reaction of not pushing the sinful woman from Him. According to Simon’s logic, Jesus tended to be a prophet, and being a prophet, should have seen who the woman was and should defend Himself from her mud. Simon made a conclusion that Jesus could not understand who the woman was and this fact proved to him that Jesus was a pretender. However, Jesus could easily read the thoughts of Simon the Pharisee and, in response, told him a parable about debtors who could not pay a debt to their creditor. God is a mighty creditor for all the people on earth and all of them have a lot of debts to pay and know chance to do it. But Jesus explains that the debts will be forgiven for love, and such people as Mary are the first to be forgiven because of their sincere repentance and strong faith. This subject provides essential material for thinking about vanity and arrogance personified by Simon the Pharisee on the one hand and obedience and humility personified by Mary on the other hand.As the dish is rather big (18 5/16 inches in diameter), it is enough to carry such a complex narrative composition and is also rather convenient in studying the image. The author of the dish borrowed the composition from Marcantonio Raimondi’s engraving of the same subject. It is worth of noting that Marcantonio Raimondi’s engravings were rather popular as a source for maiolica artisans, but the armorial dish under consideration is considered to be one of the most extraordinary works of that time. The scene is draped with dark-blue curtains that correlate with the clothes of Jesus and Mary of the same color. There are two painted pieces on the wall, and they seem to be the two parts of the same painting because their contents supplement each other. The dishes are on the table, and a little slave brings some more for the guests. The scene would be conventional if the woman did not do such an unprecedented honor to the least honored guest of the house. Therefore, the overall impression of the dish can become rather strong if a viewer finds strength and wish to go deeper into its sense. One can even suppose that the curtains framing the story are meant for the viewer to go to the backstage hidden in the book of the New Testament of the Bible.Since the work is entitled as an armorial dish, it apparently means that the dish did not have a utilitar ian meaning, but was an important component of the patron’s coats of arms (heraldry). It seems not to be used in household, but to have a great decorative meaning for its master and further owner. On the other hand, the subject of the product includes a scene of mealtime and being evaluated by its surface could easily accompany a grand dinner or a ceremonial feast. The more obvious the association between the mealtime and the conventional purpose of a dish, the stronger the contrast between first impression and the true meaning of the subject.All in all, Armorial dish: Supper at the House of Simon the Pharisee is an eloquent example of how painting on pottery can make a profound impact on a viewer. No manufacture can be compared with craft production of decorative arts like that presented in this collection. Maybe golden and silver tableware could be more expensive and respectful, but this kind of production has shown its own bonuses. It could be either utilitarian or decorat ive, but more often majolica played both of the roles, so it makes the collection of tin-glaze decorated pottery meaningful and informative.

Saturday, November 23, 2019

Let Me Not to the Marriage of True Minds by William Shakespeare Essays

Let Me Not to the Marriage of True Minds by William Shakespeare Essays Let Me Not to the Marriage of True Minds by William Shakespeare Paper Let Me Not to the Marriage of True Minds by William Shakespeare Paper Basically, this poem is about love, but here shakespeare has discussed the love which is in his mind. you may disagree with him if you like. The first stanza in this poem is a quatrain and its rhyme scheme is abab. Shakespeare uses alliteration, assonance, consonance, and repetition to develop this stanza, which, as a whole, states that love does not change. The first line contains an example of alliteration in the words â€Å"me,† â€Å"marriage,† and â€Å"minds. † In this line, he is referring to love as â€Å"the marriage of true minds. † He uses the alliteration of the â€Å"m† sound to draw attention to his view of love as being a type of marriage. The words â€Å"admit† and â€Å"impediments† in the second line are examples of both assonance and consonance because of the identical â€Å"i† and â€Å"m† sounds. The second, third, and fourth lines of this stanza contain repetition. â€Å"Love,† â€Å"alter,† and â€Å"remove† are repeated to put emphasis on the points that he is trying to make. He is saying that if a person is really in love he or she would not have to make changes in their lover to make themselves happy, and that love cannot be taken back. The second stanza of this poem is a quatrain with a rhyme scheme of cdcd. This stanza contains assonance, a very clever metaphor, and personification in stating that love is ever-lasting and can be used as a guide in life. The words â€Å"star† and â€Å"bark† in line eight of the poem contain assonance of the â€Å"a† sound. Shakespeare uses this assonance to bring attention to the metaphor he is using, which compares love to the North Star, which is a guide for ships. By following their hearts, people can use love as a guide to get them through life. Also, the North Star is relatively permanent, and Shakespeare says love is an â€Å"ever-fixed mark† in line five of the poem. Line eight refers to a star when it says â€Å"Whose worth’s unknown, although his height be taken. † Stars have neither ownership nor a set gender, so this line contains personification. Shakespeare speaks of love as if it were human to express the importance of it. The third stanza of this poem is another quatrain and its rhyme scheme is efef. Personification, assonance, and consonance help to get the point across that love is independent of time. In lines eight and nine, Shakespeare says â€Å"Love’s not Time’s fool, though rosy lips and cheeks within his bending sickle’s compass come. Even though beauty fades with time, love does not. Shakespeare personifies time to help express that love does not operate on any specific clock. He even capitalizes â€Å"Time† as if it were a real person’s name. He also personifies death in line nine when he refers to the bending sickle, which would be the weapon of the infamous reaper. Death can t ake away physical traits, but not true love. Shakespeare intentionally expresses his view of love as not yielding to time or any other force. The use of the words â€Å"but† and â€Å"bear† in line twelve of the poem is an example of alliteration. Shakespeare uses these words to help express that love can survive anything on its own despite the pressures and influences of time. The fourth and final stanza of this poem is a couplet with a rhyme scheme of gg. In this stanza, the poet-speaker boasts how confident he is in his opinion of love, suggesting that if his opinion is wrong, no one has ever loved. In line fourteen, the poet-speaker declares â€Å"I never writ, nor no man ever loved. † The words â€Å"never,† â€Å"no,† and â€Å"nor† are an example of alliteration. These negative words are used to strengthen the poet-speaker’s certainty of his opinion of love. Line fourteen also has internal rhyme. â€Å"Never† and â€Å"ever† are positioned before the word â€Å"loved†. Shakespeare uses this internal rhyme to make it clear that the speaker has full faith in his own words. William Shakespeare’s poem â€Å"Sonnet 116 is an excellent poem. Using multiple literary tools, such as metaphors, personification, and internal rhyme, Shakespeare has created a masterpiece that describes love by what it is and is not. Because of the brilliant use of tools and flow in this poem, it will remain one of the best poems ever written.

Thursday, November 21, 2019

Reflections on reading Essay Example | Topics and Well Written Essays - 250 words

Reflections on reading - Essay Example Main hero, Zach is a complicated, not an ordinary person, who is put by author in not a casual kind of circumstances. Maybe this novel is even metaphorical: for example, Zach’s roommate in rehab has a name Raphael, what calls up a parallel with name Raphael like the angel’s name. (Koenig, L.) â€Å"Hairstyles of the Damned† by Joe Meno I loved most. It’s entertaining and helpful for young people, and a little bit philosophical – all at ones. This novel gives reader an opportunity to feel like you are (or were) not alone with your teenage problems, and believe, that if everyone is going through it, you also will. First love and sex, complexes about the way you are and way you look, problems with friends, parents and at school – it’s all common teenage problems. To my mind, such books should be written for a different ages, because in every age there are specifical problems and fears, and in every age it’s important to feel you’re not alone. I also loved the main hero for his mistakes and his honesty to himself. It’s often we can not explain all our emotions to other people, even to family and friends, but it’s important to confess your feelings to yourself and be not ashamed of what you desire. So after the end of my literature class, that force me to read, I think I still be reading sometimes for all three reasons: to know briefly something new, to think about high important things together with the intellectual author and to feel I’m not alone with something that bothers me right

Wednesday, November 20, 2019

Current Event Paper- Marketing Essay Example | Topics and Well Written Essays - 1000 words

Current Event Paper- Marketing - Essay Example The most interesting fact is that word-of-mouth adverting penetrates into online environment becoming one of the adverting tools in the Internet. Today, for many companies a website is the main tool on the basis of which the firm carries out the transactions flow between itself and the buyer. In indirect marketing the company utilizes the services of various types of independent marketing organizations or cooperative organizations that are located in the home country. When a manufacturer exports indirectly, the responsibility for carrying out the foreign selling job is transferred to some other organization. For instance, the Wee Ninja doll is one of the popular toys for children available online. Smiths and their partner use online marketing as one of the main tools of adverting and sales. They state that it is more â€Å"about personal taste and online conversation as they are about buying itself, although no products are sold on the sites† (Schneider, 2006). As businesses compete in a progressively fiercer market place for a larger wallet share of an increasingly discerning and diverse customer base, they become ever more communication-dependent. On the one hand the right to be informed of the facts involved in any buyer-seller relationship is clearly a fundamental right. Some of the key aspects, which have already been subject to legislation or regulation in Europe, include the full cost of credit/loans taken up, often known as truth-in-lending; the true cost of an item, under the slogan unit pricing; the basic constituent elements of products, known as ingre ­dient informative labeling; the freshness of foods, discussed generally as open-dating; and truth-in-advertising. â€Å"Patti Freeman Evans, a senior retail analyst at Jupiter Research, added: â€Å"Shopping tends to be a social experience in the offline world† (Schneider, 2006). The emergence of direct marketing, customer relationship management, and various other marketing

Sunday, November 17, 2019

Monarchial constitution Essay Example for Free

Monarchial constitution Essay Under the monarchial constitution of the United Kingdom (UK), the majority of prerogative powers are now exercised by the government in the name of the Crown. There are two principle definitions of Royal Prerogative (RP); that of Sir William Blackstone and that of Professor A. V. Dicey. According to Dicey, RP is defined as the residue of arbitrary or discretionary authority, which at any given time is legally left in the hands of the Crown. RP has several defining characteristics RP is inherent to the Crown, derived from common law, exercised by the government on behalf of the crown, the powers are residual and RP legitimises government actions without the need for an Act of Parliament (AOP). Before the 17th century, the monarch had all three powers, the legislative, executive and judicial powers. The judiciary started gaining independence since the Case of Prohibitions 1607 and was fully independent after the Act of Settlement 1700, which effectively removed the power of the monarch to remove a judge at will. The independence of the legislature started with the Case of Proclamation 1611 and culminated in the Bill of Rights 1689, which curbed future arbitrary behaviour of the monarch and guaranteed Parliament’s power vis a vis the Crown. With these changes made to the UK constitution and as support grew for a democratic government, RP seemed out of place in the hands of the monarch and was slowly transferred into the hands of the government to be used in the name of the Crown. It is possible for RP to be codified i.e incorporated into an AOP, as can be seen from the Constitutional Reform and Governance Act 2010 (CRGA). The CRGA codified several RPs, such as the RP to ratify treaties. The codification of RP meant that it would be under Parliamentary control and not the Executive. In the UK today, the UK government makes certain decisions based on the RP if they are not covered under any statutes. However, there have been several cases regarding the use of RP brought to the courts, spearheaded by Darnels case as well as the Case of Ship Money. The fact that these cases could be judged by the courts showed that the government (on behalf of the monarch) could exercise the prerogative power granted by the courts. Therefore, the courts have the power to determine whether that prerogative power exists and the extent of the power exercised by the government. Codifying the RP ensures that courts would not have the power to determine its existence, as they are unable to determine the validity of an AOP, as directed by Lord Reid in Pickin v British Railways Board. It would also prevent conflicts with statutes, as well as promote greater certainty and accessibility in the law. However, codifying the RP would make it more rigid, which may affect the reflexes of the government in responding to situations which are time-sensitive. Nevertheless, the current practice of the UK government with regards to such RP would be to consult Parliament first. Thus, it would be desirable to codify the RP. The RP has always been a part of common law in the UK Constitution. In the Case of Proclamation 1611, then King James I declared two royal proclamations without the consent of Parliament. When the case was brought before the court, Lord Coke held that ‘the King hath no prerogative, but that which the law of the land allows him’, meaning that the King could only exercise the prerogative power granted by the courts. Following the judgment, there were several cases which involved the use of the RP which the courts upheld. In Darnels case, the Defendant was imprisoned due to a warrant issued from the King in which there was no reason for the imprisonment. The court held that the arrest was valid as this was the exercise of the monarch’s prerogative power to arrest. The Case of Ship Money also exemplified how the court could decide if use of RP was legitimate. Hampden had refused to pay taxes to the King, upon his RP to raise revenue in an emergency situation. The court subsequently upheld the power of the Crown. Lastly, the judgment in Lord Advocate v University of Aberdeen upheld the RP that things lost, abandoned or ownerless belongs to the Crown. However, the courts have also held several decisions which restricted the RP. In BBC v Johns, BBC claimed there was a prerogative to grant immunity to them so as to avoid paying taxes. This case was famous for the dictum of Lord Diplock who stated that it is â€Å"350 years and a civil war too late for the Queen’s courts to broaden the prerogative†. Some feel that the exercise of prerogative powers was outside judicial review. Lord Devlin (in Chandler v DPP) agreed, but in his obiter statement stated that the courts will not review the proper exercise of discretionary power but they will intervene to correct excess or abuse. Despite this, not all prerogative powers are subjected to judicial review, the reviewability is dependent on its subject matter and not the source of power. In the GCHQ case, Lord Roskill mentioned that â€Å"Prerogative powers such as those relating to the making of treaties, the defence of the realm, the prerogative of mercy†¦ are not, I think, subjected to judicial review because of their nature and subject matter is such as not to be amendable to the judicial process†. Thus, with RPs, courts would have the ability to judge whether they are implemented legitimately or not, dependent on the scope of the prerogative in question, but in the case regarding AOP, courts would not be able to question its validity, as stated by Lord Reid in Pickin (as above). This would be desirable as it would smoothen the relations between the Judiciary and Executive, with fewer conflicts between them. There are also situations whereby RP will be in conflict with statutes. As such, the Crown would not be able to exercise the prerogative power due to the doctrine of Parliamentary Sovereignty. In AG v De Keysers Royal Hotel, the Crown used the Royal Hotel during the First World War and the hotel later claimed for compensation under Defence Act 1842. Although the Crown argued that no compensation should be paid since there was an RP to acquire any land of the subject during wartime, the court held that when the statutory power and prerogative power co-existed, statutory power would override that of prerogative. Similarly, in R v Secretary of State for the Home Department, ex parte Fire Brigades Union, the Criminal Injuries Compensation Scheme set up under Ministerial Prerogative powers was used instead of the Criminal Justice Act 1988, so as to save money by awarding less compensation. The court held that if there is a statutory scheme, it cannot be replaced by the RP. To prevent these scenarios from happening, Parliament has taken steps in recent years to incorporate some RP into statutes. For example, the Treasure Act 1996 states that the prerogative right of treasure trove has been abolished and replaced by this Act. The Human Rights Act 1998 protects citizens against arbitrary use of prerogatives, and the Fixed-Term Parliament Act 2011 has incorporated the RP of dissolution of Parliament. Hence with these recent developments, RP will be in less conflict with AOPs and more consistent with them, enabling them to be more certain and accessible to the public. There are naysayers of codifying the RP that argue that such an act would increase the rigidity of the process to achieve the intended result. Indeed, this is true as can be seen in the prerogative to declare war on other countries. For such a result, the government would need the operational flexibility and speed of deployment that the RP provides. By incorporating it into a statute, not only will the efficiency of the government be reduced, excess publicity that the AOP will bring would undermine the success of the operation. In addition, there will be situations where the government cannot await Parliamentary approval due to time constraints. Be that as it may, in practice, the government in modern times have looked for Parliament’s approval regarding the issue of war. In 2006, then Prime Minister Tony Blair, following his own vote over Iraq in 2003, acknowledged that he could not conceive of a situation in which a government is going to go to war except in the circumstances where immediate action is required without a full Parliamentary debate. The Iraq war vote was a significant precedent that Parliament should give its approval regarding such matters. Following which, Prime Minister David Cameron in 2011 held a Parliamentary debate on whether UK should establish a no-fly zone in Libya after the outbreak of military action. Lastly, in September 2013, a Parliamentary debate was called to discuss the possible military intervention in Syria after chemical weapons were allegedly used on civilians. By calling a vote, the government was ensuring continuing adherence to the practice that Parliament should have a say in such issues. Hence, even if codifying the RP does increase rigidity, the process of ensuring Parliament’s approval is already established. Some might feel that codifying the RP would be sacrificing UK history as they would be forgoing part of their culture which makes their unwritten constitution unique in today’s world (inclusive of New Zealand and Israel). Nevertheless, the RP is considered by many to be an outdated power and is such an important one that it should not bypass democratic representation.

Friday, November 15, 2019

An Alliance in Distress Essay -- Foreign Policy

It is almost too hard to fathom that only 70 years ago the United States possessed such strong feelings of hatred and fear towards Japan in the wake of the devastating Pearl Harbor attacks. The federal government even went as far as to unjustly imprison 110,000 Japanese-Americans. Also, the Japanese felt much animosity and held an inhumane view of Americans following their surrender in WWII after two U.S. atomic bombs killed an estimated 240,000 people. However, from the midst of this painful and dark history has risen one of the most peaceful and powerful alliances of the twenty-first century. The United States rose to be a political superpower with the most technologically advanced military and largest economy in the world. Japan also rose to be a technological superpower with the second largest economy in the world, although it was recently surpassed by China in late 2010. The mutual growth of the two countries stemmed from the Treaty of Mutual Cooperation and Security (TMCS) betw een the United States and Japan that was signed on January 19,1960. The TMCS helped foster the mutual and prosperous trade between the two countries, while also setting forth an agreement of security assistance to one another in times of conflict. As a result of the treaty, the U.S. was allowed by Japan to place bases on various islands, but primarily on the island of Okinawa for strategic purposes and to aid in the defense of Japan. Over fifty years have passed since this agreement was made by the two nations and now an international debate has risen over complications with this arrangement to a magnitude so large that Japanese citizens now even question the merits of the overall U.S.-Japan alliance. The main question that now stands between the Japan... ...ates. Congress. House. Committee on Armed Services. Japan†¯: Recent Security Developments†¯: Committee on Armed Services, House of Representatives, One Hundred Eleventh Congress, Second Session, Hearing Held July 27, 2010. Washington: U.S. G.P.O.†¯:, 2010. Print. United States. Congress. House. Committee on Foreign Affairs. Subcommittee on Asia, the Pacific, and the Global Environment. U.S.-Japan Relations [microform]†¯: Enduring Ties, Recent Developments†¯: Hearing Before the Subcommittee on Asia, the Pacific, and the Global Environment of the Committee on Foreign Affairs, House of Representatives, One Hundred Eleventh Congress, Second Session, March 17, 2010. Washington: U.S. G.P.O., 2010. Print. Sato, Ikenberry, G. John, and Yoichiro Inoguchi, Takashi. U.S.-Japan Security Alliance: Regional Multilateralism. Gordonsville, VA, USA: Palgrave Macmillan, 2011. Print.

Tuesday, November 12, 2019

My Papa’s Waltz

Theodore Roethke’s poem, â€Å"My Papa’s Waltz†, can be quite mystifying in terms of comprehending the exact feeling of the speaker towards his father. Presumably, one would immediately notice the impression created by the author regarding the father. The first line of the poem already suggests the negative image of the father as a drunken man playing with his son. â€Å"The whiskey on your breath / Could make a small boy dizzy; / But I hung on like death: / Such waltzing was not easy† (Roethke 30). The first stanza speaks of the narrator’s recollection of the nausea that his father’s drunkenness has caused when he was a little boy. After finishing Theodore Roethke’s poem, it is quite clear that the speaker implies contrasting emotions of pain and enjoyment of a son’s rough dance with his father. However, despite the pain caused by the alcohol smell, he still appreciated his father’s efforts in â€Å"waltzing† with him for he knew it was not that easy. Furthermore, it can also be noticed that the pain that the narrator felt is directly insinuated in the poem in this stanza: â€Å"The hand that held my wrist / Was battered on one knuckle; / At every step you missed / My right ear scraped a buckle† (Roethke 30). Nonetheless, the contrasting emotions of the narrator’s enjoyment were implicit. Instead, the emotions were portrayed through the words that the author has chosen to describe the situation. According to Edward Byrne, a writer and English professor in Valparaiso University, â€Å"the poet refers to his father as ‘papa’, connoting greater affection. Additionally, the word choice of ‘romp’ reflects a more playful tone† (Byrne). Considerably, Roethke made use of words which portray affection and delight towards the father; therefore, the poem consists of two different emotions and at the same time correlates them with each other. The contrasting emotions become related because the narrator insinuates that he is able to endure the pain as long as his father plays with him. The poet may not have directly expressed the enjoyment that he felt, but by understating it through his use of words, he was able to show his happiness with his father in spite of the pain.

Sunday, November 10, 2019

Chapter One Overview of Information Systems

1. 1 Introduction When Rutherford B. Hayes, the 19th president of the United States, saw a demonstration of the telephone in the late 1800s, he reportedly commented that while it was a wonderful invention, businessmen would never use it. Hayes believed that people had to meet face to face to conduct substantive business affairs, and he was not alone in that assessment.Few of Hayes's contemporaries could foresee the profound changes that would be ushered in by the telephone and other technologies of the day, including steam engines, production machinery; transportation technologies such as railroads and automobiles, and communication technologies such as the telegraph and telephone. As we are in the 21st century, we are once again experiencing an intense period of technology-enabled innovation, creativity, and excitement that has been spurred by the information and telecommunications technologies and associated changes in our life, work and society.We are now in  the information/kno wledge age — a time when information and knowledge are power. Leading industrial countries are transforming from industrial-based economies to information/knowledge-based economy. Information is everywhere. Information and knowledge have become critical, strategic assets for most organizations. We live in an â€Å"information society,† where power and wealth increasingly depend on information and knowledge as central assets. It is a new world of doing business.Business and other organizations all over the world are focusing on information and knowledge as their key strategic resources. All firms today, large and small, local and global, use information systems to achieve important business objectives, such as operational efficiency, customer and supplier intimacy, better decision making, and new products and services. A continuing stream of information technology innovations from the Internet to wireless networks to digital phone is continuing to transform the business world.These innovations are enabling entrepreneurs and innovative traditional firms to create new products and service, develop new business models, and transform the day-to-day conduct of business. In the process, some old businesses, even industries, are being destroyed while new businesses are springing up. In 2005, journalist Thomas Friedman wrote an influential book declaring the world was ‘flat’ by which he meant that the Internet and global communications had greatly reduced the economic and cultural advantages of developed countries. U. S. nd European countries were in a fight for their economic lives, competing for jobs, markets, resources, and even ideas with highly educated, motivated populations in low-wage areas in the less developed world. The globalization trend of the world economy greatly enhances the value of information systems to the organizations. In today's global business environment, information technology is creating new opportunities for organ izational coordination and innovation. Organizations require powerful information and communication systems to manage business on an international scale.Manufacturers are using information systems to order supplies and distribute goods faster than ever before; financial institutions are employing them to transfer billions of dollars around the world electronically; investors are using them to make multimillion-dollar decisions. This globalization presents you and your business with both challenges and opportunities. The challenge for you as a business student is to develop high-level skills through education and on-the-job experience that cannot be outsourced. Information systems will continue to change our business, society and lives.Information system and technologies will also play large roles in your career. Along with the changes in business come changes in job and careers. No matter whether you are a finance, accounting, management, marketing, operations management, or informa tion systems major, how you work, where you work, and how well you are compensated will all be affected by business information systems. When interviewing potential employees, business firms often look for new hires who know how to use information technologies and systems for achieving bottom-line business results.It is widely recognized that understanding information systems is essential for managers and employees because most organizations need information systems to survive and prosper. Employees will depend on the information systems to increase their productivity. Management will use the information systems to improve their decision-making processes. Thus the knowledge of information systems and the ability to put this knowledge to work can result in a successful personal career. The knowledge and skill you learn from this subject will be valuable throughout your business career. 1. Computer Literacy and Information System Literacy Today, computers are everywhere: at work, at s chool, and at home. Many daily activities either involve the use of or depend on information from a computer. Computer advances impact all individuals, families, organizations, and schools (see Figure 1-1). Computers already are an essential part of people's daily lives, as much as the automobile, television, and telephone. Computers are taking on many new roles — providing vast information resources, fast communications, effective learning tools, and powerful support for activities in businesses, schools, and homes.Information systems and technologies have become a vital component of successful businesses and organizations. They thus constitute an essential field of study in business administration and management. Almost any career in your future will involve a computer in some way. You probably recognize that it will not be easy to get through the rest of your life without knowing about computers and information systems. In today's technology-rich world, a great demand for computer and information systems professionals exists and continues to grow.The computer and information systems industries offer many rewarding careers and jobs, but require a unique combination of hands-on computing skills, creative problem solving ability, and an understanding of business needs. In preparing yourself to enter today's fast-paced, ever-changing, and information-intense business environment, you need to understand the new thinking in business. Managers and professionals such as engineers, scientists, or architects are collectively known as knowledge workers, since their main contribution to the activities in which they are involved is their knowledge and skills.The term literacy has been used to describe two types of knowledge that are key to succeed as a knowledge worker in today's information/knowledge-based business environment. One kind of knowledge is computer literacy; the other is information systems literacy. The knowledge and understanding of computer syste ms and the ways they function are called computer literacy. Computer literacy focuses primarily on knowledge of information technology. This knowledge includes an understanding of computer terminology, recognition of the strengths and weaknesses of the computer, and an ability to use the computer.It also stresses computer equipment and devices (hardware), programs and instructions (software), databases, networking, and telecommunications. The requirements that determine computer literacy change as technology changes. As you study about computers, you will become aware of their importance, their versatility, and their pervasiveness in our society. There is no better way to understand computer systems than through interacting with one. So being computer literate also means being able to use computers for some type of applications. However, no one expects you to become a computer expert.Today, information systems provide the communication and analytic power that firms need for conducti ng trade and managing businesses on a global scale. In addition to understanding computers, the modern knowledge worker should have information systems literacy. From an organizational perspective, an information system is an organizational and management solution, based on information technology, to a challenge posed by today's dynamic environment. To fully understand information systems, you must understand the broader organization, management, and information technology dimensions of information systems (see Figure 1-2).Figure 1-2 Organization, management, and information technology dimensions of information systems Information systems are integral part of organizations. The key elements of an organization are its people, structure, operating procedures, politics, and culture. Organizations are composed of different levels and specialties. Different levels and specialties in an organization create different interests and points of view. Information systems come out of this cauldr on of differing perspectives, conflicts, compromises, and agreements that are a natural part of all organizations.Management's job is to make sense out of the many situations faced by organizations, make decisions, and formulate action plans to solve organizational problems. Managers perceive business challenges in the environment, they set the organizational strategy for responding and allocate the human and financial resources to achieve the strategy and coordinate the work. The business information systems in organizations reflect the hopes, dreams, and realities of the managers. Information technology is one of many tools managers use to cope with change.Information technology infrastructure provides the foundation or platform on which the firm can build its specific information systems. Each organization must carefully design and manage its information technology infrastructure so that it has the set of technology services it needs for the work it wants to accomplish with infor mation systems. Let us use UPS's package tracking system to identify the organization, management, and technology elements. The organization element anchors the package tracking system in UPS's sales and production functions (the main product of UPS is a service–package delivery).It specifies the required procedures for identifying packages with both sender and recipient information, taking inventory, tracking the packages en route, and providing package status reports for UPS customers and customer service representatives. The system must also provide information to satisfy the needs of managers and workers. UPS's management is responsible for monitoring service levels and costs and for promoting the company's strategy of combining low-cost and superior service.Management decided to use automation to increase the ease of sending a package via UPS and of checking its delivery status, thereby reducing delivery costs and increasing sales revenues. The technology supporting this system consists of handheld computers, barcode scanners, wired and wireless communications networks, desktop computers, UPS's central computer, storage technology for the package delivery data, UPS package tracking software, and software to access the World Wide Web. The result is an information system solution to the business challenge of providing a high level of service with low prices in the face of mounting competition.Therefore, information systems literacy is knowledge of how and why data, information, knowledge, computer, and information technology are used by organizations and individuals. It includes not only knowledge of computer technology but also aspects of the broader range of information technology. Information systems literacy can involve knowledge of how and why people use information technology; knowledge of organizations, decision-making approaches, management levels, and information needs; and knowledge of how organizations can use information systems to achiev e their goals.Thus, the key aspect of information systems literacy is knowing how to deploy information technology to help an organization achieve its business goals and to gain a competitive advantage. In general, knowing about various types of hardware and software is an example of computer literacy. Knowing how to use hardware and software to increase profits, cut costs, improve productivity, increase customer satisfaction, and improve management decision-making is an example of information systems literacy. Information system literacy includes a ehavioral as well as a technical approach to studying information systems. The field of management information systems (MIS) tries to achieve this broader information systems literacy. One of the main objectives of this course is to lay the foundation for information systems literacy. 1. 3 Data and Information Today, information is one of an organization's most important and valuable resources. Organizational information systems contain information about people, places, things, ideas and events within the organization and in the environment surrounding it.By information we mean data that have being processed into a form that is meaningful and useful to the recipient. Data are therefore the raw facts for producing information. The relation of data to information is that of raw material to finished product. The information systems process data in unusable form into a usable form that is information for intended recipient. As the simplified example shown in Figure 1-3, the student name, ID number, semester, curse codes, and course grades all represent data. The computer processes the data to produce the grade information (report). | | Figure 1-3 The process of transforming data into information| Organizational activities require information. Producing products, assigning workers, making sales, billing amounts due, and providing customer services are examples of activities that use information. Data represents real-wor ld facts, such as an employee's name, weekly sales, customer numbers, or product inventory. Data items are organized for processing purpose into data structures, file structure, database, and data warehouse. Data are simply raw facts and has little value beyond its existence.Information systems manipulate and process data to create information. The information in an information system take a variety of forms including text, numbers, pictures, sounds, animations and videos. The value of information is described most meaningful in the context of a decision. In other words, the value of information is directly linked to how it helps decision-makers achieve their organization's goals. If there were no current or future choices or decisions affected by a piece of information, the information would be unnecessary.It is cited frequently in explaining why information systems that collect vast amounts of data often fail to satisfy managerial information needs. The value of information might be measured in following three dimensions: * Content — information should be accurate, relevant, and complete * Time — information should be timely and current * Form — information should be provided at the appropriate level of detail and in the most appropriate form. More specifically, information should have certain characteristics to make it valuable.The characteristics of valuable information include being accurate, verifiable, timely, organized, meaningful, useful, and cost effective. * Accurate information is correct information. Inaccurate information often is worse than no information, because inaccurate information can lead to incorrect decisions. For example, you assume that your transcript correctly list your grades. If your transcript incorrectly reports low grades in your major courses, a potential employer might deny you an interview. * Verifiable information means that the information can be confirm by the user.For example, before relying on the c umulative GPA on your transcript, a potential employer might want to check that the GPA is calculated correctly. The potential employer can verify the accuracy of the accumulated GPA by calculating it from the individual semester GPA values. * Timely information has an age suited to its use. Your transcript, for example, has value for a potential employer only if the employer receives it in time to make a hiring decision. Although most information loses its value with time, some information, such as information on trends, gains value as time passes and more information is obtained.Your transcript, for example, gains value as you complete more coursework because it reflects your work ethic and dedication over a time period. * Meaningful information is relevant to the person who receives it. Because certain information is meaningful only to specific individuals or groups, unnecessary information should be eliminated. * Cost-effective information costs less to produce than the value of the resulting information. Most organizations periodically review the information they produce in reports to determine if the reports provide valuable information.Based on that review, the companies can determine whether to continue, scale back, or even eliminate these reports. The need for timely information can change for each business decision. Some decisions require weekly or monthly information while other decisions require daily information. Timeliness is an aspect of information that depends on the situation. In some industries such as insurance and construction, information that is a few days or weeks old can be relevant, while in other industries such as 911 centers and stock trading information that is a few minutes old can be almost worthless.Real-time information means immediate, up-to-date information. Real-time systems provide real-time information in response to query requests. Many organizations use real-time systems to exploit key corporate transactional informatio n. Real-time systems provide valuable information for supporting corporate strategies such as customer relationship management. The growing demand for real-time information stems from organizations’ need to make faster and more effective decisions, keep smaller inventories, operate more efficiently, and track performance more carefully.Nevertheless, timeliness is relative. Organizations need fresh, timely information to make good decisions. Information also needs to be timely in the sense that it meets employees’ needs, but no more. If employees can absorb information only on an hourly or daily basis, there is no need to gather real-time information in smaller increments. Many people request real-time information without understanding one of the biggest pitfalls associated with real-time information’s continual change. Imagine the following scenario: Three managers meet at the end of the day to discuss a business problem.Each manager has gathered information at different times during the day to create a picture of the situation. Each manager’s picture may be different because of this time discrepancy. Their views on the business problem may not match since the information they are basing their analysis on is continually changing. This approach may not speed up decision making, and may actually slow it down. Organizations must evaluate the timeliness of the information required for each business decision. Organizations do not want to find themselves using real-time information to make a bad decision faster.Information and knowledge are becoming the foundation for many new products and services. Information/ knowledge-intense products such as computer games require a great deal of knowledge to produce. Entire new information-based services have sprung up, such as Lexis, Dow Jones News, and America Online. These fields are employing millions of people. Information technology constitutes more than 75 percent of the invested capital in s ervice industries such as finance, insurance, and real estate. Knowledge is used more intensively in the production of traditional products as well.In the automobile industry, both design and production now rely heavily on knowledge and information technology. 1. 4 Information Systems 1. 4. 1 The Concept of System System concepts underlie the field of information systems. A system is a set of elements or components that operate together to accomplish an objective. Many examples of systems can be found in the physical and biological sciences, in modern technology, and in human society. A system (sometimes called a dynamic system) has three basic interacting components or functions: *   Input involves capturing and assembling elements that enter the system to be processed.For example, raw materials, energy, data, and human effort must be secured and organized for processing. * Processing involves transforming processes that convert input into output. Examples are a manufacturing pro cess, the human breathing process, or mathematical calculations. * Output involves transferring elements that have been produced by a transformation process to their ultimate destination. For example, finished products, human services, and management information must be transmitted to their human users. The system concept becomes even more useful by including two additional components: feedback and control.A system with feedback and control components is sometimes called a cybernetic system, that is, a self-monitoring, self-regulating system. * Feedback is data about the performance of a system. For example, data about sales performance is feedback to a sales manager. * Control involves monitoring and evaluating feedback to determine whether a system is moving toward the achievement of its goal. The control function then makes necessary adjustments to a system's input and processing components to ensure that it produces proper output.For example, a sales manager exercises control wh en reassigning salespersons to new sales territories after evaluating feedback about their sales performance. 1. 4. 2 Information Systems An information system is a specialized type of system and can be defined in a number of different ways. An information system can be defined technically as a set of interrelated information technology components that collect (or retrieve), process, store, and distribute data and information and provide a feedback/control mechanism to meet an objective.From a business perspective, information systems can be defined as a combination of hardware, software, and telecommunications networks which people build and use to collect, create, and distribute useful data and information, typically in organizational settings. Information systems support managers and workers make decisions, control operations, analyze problems, visualize complex subjects, and create new products and services. An information system contains information about an organization and it s surrounding environment.The basic activities of input, processing and output in an information system produce the information that organization need for decision-making and operations. An information system also requires feedback and control components to meet an objective (see Figure 2-4). | Figure 1-4 An information system| In an information system, input is the activity of gathering and capturing raw data from within the organization or from its external environment. For example, in producing paychecks, the number of hours worked for every worker must be collected before the pay amounts can be calculated and checks can be printed.Processing involves converting or transforming data into more meaningful form. Processing can involve making calculations, making comparisons and taking alternative actions, and storing data for future use. In the payroll example, the required processing may first involve calculating gross pay. If weekly hours worked are greater than 40 hours, overtime pay must be determined. Then deductions are subtracted from gross pay to get net pay. Output involves producing useful information in a proper form such as reports, paychecks or documents, and transferring the processed information to the user.In some cases, output from one information system can become input for another. Information systems also provide feedback/control mechanism to allow people to evaluate the performance of the systems and make necessary changes to input or processing activities. Information technologies (IT) are tools used to build information systems. Information technologies include hardware, software, database, networks, and other related components. Information systems use and integrate these technologies to meet the information needs of different users.The information technology, then, must support the goal of the information system, which is to provide accurate, timely, relevant, complete, well-formatted information that users value. Computer architecture ensures a fit between information systems and technologies. Computers are valuable tools. As technology advances and computers extend into every facet of daily living, computers have become an essential part of organizational information processing because of the power of the technology and the volume of data to be processed.When we use the term information systems, we are referring to computer-based information systems (CBIS) — organizational information systems that rely on computer technology to collect, process, store and disseminate information. A CBIS is composed of hardware, software, database, telecommunications, people, and protocols/procedures, as shown in Figure 1-5. | | | Figure 1-5 The components of an information system| In a computer-based information system, hardware consists of physical computer equipment and associated devices used to perform input, processing, and output activities.Software is a broad term given to the instructions that direct the operatio n of the hardware. Database contains all data utilized by application software. Telecommunications is the electronic transmission of signals for communications and enables organizations to link computer systems into effective networks. Information systems personnel include all the people who develop, program, operate, manage, use and maintain the information systems. Protocols are standards and guidelines used for designing and deploying information systems.Procedures include strategies, policies, methods, and rules for developing, managing and using the information systems. Although computer-based information systems use computer technology to process raw data into meaningful information, there is a sharp distinction between a computer system and an information system. Electronic computers and related software programs are the technical foundation, the tools and materials, of modern information systems. Computer systems provide the equipment and software for processing, storing and distributing information. Knowing how computer systems work is important in esigning solutions to organizational problems, but computer systems are only part of an information system. Computers and programs alone cannot produce the information a particular organization needs. To understand information systems, you must understand the problems they are designed to solve, their architectural and design elements, and the organizational processes that lead to these solutions. In other words, to be information systems literate as opposed to computer literate, you must understand the broader organization, management, and technology dimensions of information systems. 1. 4. Enterprise System Architectures System architecture refers to the arrangement of software, hardware, and tasks in an information system needed to achieve a specific functionality. To support the volume and complexity of today’s users and application requirements, information technology needs to take a fresh appro ach to enterprise system architectures by constructing smarter, more flexible environments that protect from system failures and crashes. Enterprise system architectures include the plans for how an organization will build, deploy, use, and share its data, processes, and IT assets.A unified enterprise system architecture will standardize enterprisewide hardware and software, with tighter links to the business strategy. A solid enterprise system architecture can decrease costs, increase standardization, promote reuse of IT assets, and speed development of new systems. The right enterprise system architecture can make IT cheaper, strategic, and more responsive. Enterprise system architectures are never static; they continually change. Organizations use enterprise system architects to help manage change.An enterprise system architect is a person grounded in technology, fluent in business, a patient diplomat, and provides the important bridge between IT and the business. An enterprise s ystem architect is expensive and generally receives a salary of $180,000 per year on average. Companies that have created solid enterprise system architectures are reaping huge rewards in savings, flexibility, and business alignment. Basic enterprise architectures contain three components, as shown in Figure 2-6. | | |   Ã‚   Figure 1-6 Three components of enterprise system rchitecture| Information Architecture Information architecture identifies where and how important information, like customer records, is maintained and secured. A single backup or restore failure can cost an organization more than time and money; some data cannot be recreated, and the business intelligence lost from that data can be tremendous. Three primary areas an enterprise information architecture should focus on include back up and recovery, disaster recovery, and information security. Each year businesses lose time and money because of system crashes and failures.One way to minimize the damage of a syste m crash is to have a backup and recovery strategy in place. A backup is an exact copy of a system’s information. Recovery is the ability to get a system up and running in the even of a system crash or failure and includes restoring the information backup. Organizations should choose a backup and recovery strategy that is in line with its business goals. If the organization deals with large volumes of critical information, it will require daily backups, perhaps even hourly backups, to storage servers.Deciding how often to back up information and what media to use is a critical business decision. If an organization decides to back up on a weekly basis, then it is taking the risk that, if a total system crash occurs, it could lose a week’s worth of work. If this risk is unacceptable, then the organization needs to move to a daily backup strategy. Some organizations find the risk of losing a day’s worth of work too high and move to an hourly backup strategy. Two tec hniques used to help in case of system failure are fault tolerance and failover.Fault tolerance is a computer system designed that in the event a component fails, a backup tolerance can be provided with software, or embedded in hardware, or provide by some combination. Failover is a backup operational mode in which the functions of a computer component are assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled downtime. A failover procedure involves automatically offloading tasks to a standby system component so that the procedure si as seamless as possible to the end user.Disasters such as power outages, floods, and even harmful hacking strike businesses every day. Organizations must develop a disaster recovery plan to prepare for such occurrences. A disaster recovery plan is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood. A comprehensive disaster recovery plan takes into consideration the location of the backup information. Many organizations store backup information in an off-site facility. A hot site is a separate and fully equipped facility where the company can move immediately after a disaster and resume business.A cold site is a separate facility that does not have any computer equipment, but is a place where employees can move after a disaster. Security professionals are under increasing pressure to do the job right and cost-effectively as networks extend beyond organizations to remote users, partners, and customers, and to cell phones, PDAs, and other mobile devices. Regulatory requirements to safeguard data have increased. Concerns about identify theft are at an all-time high. Hacking and other unauthorized access contribute to the approximately 10 million instances of identity theft each, according to the Federal Trade Commission.A good information architecture includes a strong information security plan, along with managing user access and up-to-data antivirus software and patches. Managing user access to information is a critical piece of the information architecture. There is little doubt that security is a top priority for business managers, regardless of the size of their company. The main focus for most managers is preventing hackers, spammers, and other malcontents from entering their networks, and they are looking to enhance their network-security-management, intrusion-detection, content-filtering, and anti-spam software.Infrastructure Architecture Infrastructure architecture includes the hardware, software, and telecommunications equipment that, when combined, provide the underlying foundation to support the organization’s goals. As an organization changes, its systems must be able to change to support its operations. If an organization grows by 50 percent in a single year, its systems must be able to handle a 50 percent growth rate. Systems that cannot adapt to orga nizational changes can severely hinder the organization’s ability to operate. The future of an organization depends on its ability to meet its artners and customers on their terms, at their pace, any time of the day, in any geographic location. The following are the five primary characteristics of a solid infrastructure architecture: 1. Flexibility: Organizations must watch today’s business, as well as tomorrow’s, when designing and building systems. Systems must be flexible enough to meet all types of business changes. For example, a system night be designed to include the ability to handle multiple currencies and languages, even though the company is not currently performing business in other countries.When the company starts growing and performing business in new countries, the system will already have the flexibility to handle multiple currencies and languages. If the company failed to recognize that its business would someday be global, it would need to red esign all its systems to handle multiple currencies and languages, not easy once systems are up and running. 2. Scalability: Scalability refers to the ability of a system to increase in size as demand warrants. If an organization grows faster than anticipated, it might all types of performance degradations, ranging from running out of storage space to a slowdown in transaction speeds.Capacity planning determines the future IT infrastructure requirements for new equipment and additional network capacity. Performing a capacity plan is one way to ensure the IT infrastructure is scalable. There are three steps you can take to meet the demands for service at your system: scale hardware vertically, scale hardware horizontally, and improve the processing architecture of the system. Vertical scaling refers to increasing the processing poser of individual components. Horizontal scaling refers to employing multiple computers to share the workload and increase the ‘footprint’ of t he installation.Improving the processing architecture is a combination of vertical and horizontal scaling, combined with artful design decisions. 3. Reliability: Reliability ensures all systems are functioning correctly and providing accurate information. Reliability is another term for accuracy when discussing the correctness of systems within the context of efficiency IT metrics. 4. Availability: High availability refers to a system or component that is continuously operational for a desirably long length of time. Availability is typically measured relative to 100 percent operational.A widely held but difficult-to-achieve standard of availability for a system is known as ‘five 9s’ (99. 999 percent) availability. Systems, however, must come down for maintenance, upgrades, and fixes. One challenge organizations face is determining when to schedule system downtime if the system is expected to operate continually. Many organizations overcome this problem by having redunda nt systems, allowing the organization to take one system down by switching over to a redundant system. 5. Performance: Performance measures how quickly a system performs a certain process or transaction.Not having enough performance capacity can have a devastating, negative impact on a business. People usually use IT metrics to measure the system architecture. Efficiency IT metrics measure the performance of the IT system including throughout, speed and availability. Effective IT metrics measure the impact of the IT system on business processes and activities including customer satisfaction, conversion rates, and sell-through increases. Application Architecture Application architecture determines how applications integrate and relate to each other.Advances in integration technology are providing new ways for designing more agile, more responsive enterprise architectures that provide the kind of value businesses need. With these new architectures, IT can build new business capabiliti es faster, cheaper, and in a vocabulary the business can understand. Web services promise to be the next major frontier in computing. Web services contain a repertoire of Web-based data and procedural resources that use shared protocols and standards permitting different applications to share data and services.The major application of Web services is the integration among different applications. Before Web services, organizations had trouble with interoperability. Interoperability is the capability of two or more computer systems to share data and resources. If a supply chain management system can share data with a customer relationship management system, interoperability exists between the two systems. Web services encompass all the technologies that are used to transmit and process information on and across a network, most specifically the Internet.A Web service is really a piece of reusable software code. A software developer can quickly build a new application by using many of t hese pieces of reusable code. For example, a ‘Deposit’ Web service for a banking system might allow customers to perform the task of depositing money to their accounts. The Web service could be used by a bank teller, by the customer at an ATM, and by the customer performing an online transaction through a Web browser. The trick to building Web service is finding the right level of granularity.An open system is a broad, general term that describes nonproprietary IT hardware and software made available by the standards and procedures by which their products work, making it easier to integrate them. The designs of open systems allow for information sharing. In the past different systems were independent of each other and operated as individual islands of control. The sharing of information was accomplished through software drivers and devices that routed data allowing information to be translated and shared between systems.Open system integration is designed to: * Allow sy stems to seamlessly share information. The sharing of information reduces the total number of devices, resulting in an overall decrease in cost. * Capitalize on enterprise architectures. This avoids installing several independent systems, which creates duplication of devices. * Eliminate proprietary systems and promote competitive pricing. Utilization of open systems allows users to purchase systems competitively. 1. 5 The Role of Information Systems in Business 1. . 1 Business Environment Business students frequently ask, â€Å"Why do we need to study information technology? † The answer is simple: Information technology is everywhere in business. Information technology plays a critical role in reducing costs, improving productivity and generating growth by facilitating communication and increasing business intelligence. Information technology is supplying the foundation for new business models, new business processes, and new ways of distributing products, services and know ledge.Companies are relying on information technology and telecommunications to conduct more of their work electronically, seamlessly linking factories, offices, sales forces, managers, customers, and suppliers around the globe. Understanding information technology provides great insight to anyone learning about business. Business students who understand technology have an advantage in business. | | | Figure 1-7 Seven major factors that affect today's business environment| Before discussing the role of information systems in organizations, let's xamine some of the most important factors shaping today's new business. These and other factors have altered the environment of business and posed new challenges to business firms and their management. To you, these factors can be translated into a substantial career opportunity, if you understand them and prepare yourself through education to take advantage of them. Figure 2-7 lists seven important factors including globalization, competiti on, information as a key resource, organization restructuring, end-use computing, electronic commerce, and virtual workplace.Emergence of the global economy means that business today is global business. The success of firms today and in the future depends on their ability to manage business globally. Business globalization greatly enhances the value of information systems to organizations and offers new opportunities to business. Organizations need powerful information systems and communications systems to conduct trade and manage businesses on a global scale. Obviously, globalization has increased competition. Information technology is another reason competition is heating up.Globalization and information technology bring new threats to domestic business firms. Customers now can use global communication and information systems to shop in a worldwide marketplace, obtaining price and quality information reliably 24 hours a day. To become competitive participants in international mark ets, firms need powerful information and communication systems. In the information age, information is so important that businesses must have information to be successful. The need to capture and record information about what customers want has led to many databases and data warehouses.These databases and data warehouses contain valuable information to help firms to throb with the pulse of marketplace. These databases and data warehouses of great economic value are based on new information technologies. Today, many organizations are restructuring in a variety of ways. The explosive growth in computing power and networks is turning organizations into networked enterprises, which allow organizations to redesign and reshape their structures, scope of operations, control mechanisms, work practices, work flows, products, and services.Many organizations have reduced the number of levels in their organizational hierarchies. In these flatter organizations, employees are empowered to make mo re decisions than in the past. Contemporary information technology can make more information available to line workers so they can make decisions that previously had been made by managers. Companies can use information and communications technologies to organize in more flexible ways, increasing their ability to respond to changes in the marketplace, to take advantage of new business opportunities, and to reduce the cost of obtaining products and services from outside the firm.Many organizations use information technology to recast the management process, providing powerful new capabilities to help managers plan, organize, lead, and control. One important trend is using information technology for enterprise resource planning. For example, more and more firms are using the Enterprise Resource Planning (ERP) system. The ERP system is a business information system that integrates all facets of the business, including planning, purchasing, manufacturing, sales, finance and human resourc es.The ERP system creates an integrated database to coordinate business activities within and across functional areas by sharing consistent information, and automates many business processes. Information and telecommunications technologies are creating new ways of conducting business electronically both inside and outside the firm. The Internet is emerging as the primary technology platform for electronic commerce. Electronic commerce is the computerized process of buying and selling goods and services through the Internet, networks, and other digital technologies.The Internet links millions of organizations and individuals into a single network, creating the foundation for a vast electronic marketplace. An electronic market is an information system that links together many buyers and sellers to exchange information, products, services, and payments. Many organizations are increasingly apply Internet technology to facilitate the management and coordination of other business processe s within the firm — publishing company's policies and work procedures, scheduling work flow, reviewing production plan, revising design documents, and so on, which is called electronic business.Information and telecommunications technologies have eliminated distance as a factor for many types of work in many situations. Many companies are using networked information systems to coordinate their geographically distributed capabilities. Works can be done wherever the employees are located. The term virtual workplace describes a technology-enabled working arrangement where work can be done at virtually any geographical location as along as the work site is linked to one or more of the firm's fixed locations by some type of telecommunications capability.Some companies are even using networked information systems to coordinate with other organizations such as suppliers, distributor, or even competitors as virtual organizations to create and distribute new products and services with out being limited by traditional organizational boundaries or physical location. Intensive use of information technology in business firms, coupled with equally significant organizational redesign, has created a new type of business: the fully digital firm. The digital firm can be defined along several dimensions.A digital firm is one where nearly all of the organization's significant business relationships with customers, suppliers, and employees are digitally enabled and mediated. Core business processes are accomplished through digital networks spanning the entire organization or linking multiple organizations. Key corporate assets–intellectual property, core competencies, and financial and human assets–are managed through digital means. In a digital firm, any piece of information required to support key business decisions is available at anytime and anywhere in the firm.Digital firms sense and respond to their environments far more rapidly than traditional firms, g iving them more flexibility to survive in turbulent times. Digital firms offer extraordinary opportunities for more global organization and management. By digitally enabling and streamlining their work, digital firms have the potential to achieve unprecedented levels of profitability and competitiveness. A few firms, such as Cisco Systems, Dell Computer Corporation or Google, are close to becoming fully digital firms, using the Internet to drive every aspect of their business.In most other companies, a fully digital firm is still more vision than reality but this vision is driving them toward digital integration. For today's managers, information technology is not simply a useful handmaiden, an enabler, but rather it is the core of the business and a primary management tool. There are four major systems that help define the digital firm. Supply chain management systems seek to automate the relationship between suppliers and the firm to optimize the planning, sourcing, manufacturing, and delivery of products and services.Customer relationship management systems attempt to develop a coherent, integrated view of all the relationships a firm maintains with its customers. Enterprise systems create an integrated enterprise-wide information system to coordinate key internal processes of the firm, integrating data from manufacturing and distribution, sales, finance, and human resources. Finally, knowledge management systems seek to create, capture, store, and disseminate firm expertise and knowledge.Collectively, these systems represent the areas where corporations are digitally integrating their information flows and making major information system investments. For example, building only cars that customers order and building them in record time has been every automaker's dream. Now, it appears that Toyota Motor Corporation is coming close to making that dream come true. Toyota is using new software tools and Internet technology to drive its processes for designing a nd manufacturing automobiles and to integrate them with customers and suppliers.The company is moving toward a digital firm organization. In many organizations, end users are developing a growing percentage of information systems with little or no formal assistance from technical specialists. This phenomenon is called end-user computing. Information technology education programs at both the college and pre-college level and easy-to-use of both computer hardware and software have made more and more managers and employees have good computing knowledge and skills.End user computing involves you, as a future knowledge worker, in more than just developing a budget using spreadsheet software, creating a presentation using presentation graphics software, or using a system that someone else developed. It requires you to take an active role in developing systems that support your specific needs or the needs of a team. 1. 5. 2 Functional Areas in Business Understanding information technology begins with gaining an understanding of how businesses function and IT’s role in creating efficiencies and effectiveness across the organization.Typical businesses operate by functional areas. Each area undertakes a specific core business function. These functional areas are interdependent (see Figure 2-8). For example, sales must rely on information from operations to understand inventory, place orders, calculate transportation costs, and gain insight into product availability based on production schedules. For an organization to succeed, every department or functional area must work together sharing common information. Information technology can enable departments to more fficiently and effectively perform their business operations. | Figure 1-8 Common functional areas in business| To perform the MIS function effectively, almost all organizations today, particularly large and medium-sized ones, have an internal IT department. The plans and goals of the IT department must al ign with the plans and goals of the organization. Information technology can enable an organization to increase efficiency in manufacturing, retain key customers, seek out new sources of supply, and introduce effective financial management.Information technology is a relatively new functional area, having been around formally in most organizations only for about 40 years. Job titles, roles, and responsibilities often differ from organization to organization. Most organizations maintain positions such as chief executive officer (CEO), chief financial officer (CFO), and chief operations officer (COO) at the strategic level. Recently there are more IT-related strategic positions such chief information officer (CIO), chief technology officer (CTO), chief security officer (CSO), chief privacy officer (CPO), and chief knowledge officer (CKO).The CIO is responsible for overseeing all uses of information technology and ensuring the strategic alignment of IT with business goals and objective s. The CTO is responsible for ensuring the throughput, speed, accuracy, availability, and reliability of an organization’s information technology. The CSO is responsible for ensuring the security of IT systems and developing strategies and IT safeguards against attacks from hackers and viruses. The CPO is responsible for ensuring the ethical and legal use of information within an organization.The CKO is responsible for collecting, maintaining, and distributing the organization’s knowledge. The CKO designs programs and systems that make it easy for people to reuse knowledge. All the above IT positions and responsibilities are critical to an organization’s success. While many organizations may not have a different individual for each of these positions, they must have leaders taking responsibility for all these areas of concern. It is not always easy for managers to make the right choices when using IT to support business initiatives.Most managers understand their business initiatives well, but are often at a loss when it comes to knowing how to use and manage IT effectively in support of those initiatives. Managers who understand what IT is, and what IT can and cannot do, are in the best position for success. Individuals anticipating a successful career in business must understand information technology including: * Information technology basics. * Roles and responsibilities in information technology. * Measuring information technology’s success. 1. 5. 3 The Role of Information Systems in BusinessIn 2007, American business invested over $1 trillion in information systems hardware, software and telecommunications equipment, more than half of all capital investment in the United States. In addition, they spent another $250 billion on business and management consulting and services, much of which involves redesigning firms’ business operations to take advantage of these new technologies. More than half of all business investment in the United States each year involves information systems and technologies. In 2007, more than 40 million U. S. usinesses had cot-com Internet sites registered. E-commerce and Internet advertising are booming. Companies today manage their operation and inventories in near real time in order to reduce their production and overhead costs and get to market faster. What makes information systems so essential today? Why are businesses investing so much in information systems and technologies? They do so to achieve the following six important business objectives: 1. Operational Excellence: Businesses continuously seek to improve the efficiency of their operations in order to achieve higher profitability.Information systems and technologies are some of the most important tools available to managers for achieving higher levels of efficiency and productivity in business operations, especially when coupled with changes in business practices and management behavior. 2. New Products, Services and Business Models: Information systems and technologies are a major enabling tool for firms to create new product and services, as well as entirely new business models. A business model describes how a company produces, delivers, and sells a product or service to create wealth. . Customer and Supplier Intimacy: Information systems can help a business know its customers and serves them well, the way they want to be served, the customers generally respond by returning and purchasing more. This raises revenues and profits. Likewise with suppliers: the more a business engages its suppliers, the better the suppliers can provide vital inputs. This lowers costs. 4. Improved Decision Making: Many business managers operate in an information fog bank, never really having the right information at the right time to make an informed decision.Instead, they rely on forecasts, best guesses, and luck. The result is over- or underproduction of goods, misallocation of resources, and poor response t imes. Information systems and technologies have made it possible for managers to use real-time data from the marketplace when making decisions. 5. Competitive Advantage: Information systems and technologies can help a business achieve a competitive advantage: doing things better than its competitors, charging less for superior products, and responding to customers and suppliers in real time. 6.Survival: Business firms invest in formation systems and technologies because they are necessities of doing business. Sometimes these necessities are driven by industry-level changes. Many federal and state statutes and regulations create a legal duty for companies to retain records. Firms turn to information systems and technologies to provide the capability to respond to these information retention and reporting requirements. Information systems directly affect how top management draw up long-tern planning, how managers make decisions, and what products and services are produced and how.In f act, information systems play a strategic role in the life of the firm. Figure 2-9 illustrates the relationship between businesses and information systems. | Figure 1-9 Growing interdependence between businesses and information systems| There is a growing interdependence between business strategy, organizational structure, operation rules and procedures, and production on the one hand, and IT infrastructure, IT strategy and information system management on the other. A change in any of these components often requires changes in other components.Existing information systems can act as a constraint on businesses. Often, what the organization plans to do in next five years depends on what its information systems will permit it to do. Developing new products and service, increasing market share, becoming the high-quality or low-cost producer, providing better customer service, and increasing employee productivity depend more and more on the scope and quality of information systems in th e organization. Businesses are not in the business of processing information for its own sake. Instead they rocess information in order to improve organizational performance and produce profits. From a business perspective, an information system is an important instrument for creating value for the organization. There are many ways in which information systems can contribute to firm value, including increasing the firm's return on its investments, enhancing the company's strategic position, or increasing the market value of the firm's stock. Information processing activities support management decision making, enhance the execution of business processes and as a result increase business value.Every business has an information value chain, shown in Figure 2-10, in which raw information is systematically acquired, and then transformed through various stages that add value to that information. From this perspective, information systems are part of a series of value-adding activities fo r acquiring, transforming, and distributing information that managers can use to improve decision making, enhance organizational performance, and ultimately increase firm profitability. | Figure 1-10 Business information value chain|

Friday, November 8, 2019

Seven Dimensions of Culture Essay Example

Seven Dimensions of Culture Essay Example Seven Dimensions of Culture Essay Seven Dimensions of Culture Essay In 1998, management consultants Trompenaars and Hampden-Turner published their â€Å"Seven Dimensions of Culture† model to help explain national cultural differences in organisations and to show how managing these differences in a heterogeneous business environment is a major challenge for international managers. Trompenaars and Hampden-Turner gathered data over ten years using a method that relied on giving respondents dilemmas or contrasting tendencies. Each dilemma consisted of two alternatives that were interpreted as indicators for basic attitudes and values. The questionnaire was sent to over 15,000 managers in 28 countries. At least 500 usable responses per country were received, enabling the two authors to make substantiated distinctions between national cultures. The two consultants distinguished seven connected processes formulated as dilemmas. A culture distinguishes itself from others by ‘preferring’ one side of a dilemma’s continuum. The seven, universal dimensions of cultures are: 1. UNIVERSALISM versus PLURALISM â€Å"What is more important – rules or relationships? † The degree of importance a culture assigns to either the law or to personal relationships. In a universalistic culture, people share the belief that general rules, codes, values and standards take precedence over the needs and claims of friends and other relationships. In a pluralistic culture, people see culture in terms of human friendship and intimate relationships. While rules do exist in a pluralistic culture, they merely codify how people relate to one another. 2. INDIVIDUALISM versus COMMUNITARISNISM â€Å"Do we function as a group or as individuals? † The degree to which people see themselves function more as a community or more as individuals. In a principally individualistic culture, people place the individual before the community. This means that individual happiness, fulfilment and welfare prevails and people take their own initiative and take care of themselves. In a principally communitarian culture, people place the community before the individual. Thus, it is the responsibility of the individual to act in ways which serve society. In doing so, individual needs are automatically attended. 3. SPECIFIC versus DIFFUSE â€Å"How far to we get involved? † The degree to which responsibility is specifically assigned or is diffusely accepted. In a specific culture, people first analyse the elements individually and then put them together, the whole is the sum of its parts. People’s lives are divided accordingly and, only a single component can be entered at a time. Interactions between people are very well-defined. Specific individuals concentrate on hard facts, standards and contracts. A diffusely oriented culture starts with the whole and sees individual elements from the perspective of the total. All elements are related to one another. Relationships between elements are more important than individual elements. 4. AFFECTIVITY versus NEUTRALITY Do we display our emotions? † The degree to which individuals display their emotions. In an affective culture, people display their emotions and it is not deemed necessary to hide feelings. However, in a neutral culture, people are taught not to display their feelings overtly. The degree to which feelings become manifested is therefore minimal. While emotions are fel t, they are controlled. 5. INNER DIRECTED versus OUTER DIRECTED â€Å"Do we control our environment or work with it? † The degree to which individuals believe the environment can be controlled versus believing that the environment controls them. In an inner-directed culture, people have a mechanistic view of nature; nature is complex but can be controlled with the right expertise. People believe that humans can dominate nature, if they make the effort. In an outer-directed culture, people have an organic view of nature. Mankind is viewed as one of nature’s forces and should therefore live in harmony with the environment. People therefore adapt themselves to external circumstances. 6. ACHIEVED STATUS versus ASCRIBED STATUS â€Å"Do we have to prove ourselves to receive status or is it given to us? The degree to which individuals must prove themselves to receive status versus status simply given to them. In a culture with achieved status, people derive their status from what they have accomplished. Achieved status must be proven time and time again and status will be given accordingly. In a culture with ascribed status, people derive their status from birth, age, gender or wealth. Here status is not based on achievemen t but it is accorded on the basis of the person’s being. 7. SEQUENTIAL TIME versus SYNCHRONIC TIME â€Å"Do we do things one at a time or several things at once? The degree to which individuals do things one at a time versus several things at once. Cultures developed their own response to time. Time orientation has two aspects: the relative importance cultures assign to the past, present and future, and their approach to structuring time. In a sequential culture, people structure time sequentially and do things one at a time. In a synchronic time culture, people do several things at once, believing time is flexible and intangible. Past-oriented cultures A culture that is oriented towards the past views the future as a repetition of previous events and experiences. Characteristics include: respect for ancestors and collective historical events. Present-oriented cultures A culture primarily directed to the present does not attach great value to the past or future. Instead, individuals are directed by the daily demands of every day life. Future-oriented cultures A culture concentrated on future prospects and does not deem the past as significant for future events. Planning is a major activity among individuals in this culture. The seven dilemmas help managers better understand the ‘other side’ e. g. when trying to make trans-national projects or mergers work. Better understanding reduces the number of cultural driven misunderstandings and conflicts thereby reducing coordination costs. The model helps marketers understand how consumers in different countries behave differently towards the same product. pros: Trompenaars and Hampden-Turner provided a tool to explain how national culture differs and how culture can be measured. Their research showed that cultural differences matter and that reconciling cultural differences can lead to competitive advantage to companies in consolidating / globalising industries. Trompenaars and Hampden-Turner’s model gives employees who deal with cross-cultural relations a tool/context to better understand value sets and behaviours. Trompenaars’ research shows that the way business is conducted in one part of the world is different from the way it is done in another. Culture is an important aspect in doing international business. For example, Office Depot has learned that Japanese customers do not like to buy their supplies in large, well-stocked stores that offer discount prices. Japanese prefer stores where service is personal and are willing to pay higher prices for this. cons: The model fails to recognise the influence of personal characteristics on behaviour. The model distinguishes the differences between cultures, but does not provide recommendations on how to work with specific cultures. Additional dilemmas may be added to the seven original dimensions of culture. No assurance can be given that this list is complete. Trompenaars and others such as Hofstede emphasised that companies should acknowledge the differences between the cultures in which they operate. However, other authors including Ohmae (Borderless World) and Levitt (Globalisation of Markets) argue that national borders are diminishing and that the world should be seen as a whole and not made up of different countries with different cultures. Professor Trompenaars has studied how people in specific countries resolve dilemmas. After analyzing problem resolution behaviors, Dr. Trompenaars has identified 7 basic dimensions for culture. International trade consultants and lawyers consider these cultural dimensions when designing sales strategies where buyers and sellers originate from different cultures. This is particularly true for emerging markets unaccustomed to dealing with businesspersons from so-called more developed countries. Below is a brief summary of the seven cultural dimensions. Achievement vs. Ascription In an achievement culture, people are accorded status based on how well they perform their functions. High achievers are given status in achievement-oriented countries including Austria, Switzerland, the United Kingdom and the United States. Achievers must continue to prove their worth, as status is accorded based on their actions. In an ascription culture, status is attributed based on who or what a person is. This is based on age, gender and social connections. Individualism vs. Communitarianism People make their own decisions and achieve success alone in highly individualistic countries including Canada, the United States, the United Kingdom and France. Emphasis is on personal responsibility and decision-making, and negotiations are made on the spot. Communitarianism is a culture like Japan that places the community before the individual. Success is achieved in groups, decisions are referred to committees and groups jointly assume responsibilities. Internal vs. External In an internalistic culture like the United States, people believe that what happens to them is their own doing. Many Asian countries have an external culture in which the environment shapes their destiny. Because they don’t believe they are in full control of their destinies, often externalistic people adapt to external circumstances. Neutral vs. Emotional In neutral cultures like Japan and the United Kingdom, emotions are held in check. People don’t show their feelings. In an emotional culture, feelings are expressed naturally and openly. People smile a great deal, talk loudly when excited and greet each other with enthusiasm. Mexico, Netherlands and Switzerland are high-emotion countries. Specific vs. Diffuse In what is called a specific culture, individuals are open to sharing a large public space with others and a small private space they guard closely and share with only friends and associates. Specific cultures like Austria, Switzerland, the United Kingdom and the United States show a strong separation between work and private life. Invitations to public spaces are common. A diffuse culture features similarly sized public and private spaces. Like most introverts, diffuse culture people guard both spaces carefully, because entry into public space also affords entry into private space. China, Spain and Venezuela are examples of diffuse cultures where work and private life are closely linked but intensely protected. Time Orientation In sequential cultures like the United States, people tend to do one activity at a time. Appointments are strictly kept, with a strong preference for following plans. In synchronous cultures like France and Mexico, people usually do more than one activity at a time. Appointments are approximate, subject to change at any moment. Universalism vs. Particularism Universalistic countries focus more on formal rules than relationships. Nations characterized by high universalism believe that their ideas and practices can be applied worldwide without modification. Australia, Germany, Sweden and the United Kingdom are universalistic countries. America is also highly universalistic, which explains why U. S. multinationals repeatedly ignore relationships in a foreign culture. For example, Starbucks unsuccessfully launched its coffee shop in China’s Forbidden City while Germans rejected Wal-Mart’s standard big box stores. Particularistic countries place more emphasis on relationships than rules. Countries that practise high particularism include China, Indonesia and Venezuela. Particularistic peoples believe that circumstances dictate how ideas and practices are applied. Therefore, ideas and practices cannot be applied the same everywhere. References This article presents independent insights based on research from International Management, Culture, Strategy and Behavior (6th edition, Hodgetts-Luthans-DOH) and Trompenaars’s Seven Dimensions of Culture.