Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
75 Cards in this Set
- Front
- Back
What Are the Functions of Sales and Marketing Applications
|
Lead Generation
Lead-Tracking Applications Customer Management Sales Forecasting Product and Brand Management |
|
Lead-Generation Application
|
Mailings
Emailings Web Site |
|
Lead-tracking Application
|
-Record leads
-Track product interests -Maintain history of contacts [app maintains customer name and contact data, the customer's product interests, past purchases, and a history of all contacts with the customer] |
|
Customer Management
|
-Maintain customer contact and order history
-Maintain and report credit status -Track product interests |
|
Sales Forecasting
|
-Record individual sales projections
-roll up sales projections into district, region, national, and international -track variances over time |
|
Product and Brand Management
|
-obtain sales results from order processing or receivables applications
-compare results to projections -Assess promotions, advertising and sales channels -assess product success in market-segments -manage product life cycle |
|
What are the Functions of Operations Applications?
|
- Order entry
-Order Management -Finished-goods inventory management -Customer service |
|
Order Entry
|
-obtain customer data
-verify credit -record payment method -enter order for processing |
|
Order Management
|
-track order through fulfillment
-schedule shipping -handle exceptions -inform customers of order status |
|
Finished-Goods Inventory Management
|
- control inventory
-manage inventory -support/evaluate policy |
|
Customer Service
|
-Answer questions on orders and product use
-Self-help via Web increasingly common |
|
What are the Functions of Manufacturing Applications
|
-Inventory
-Manufacturing Planning -MAnufacturing Scheduling -Manufacturing Operations |
|
Inventory
|
- control inventory
-manage inventory -support/evaluate policy -allocate inventory to raw materials, goods-in-process, and finished goods |
|
Manufacturing Planning
|
- create and maintain bill of materials
-create and maintain manufacturing requirements for equipment, personnel, and facilities |
|
Manufacturing Scheduling
|
- Create and maintain master production schedule (push)
-Integrate manufacturing signals (kanban) into production schedule (pull) -produce materials requirements plans and schedules (MRP) -produce equipment, personnel, and facility plans and schedules (MRP II) |
|
Manufacturing Operations
|
-Schedule and control machines in accordance with production schedules
-Schedule and control manufacturing processes in accordance with production schedules |
|
What are the Functions of Human Resource?
|
-Recruiting
-Compensation -Assessment -HR planning -Development and training |
|
Recruiting
|
- job postings
-resume processing -hiring procedures |
|
Compensation
|
- payroll
-vacation, health, and benefits -retirement plans and stock options -employee contributions |
|
Assessment
|
-job requirements
-performance evaluations |
|
HR Planning
|
-standards, including job classification, skill requirements, and pay standards
-staff planning |
|
DEvelopment and training
|
- development programs
-training classes |
|
What are the Functions of Accounting Applications
|
-treasury management
-cash management -accounts payable -accounts receivable -budgeting -cost accounting -financial reporting -general ledger |
|
TReasury Management
|
- manages retained earnings, dividends payments, and long-term financing (equity offerings and borrowing)
|
|
Cash Management
|
Helps the company manage inflows and outflows of cash; prepares company's cash budget; arranges for any needed external financing
|
|
Accounts Payable
|
Tracks amounts that the company owes to its suppliers. Schedules payments
|
|
Accounts Receivable
|
Tracks amounts owed to the company by its customers. Manages collections
|
|
Budgeting
|
Assists management in quantifying goals for revenues and expenses; tracks progress toward meting those goals
|
|
Cost Accounting
|
Determines, for internal users, how much it costs the company to provide specific products or services
|
|
Financial Reporting
|
Keeps records and reports financial results to investors, creditors, and other external users (e.g. government regulation)
|
|
General Ledger
|
Shows balances in all asset, liability, and equity accounts
|
|
Types of Functional IS
|
- Sales and Marketing
-Operations -Manufacturing -Human Resources -Accounting |
|
Functional IS Issues
|
- Data duplication, data inconsistency
-disjointed processes -limited information and lack of integrated information -isolated decisions lead to organizational inefficiencies -increased expense |
|
Cross-Functional IS
|
Broadens the scope of the project to design processes that cross departmental boundaries
|
|
Customer Relationship Management (CRM) Applications
|
Tracks all interactions with the customer from prospect through follow-up service and support. CRM applications integrate all of the primary business activities of Porter's Value Chain Model. Major Component's Are: Solicitation, Lead Tracking (presale),
Relationship Management (postsale) |
|
Solicitation
|
-generate prospects via messages to target market
-use email, web sites, and other IS messaging media -support direct mail, catalog, other traditional promotion |
|
Lead Tracking (presale)
|
-track sales leads
-track customer responses and contacts -prioritize responses to maximize new customer revenue |
|
Relationship Management (postsale)
|
-maximize the value of the existing customer base
-sales management applications: prioritize customers using purchase history. increase sales of existing customers. Focus reselling on high-value customers. Win back lost high-value customers. -Customer Support: Manage orders, track customers' problems and problem resolutions. Prioritize responses according to customer value. Gather data for product improvement |
|
Enterprise Resource Planning (ERP) Applications
|
Provide even more integration than CRM. Integrates the primary value chain activities with human resources and accounting. Ultimate in cross function systems. Primary ERP users are manufacturing.
|
|
ERP Characteristics
|
ERP takes a cross-functional, process view of the entire organization. ERP applications include a comprehensive set of inherent processes for all organizational activities. Set is like a "process blueprint" and documents each process with diagrams that use standardized symbols. ERP based on formally defined procedures and organizations muct adapt their processing to the ERP blueprint.
|
|
Benefits of ERP
|
- efficient business processes
-inventory reduction -lead-time reduction -improved customer service -greater, real-time insight into organization -higher profitability |
|
Downfalls of ERP
|
-costly
-process of moving from separated, functional applications to an ERP system is difficult, challenging and can be slow |
|
How is an ERP System Implemented
|
-Determine current and ERP models
-Remove inconsistencies -Implement the ERP application |
|
Inherent Processes
|
When an organization licenses a cross-functional app, the processes for using the apps are built into the system are inherent processes.
|
|
Data Warehouse
|
The purpose of it is to extract and clean data from operational systems and other sources, and to store and catalog that data for processing by BI tools. Can include external data purchased from outside sources. Ex. customer credit data.
|
|
Data Mart
|
Data collection that is created to address the needs of a particular business function, problem, or opportunity.
|
|
Analytical Data
|
Sum, count, averages, etc of data
|
|
Operational Data
|
?
|
|
Operational Data and Issues
|
?
|
|
Data Warehouse Measure
|
the data item of interest. It is the item that is to be summed or averaged or otherwise processed. Ex. total sales, avg sales, avg cost
|
|
Date Warehouse Dimension
|
Characteristic of a measure. Ex. purchase data, customer type, customer locations, and sales region
|
|
Managerial/Analytical Data
|
yearly, quarterly, monthly numbers
|
|
Business Intelligence Reporting
|
Integrate data from multiple sources and they process that data by sorting, grouping, summing, averaging and comparing. Systems format the results into reports and deliver those reports to users. Reporting systems improve decision making by providing the right information to the right user at the right time.
|
|
Outsourcing
|
the hiring of another organization to perform a service.
|
|
Benefits of Outsourcing
|
- Management Advantages:
Obtain Expertise Avoid management problems Free management time -Cost reduction Obtain part-time services Gain economies of scale -Risk Reduction Cap financial risk Improve quality Reduce implementation risk |
|
Outsourcing Options
|
Some organizations outsource the acquisition and operation of computer hardware. Acquiring licensed software is a form of outsourcing. Rather than develop software in-house, and organization licenses it from another vendor. Another possible outsourcing app alternative is outsource an entire app. Ex. Oracle attained prominence by outsourcing the entire payroll app. A web storefront is another form of app outsourcing. Ex. Amazon.com provides a Web storefront for product vendors and distributors who choose not to develop their own Web presence. SOme organizations choose to outsource an entire business function. Ex. Marriott International chose Hewitt Associates to handle its HR needs for the next 7 years.
|
|
Outsourcing Types
|
-Hardware
-Software -Data -Procedures -People |
|
Risks of outsourcing
|
-Loss of Control:
vendor in driver's seat technology direction potential loss of intellectual capital product fixes, enhancements in vendor's priority vendor management, direction, or identity changes CIO superfluous -Benefits outweighed by long-term costs: High unit costs, forever. Paying for someone else's mismanagement in time, outsource vendor is de facto sole source May not get what you pay for but you don't know it -No easy exit: Critical knowledge in minds of vendors, not employees Expensive and risky to change vendors |
|
Supply Chain
|
A network of organizations and facilities that transforms raw materials into products delivered to customers Ex. Whataburger
Raw Materials Supplier--?Manufacturer-->Distributor-->Retailer-->Consumer |
|
Business-to-Business (B2B)
|
Describes commerce transactions b/w businesses, such as between a manufacturer and a wholesaler, or between and wholesaler and a retailer. High volume transactions. Ex. and automobile manufacturer makes several B2B transactions such as buying tires, glass for windscreens, and rubber hoses for its vehicles.
|
|
Business-to-Consumers (B2C)
|
Sale of the finished product to the end customer. Ex. The final transaction, a finished vehicle sold to the consumer is a single B2C transaction. EX2. A person buying a pair of shoes from a retailer
|
|
Business-to-Government (B2G)
|
A derivative of B2B marketing and often referred to as a market definition of "public sector marketing" which encompasses marketing products and services to various government levels--including federal, state and local--through integrated marketing communications techniques such as strategic pr, branding, marcom, advertising, and web-based communications
|
|
Supply Chain Performance
|
Usually, the profitability of the supply chain increases if one or more of the organizations operates at less than its own max profitability.
|
|
Supply Chain Strategy
|
-Facility
-Inventory -Transportation -Information |
|
FAcilities
|
location, size, operations methodology
|
|
Inventory
|
size, inventory management
|
|
TRansportation
|
in-house/outsources, mode, routing
|
|
information
|
purpose, availability means
|
|
Bullwhip Effect
|
A phenomenon in which the variability in the size and timing of orders increases at each stage of the supply chain, from customer to supplier.
|
|
CNN: As scope of e-mail hack grows, should you be worried
|
• The world’s largest “permission-based” e-mail marketing company, Epsilon, reported that someone hacked into its computer system and stole and unknown number of e-mail addresses and names.
• The scope of this breach is potentially huge and has continued to grow with companies like TiVo, JPMorgan, Chase, and Capital One saying their customers have been affected. • Epsilon sends 40 billion emails/year on behalf of 2500 clients. • Worst that may come of it is a sneakier and more sinister version of spam • Little fear that identities could stolen and bank accounts drained • Experts worry about “targeted phishing” or “spear phishing”. Refer to fake e-mails that try to look real because the scammer knows something about you |
|
Yahoo! Dish expands its scope with Blockbuster win
|
• Dish Network Corp won Blockbuster Inc in a bankruptcy auction for $320 million, further broadening its business beyond satellite TV and setting up a possible showdown with Netflix
• Dish: 2nd largest US satellite TV company trumped at least 3 other bidders • Deal includes more than 1700 Blockbuster stores, gives it new ways to market its services • Gives Dish the rights Blockbuster had to stream movies over the Internet, Blockbuster brand name, and customer lists • Dish can transition B from a retail to a streaming model so you have a Netflix-like offering • Could help transform company into a major provider of on-demand video through its satellite system and eventually over a wireless network for handheld devices • Mail-order and digital competitors have destroyed blockbusters business • Dish is expected to continue to close Blockbuster stores |
|
Information Week: Data, data Everywhere
|
Walmart uses HUGE databases
|
|
VentureBeat: Cocoon promises a safe, spam-free, private way to browse
|
• Virtual World Computing promises browsing the web without having to worry about viruses, spam, and spyware. You can log in to see your fav web sites from any location, without being tracked with its new Cocoon browser plug-in.
• Works with Firefox and other browsers to effectively unplug your computer from the internet and route you instead through Cocoon’s servers. Those servers filter out the bad stuff and let you surf the web through Cocoon’s own connections as fast as possible • Websites can’t spy on you. They see only Cocoon, not your computer, as if you were using an “in-private browsing” feature. • Everything you do is encrypted. Your browsing history, personal info, and passwords on web sites are all protected • Cocoon tweaks your browser. Cocoon then creates “mail slots” for you, concocting a random and disposable email address for every site that you want to log into on a regular basis. Cocoon will automatically fill out a form when you sign up, substituting a Cocoon-generated email address for your actual email address. • Hackers are only able to see cocoon address |
|
CNN: Rent a movie-on your Facebook page
|
• Warner Bros Digital Distribution said it will offer The Dark Knight for rental through its Facebook page
• More movie titles will be available for rental or purchase over the coming months • Rentals cost 30 Facebook credits, or $3 and users can watch the movie up to 48 hours after purchase • Facebook continues to function normally during movie-watching • Lucrative deal for FB which receives 30% cut of all revenue from Facebook Credits • If more studios follow suit, it could put FB squarely in competition with streaming-video behemoth Netflix, as well as other major players • Amazon announced free streaming video for Prime customers. Redbox said its planning its own streaming service. Hulu continues building its audience. Apple and Google offer streaming video on their connected tv services. • Netflix is currently maintaining the lion’s share of the mkt, though FB’s massive user base and social features could be a threat |
|
Fast Company: American Express Invests in PayFone, Powers Mobile Payments Plan
|
Payfone uses the cellphone network itself to guarantee that a mobile payment is valid, can be funded, and isn't fraudulent. Therefore, its faster and more resilient than using a modern-style version. Payfone also ties unique phone ID data to the transactions, along with location data, to doubly check client and vendor identity and precent fraud. It imagines its service can prevent theft, and thus lower fees. Can eventually link you cell number to a variety of credit and debit card accounts and then pay swiftly and securely at the checkout in stores.
|