Professional Documents
Culture Documents
W42
Porter and Millar (1985) concluded that competition has been affected by IT in three vital ways. First, industry structure and the rules of competition have changed as a result of new information technologies. Second, organizations have outperformed their competitors by using IT. Finally, organizations have created new businesses by using IT. Based on this conclusion, Porter and Millar developed a ve-step framework that organizations can use to exploit the strategic opportunities IT creates (see A Closer Look W3.2.1). Note that almost exactly the same effects are observed in e-commerce (Choi and Whinston, 2000; Turban et al., 2002). Porter and Millar have developed a matrix that indicates the high and low values of the interrelated information. They use this matrix to identify the role that information plays in product offerings, as well as the process used to deliver the product to customers. The framework enables managers to assess the information intensity in their businesses. Information intensity measures the level of information used in supporting business processes. The basic idea of the framework is to determine how specic IT applications can enhance various links in the value chain, whether in internal operations or in the external marketplace, and thus enable the business to achieve a strategic advantage. The framework relates the information intensity of a products value chain to the information content of the product. A number of companies have used Porter and Millars model successfully. Wiseman and MacMillan (1984) revised Porters framework by adding four defense strategies, innovation, growth, alliance, and time, to Porters three strategies. They then created a matrix in which the seven defense strategies are the rows and the columns are suppliers, customers, and competitors. The cells in the matrix can direct IT applications. For example, in the cell of row differentiation and column customer, one can utilize Web-based mass customization. Thus, each cell in the matrix identies the available IT strategies for an external industry force.
W43
Search-Related Costs
Bargaining Power
FIGURE W3.2.1 Bakos and Treacys causal model of competitive advantage. (Source:
Information Technology for Corporate Strategy, MIS Quarterly, June 1986. 1986 by the Management Information Systems Research Center (MISRC) by the University of Minnesota and the Society for Information Management (SIM). Reprinted by permission.)
Switching Costs
Competitive Advantage
An important implementation question is how to nd applications for the cells in this matrix. An example of a company that used this framework to nd applications is GTE Corporation. The company employed a brainstorming procedure and identied more than 300 ideas for strategic applications of IT. (For other suggestions about how to nd IT-based ideas, see Bergerson et al., 1991; Boynton et al., 1993; and Callon, 1996.) Bakos and Treacy (1986) proposed a causal framework of competitive advantage. According to their model, the two major sources of Porters competitive advantage are bargaining power and comparative efciency (see Figure W3.2.1). These sources of competitive advantage are caused by ve specic items: searchrelated costs, unique product features, switching costs, internal efciency, and interorganizational efciency. Initially, IT efforts were aimed at increasing comparative efciency. Lately, however, IT is also dealing with the other items, such as impacting search and switching costs by use of the Web. Let us consider how IT can support the ve activities (shown on the left side of Figure W3.2.1) that drive bargaining power and comparative efciency from the point of view of a company planning a defensive strategy. 1. IT can create or enhance unique product features. For example, Mattel enables customization of its Barbie dolls over the Web. Similarly, Rosenbluths systems provide unmatchable cost reduction for their customers. 2. IT can increase the switching cost to a companys customers when certain IT-based services are provided (e.g., a Web-based tracking system). 3. IT contributes to internal efciency; it is known for its effectiveness in reducing costs and increasing productivity, as shown throughout the book. 4. IT can increase interorganizational efciency through synergy, enhancing business partnerships, joint ventures, and other alliances. This is done by
W44
using EDI, extranets, and vertical exchanges for procurement (see Chapter 5 in the text). 5. IT can create new business models, such as reverse auctions and vertical exchanges, or can support new business models, such as fee for service, which replaced commissions as the revenue model of Rosenbluth. In doing so, improved internal efciency, interorganizational efciency, and searchrelated costs all contribute to competitive advantage. F. W. McFarlan developed a framework (1984) with which organizations can analyze their mix of existing, planned, and potential information systems. The framework, which can be applied to any type of application, including e-commerce, can be viewed as a four-cell matrix. Applications are classied into a collection (portfolio) of the following four categories: 1. High potential: applications that may be important in achieving future business success (such as intelligent systems or human resources planning) 2. Key operational: applications upon which the organization currently depends for success (such as inventory control, accounting receivable, personnel duties) 3. Strategic: applications that are critical for future business strategy (eprocurement, extranet, enterprise resource planning) 4. Support: applications that are currently valuable and desirable (but not critical) for business success (such as videoconferencing and multimedia presentations) Note that the classication is done according to current and future contributions as perceived by management. Note also that the positioning of the applications may vary from company to company. For example, online training, which we listed as a support application, would be a key operational application for a software vendor. McFarlans framework is important for allocating funds to IT initiatives, especially to costly ones. Figure W3.2.2 shows, for example, how one airline classied its current e-commerce projects. The customer resource life-cycle (CRLC) framework, set forth by Ives and Learmouth (1984), focuses on the relationship with customers. The idea behind CRLC is that an organization differentiates itself from its competition in the eyes of the customer. Therefore, concentrating on the customer relationship is the key to achieving a strategic advantage. CRLC postulates that the customer goes through 13 fundamental stages in the relationship with a supplier and that each stage should be examined to
Support Frequent-flyer account tracking, online credit union, online training, wireless SMS information
W45
determine whether IT can be used to achieve a strategic advantage. (See Table W3.2.1 for a list of the stages.) This approach is used, for example, in developing electronic commerce systems. For example, Gonsalves et al. (1999) used the model to analyze the impact of the Web on competitiveness. The CRLC concept is one of the foundations upon which customer relationship management (CRM) is based.