Table of Contents
Hoorcollege 1 M1...............................................................................................................4
Social media and digital co-creation.............................................................................................4
Filter bubbles................................................................................................................................5
Hoorcollege 3 M3...............................................................................................................6
Components.................................................................................................................................6
Bits and bytes...............................................................................................................................6
IT Hardware..................................................................................................................................7
Evolution of IT hardware (I)............................................................................................................................7
Evolution of IT hardware (II)...........................................................................................................................7
Evolution of IT hardware (III)..........................................................................................................................7
The Internet.................................................................................................................................8
IP addresses..................................................................................................................................8
Domain Name Service (DNS)........................................................................................................8
TCP/IP..........................................................................................................................................8
Cloud Computing..........................................................................................................................9
From infrastructure to Power: Net Neutrality.............................................................................10
Hoorcollege 4 M4.............................................................................................................11
Sustainable competitive advantage............................................................................................11
Operational effectiveness...........................................................................................................11
Strategic positioning (I)...............................................................................................................11
Understanding competitive advantage: The Resource-based view.............................................11
Examples of powerful resources (I).............................................................................................12
Examples of powerful resources (II)............................................................................................12
Examples of powerful resources (III)...........................................................................................12
Examples of powerful resources (IV)..........................................................................................13
Examples of powerful resources (V)...........................................................................................13
Examples of powerful resources (VI)..........................................................................................13
Examples of powerful resources (VII).........................................................................................13
Examples of powerful resources (VIII)........................................................................................13
Turning technology into powerful resources: The case of RFID (I)..............................................14
The scarcest resource in the analytics age: People.....................................................................14
Data Science...............................................................................................................................15
Lesson 1: Digital goods and the Long Tail....................................................................................15
Lesson 2: The Long-enough Tail..................................................................................................16
Lesson 3: Collaborative filtering and the data asset....................................................................16
1
,Hoorcollege 5 M5.............................................................................................................17
Business processes.....................................................................................................................17
Business Process Models............................................................................................................18
Business Process Management lifecycle (I).................................................................................18
Business process model and notation.........................................................................................19
BPMN: Events and activities.......................................................................................................19
BPMN: Branching and merging...................................................................................................20
BPMN: Exclusive decisions (I).....................................................................................................21
BPMN: Parallel execution...........................................................................................................21
BPMN: Resources.......................................................................................................................22
Hoorcollege 6 M6.............................................................................................................24
Part 1: relational databases........................................................................................................24
The relational database model.....................................................................................................................24
Part 2: SQL and Data Manipulation.............................................................................................24
Hoorcollege 7 M6.............................................................................................................26
Part 3: Normalization..................................................................................................................26
Normal Forms...............................................................................................................................................26
Summary: Effects of normalization..............................................................................................................27
Hoorcollege 8 M8.............................................................................................................28
Part 4: Data Modelling................................................................................................................28
Entity-relationship model...........................................................................................................28
Entities and attributes................................................................................................................28
Optional relationships................................................................................................................29
Sets and keys..............................................................................................................................29
The M:N-Problem.......................................................................................................................31
Hoorcollege 9 M7.............................................................................................................33
Generating and processing data.................................................................................................33
Types of TPS...............................................................................................................................33
Enterprise systems.....................................................................................................................33
Database management system...................................................................................................34
Integrating the data asset: Data warehousing............................................................................34
Business intelligence..................................................................................................................34
Online Analytical Processing (OLAP)...........................................................................................35
Data mining................................................................................................................................35
Association rules........................................................................................................................35
Big data......................................................................................................................................36
Analytics.....................................................................................................................................37
2
,Hoorcollege 10 M8...........................................................................................................40
Value sources in networks..........................................................................................................40
Platform Ecosystems..................................................................................................................41
Developments in ticketing business (2017/2018).......................................................................41
A market perspective on networks.............................................................................................42
Network effects and competition...............................................................................................42
Example 1: Desktop operating systems........................................................................................................42
Example 2: Mobile operation systems.........................................................................................................43
Example 3: Social media...............................................................................................................................43
Example 4: search engines............................................................................................................................43
Example 5: online ad revenue......................................................................................................................43
Competing when network effects matter...................................................................................43
Platforms, collaborative consumption, and servitization............................................................44
Servitization and Stan Shih’s smile curve....................................................................................44
Why newer of better services?...................................................................................................44
Hoorcollege 11 M9...........................................................................................................46
IT Security.........................................................................................................................46
Stuxnet.......................................................................................................................................46
A “target” for a hack...................................................................................................................46
Security weaknesses in organizational information systems......................................................46
Taking action as an organization.................................................................................................47
Network protection....................................................................................................................47
3
, Hoorcollege 1 M1
Social media and digital co-creation
Buzzwords:
- Web 2.0
- Social Media
- Collaborative Consumption
- Digital Co-Creation
Empower users to collaborate, create resources, and share
information
Value is not created by a firm alone, but by user through a platform
Algorithm: a procedure for solving a mathematical problem (as of finding
the greatest common divisor) in a finite number of steps that frequently
involves repetition of an operation.
Broadly: a step-by-step procedure for solving a problem or accomplishing
some end
Used for:
- Advertisements you are exposed to
- People we elect for office
- How the economy is run
Algorithmic systems are increasingly used as part of decision-making
processes, with potentially significant consequences for individuals,
organizations and societies as a whole.
Increasing concerns that many of these systems are opaque to the people
affected by their use and lack clear explanations for the decisions they
make.
This lack of transparency risks undermining meaningful scrutiny and
accountability.
- Which is a significant concern when these systems are applied as
part of decision-making processes that can have a considerable
impact on people’s human rights
- E.g. critical safety decisions in autonomous vehicles; allocation of
health and social services resources etc.
Problem:
- Social media platforms not only host this troubling content, they end
up recommending it to the people most vulnerable to it
- Platforms do more than make problematic content easily found – in
important ways they help amplify it
- Algorithmic recommendation intends to give users a personalized,
supposedly more enjoyable experience
4
Hoorcollege 1 M1...............................................................................................................4
Social media and digital co-creation.............................................................................................4
Filter bubbles................................................................................................................................5
Hoorcollege 3 M3...............................................................................................................6
Components.................................................................................................................................6
Bits and bytes...............................................................................................................................6
IT Hardware..................................................................................................................................7
Evolution of IT hardware (I)............................................................................................................................7
Evolution of IT hardware (II)...........................................................................................................................7
Evolution of IT hardware (III)..........................................................................................................................7
The Internet.................................................................................................................................8
IP addresses..................................................................................................................................8
Domain Name Service (DNS)........................................................................................................8
TCP/IP..........................................................................................................................................8
Cloud Computing..........................................................................................................................9
From infrastructure to Power: Net Neutrality.............................................................................10
Hoorcollege 4 M4.............................................................................................................11
Sustainable competitive advantage............................................................................................11
Operational effectiveness...........................................................................................................11
Strategic positioning (I)...............................................................................................................11
Understanding competitive advantage: The Resource-based view.............................................11
Examples of powerful resources (I).............................................................................................12
Examples of powerful resources (II)............................................................................................12
Examples of powerful resources (III)...........................................................................................12
Examples of powerful resources (IV)..........................................................................................13
Examples of powerful resources (V)...........................................................................................13
Examples of powerful resources (VI)..........................................................................................13
Examples of powerful resources (VII).........................................................................................13
Examples of powerful resources (VIII)........................................................................................13
Turning technology into powerful resources: The case of RFID (I)..............................................14
The scarcest resource in the analytics age: People.....................................................................14
Data Science...............................................................................................................................15
Lesson 1: Digital goods and the Long Tail....................................................................................15
Lesson 2: The Long-enough Tail..................................................................................................16
Lesson 3: Collaborative filtering and the data asset....................................................................16
1
,Hoorcollege 5 M5.............................................................................................................17
Business processes.....................................................................................................................17
Business Process Models............................................................................................................18
Business Process Management lifecycle (I).................................................................................18
Business process model and notation.........................................................................................19
BPMN: Events and activities.......................................................................................................19
BPMN: Branching and merging...................................................................................................20
BPMN: Exclusive decisions (I).....................................................................................................21
BPMN: Parallel execution...........................................................................................................21
BPMN: Resources.......................................................................................................................22
Hoorcollege 6 M6.............................................................................................................24
Part 1: relational databases........................................................................................................24
The relational database model.....................................................................................................................24
Part 2: SQL and Data Manipulation.............................................................................................24
Hoorcollege 7 M6.............................................................................................................26
Part 3: Normalization..................................................................................................................26
Normal Forms...............................................................................................................................................26
Summary: Effects of normalization..............................................................................................................27
Hoorcollege 8 M8.............................................................................................................28
Part 4: Data Modelling................................................................................................................28
Entity-relationship model...........................................................................................................28
Entities and attributes................................................................................................................28
Optional relationships................................................................................................................29
Sets and keys..............................................................................................................................29
The M:N-Problem.......................................................................................................................31
Hoorcollege 9 M7.............................................................................................................33
Generating and processing data.................................................................................................33
Types of TPS...............................................................................................................................33
Enterprise systems.....................................................................................................................33
Database management system...................................................................................................34
Integrating the data asset: Data warehousing............................................................................34
Business intelligence..................................................................................................................34
Online Analytical Processing (OLAP)...........................................................................................35
Data mining................................................................................................................................35
Association rules........................................................................................................................35
Big data......................................................................................................................................36
Analytics.....................................................................................................................................37
2
,Hoorcollege 10 M8...........................................................................................................40
Value sources in networks..........................................................................................................40
Platform Ecosystems..................................................................................................................41
Developments in ticketing business (2017/2018).......................................................................41
A market perspective on networks.............................................................................................42
Network effects and competition...............................................................................................42
Example 1: Desktop operating systems........................................................................................................42
Example 2: Mobile operation systems.........................................................................................................43
Example 3: Social media...............................................................................................................................43
Example 4: search engines............................................................................................................................43
Example 5: online ad revenue......................................................................................................................43
Competing when network effects matter...................................................................................43
Platforms, collaborative consumption, and servitization............................................................44
Servitization and Stan Shih’s smile curve....................................................................................44
Why newer of better services?...................................................................................................44
Hoorcollege 11 M9...........................................................................................................46
IT Security.........................................................................................................................46
Stuxnet.......................................................................................................................................46
A “target” for a hack...................................................................................................................46
Security weaknesses in organizational information systems......................................................46
Taking action as an organization.................................................................................................47
Network protection....................................................................................................................47
3
, Hoorcollege 1 M1
Social media and digital co-creation
Buzzwords:
- Web 2.0
- Social Media
- Collaborative Consumption
- Digital Co-Creation
Empower users to collaborate, create resources, and share
information
Value is not created by a firm alone, but by user through a platform
Algorithm: a procedure for solving a mathematical problem (as of finding
the greatest common divisor) in a finite number of steps that frequently
involves repetition of an operation.
Broadly: a step-by-step procedure for solving a problem or accomplishing
some end
Used for:
- Advertisements you are exposed to
- People we elect for office
- How the economy is run
Algorithmic systems are increasingly used as part of decision-making
processes, with potentially significant consequences for individuals,
organizations and societies as a whole.
Increasing concerns that many of these systems are opaque to the people
affected by their use and lack clear explanations for the decisions they
make.
This lack of transparency risks undermining meaningful scrutiny and
accountability.
- Which is a significant concern when these systems are applied as
part of decision-making processes that can have a considerable
impact on people’s human rights
- E.g. critical safety decisions in autonomous vehicles; allocation of
health and social services resources etc.
Problem:
- Social media platforms not only host this troubling content, they end
up recommending it to the people most vulnerable to it
- Platforms do more than make problematic content easily found – in
important ways they help amplify it
- Algorithmic recommendation intends to give users a personalized,
supposedly more enjoyable experience
4