Acquiring Competitive Advantage through Business Intelligence

Acquiring Competitive Advantage through Business Intelligence

Foad Boghrati, Iman Raeesi Vanani, Babak Sohrabi
Copyright: © 2015 |Pages: 13
DOI: 10.4018/978-1-4666-5888-2.ch438
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Chapter Preview

Top

Background

Software systems are widely used in virtually all industries as a means of automating business processes. Organizations deploy them in order to provide innovative and value adding services, as well as to reduce their operational costs (Martikainen, 2007). According to Tyrvainen et al. (2008), software is vertically integrated in the beginning of its lifecycle; often both software and hardware are produced by the same vendor. However, as the organizations need to focus their efforts on a specific part in their business, parts of the software are outsourced to subcontractors or otherwise acquired from third parties. As a result, in many cases, the initially vertically integrated software eventually becomes split into a set of horizontal software layers with standardized interfaces among them, and with the software at each layer being provided by independent software vendors (Mazhelis et al., 2012).

Today software is increasingly needed, both for new products as well as in various development and manufacturing processes. Software products fall into the categories of standardized and tailor-made software project business, which are polar opposites in the international software industry (Cusumano, 2004).

Key Terms in this Chapter

Competitive advantage: The ability gained through attributes and resources to perform at a higher level than others in the same industry or market.

Software Development Industry: Businesses for development, maintenance and publication of software that are using different business models.

Business Intelligence: The ability of an organization to collect, maintain, and organize knowledge in order to develop new business opportunities and mitigate existing threats.

Complete Chapter List

Search this Book:
Reset