Chapter 15 Online File W15.1 Project Management Software Online File W15.2 Types of End-user Computing Online File W15.3 Delivery and Process Risks of Offshore Outsourcing Online File W15.4 Utility Computing: “The Next Big Thing” Online File W15.5 Criteria for Determining Which Acquisition Approach to Use Online File W15.6 The Process of Vendor and Software Selection Online File W15.7 Boeing Designs a New Aircraft Online File W15.8 The Drivers of Process Redesign Online File W15.9 Changes of Business Processes Brought by IT Online File W15.10 Ten Reasons to Value BPR Software Online File W15.11 Restructuring Processes and Organizations W-292 W-293 ONLINE FILE W15.1 PROJECT MANAGEMENT SOFTWARE Along with the managerially oriented project skills set, there are excellent software tools to assist project managers. These include Microsoft Project (microsoft.com), PlanView (PlanView Inc.), and ActiveProject (Framework Technologies Corporation). Many of these tools are Web-enabled to allow collaborative teamwork online over time and distance. Microsoft Project 2003 with Microsoft Project Central software includes a friendly Web-based collaboration tool. PlanView Web Software is designed to handle project and workforce management (PlanView Inc., Austin, Texas). PlanView is a dynamic, multidimensional tool for resource and program management. It includes the HomeView Portal. Most project management tools are Web-based, including PlanView, Microsoft Project, Rational Software’s Rational Unified Process (RUP), Business Engine’s Business Engine Software (BEN), Metafuse Inc.’s Project Insight, and onProject Inc.’s S-O Comply. Allan (2005) provides a practical guide on the use of different types of project management software. Gates (2003) describes how many vendors of project management tools have added portfolio management tools into project management systems. For example, WorkLenz from Metier Ltd. aggregates and analyzes project data across the enterprise to identify inefficiencies, predict future work, and improve processes. Microsoft Project includes a centralized repository of projects and resources. S-O Comply from onProject Inc. allows users to view all projects, tasks, resources, issues, files, events, and notices. This helps an organization to see how all projects fit together and how they affect each other and various departments in the organization. One approach to project portfolio management is to create a digital dashboard to track projects’ progress. The dashboard provides an early warning system to alert project managers of problems. Still another aspect new project management tools are addressing is collaboration among disparate development teams. Project managers are using GSS software and systems like Groove Virtual Office and WebEx WebOffice directly. In addition, project management software systems are incorporating GSS capabilities. For example, Georgia (2001) describes Inovie Software’s TeamCenter and Primaverea Systems’ TeamPlay, which provide collaboration features and Web functionality. Metier’s WorkLenz product includes document attachment sharing, threaded notes discussions, and e-mail alerts features to aid in collaboration. In addition, the product is Web-enabled so it can be accessed from anywhere. Project management software and methods are surveyed on a regular basis. Trepper (2000a, 2000b) provided a list of representative project/process management products. Ali and Money (2005) surveyed 497 users on the acceptance and usage of project management software. References for Online File W15.1 Ali, A. S. B., and W. H. Money, “A Study of Project Management System Acceptance,” Proceedings of the 38th Annual Hawaii International Conference on System Sciences, 2005, pp. 234–244. Allan, B., Project Management: Tools and Techniques for Today’s ILS Professional. London, UK: Facet Publishing, 2005. Gates, L., “Project Management Tools: A New Look,” Application Development Trends, 2003. Georgia, B. “Building a Better Project,” NetWorld, Vol. 18, No. 11, March 12, 2001. Trepper, C. H., “A Project Management Primer,” Application Development Trends, August 2000a. Trepper, C. H., “Getting an Edge on the Competition,” Information Week, August 28, 2000b. W-294 ONLINE FILE W15.2 TYPES OF END-USER COMPUTING Researchers have identified the six end-user computing categories shown in Figure W15.2.1 (see Rockart and Flannery, 1983; and Guimaraes, 1999). Note that the last four of these categories participate in some form of development. With experience, end users can migrate into the development categories, or advance from doing limited to more extensive development. In the 1980s, many large organizations set up information centers to help their employees learn how to use the emerging technology of personal computing. These information centers had their own office space and a variety of PC hardware and software, as well as employees in category 5 in the table. Although some organizations have since closed their information centers, they typically continue to provide end users with help-desk and training functions from other locations or through outsourcing. The running of information centers in the twenty-first century is quite different from that of the 1980s. Category Activities Figure W15.2.1 1. 2. 3. 4. 5. 6. Enter data, use application Access data, print reports Develop applications for personal use Develop applications for others to use Training, hotline, develop applications Work on a contract basis Categories of end-user computing. *Support personnel and programmers are typically not employees of user workgroups. Nonprogramming end users Command-level users End-user programmers Functional support personnel End-user computing support personnel* Programmers* References for Online File W15.2 Guimaraes, T., “Empirically Testing the Relationship Between EndUser Computing Problems and Information Center Success Factors,” Decision Sciences, Spring 1999. Rockart, J. F., and L. S. Flannery, “The Management of End-User Computing,” Communications of the ACM, October 1983. W-295 ONLINE FILE W15.3 Delivery and Process Risks of Offshore Outsourcing Risk Category Description of Risk Cultural Differences in culture inhabit the offshore outsourcing relationship—including national and corporate cultural differences. Limited understanding of the language—mainly for involved employees who are not native English speakers—hinders the service delivery process. Interaction between the service recipient and service provider representatives is hindered by time zone differences. Changes in the scope of the offshore outsourcing contract impact the service delivery process (i.e., uniform service delivery processes and certification support managing change). The absence of employees with the right skill set and competencies limits the quality of the service delivery process. Due to staff rotation, instability in the team that is responsible for the service delivery process constrains the service delivery process. Unstable infrastructure to support the service delivery process hinders the service delivery process—including telecommunications and data infrastructure. Protecting physical assets and intellectual property ensures the continuity of the service delivery process. Knowledge transfer processes between the service provider and service recipient are essential to the service delivery process. This is impacted by cultural risks and language and communication risks. Limited understanding of the business processes of the service recipient’s IT professionals hinders the service delivery process. Language and communications Different time zones Managing scope changes Human capital Rotating onshore resources Infrastructure Security and privacy Knowledge transfer Understanding of business processes of service recipient Geopolitical risk Size of the offshore outsourced IT service Length of the contract Trust and relationship War, terrorism, or internal armed conflicts might disturb the continuity of the service provisioning. Geographical locations have to be in stable regions. The size of the contracts has to be substantial for the service provider, to cover the coordination costs. The length of the contract determines the opportunity for the service provider to cover costs. Long-term contracts result in a lock-in of the service recipient and short-term contracts will not support the implementation of a proper service delivery process by the service provider. Therefore the length of the contract needs to be balanced. Lack of mutual trust between the offshore vendor and client. Ensure both parties understand the expectation and success factors. Sources: Beulen, E., P.V. Fenema, and W. Currie, “From Application Outsourcing to Infrastructure Management: Extending the Offshore Outsourcing Server Portfolio,” European Management Journal, 23(2), 2005, pp. 133–144; and Sinha, D., and R. Terdiman, “Potential Risks in offshore sourcing,” Gartner Research, ID Number: ITSV-WW-DP-0360, September 2002. W-296 ONLINE FILE W15.4 UTILITY COMPUTING: “THE NEXT BIG THING” Imagine this scene. It’s noon on Friday and you just found out that your relatives are coming to spend the weekend. It’s time to contact the electric company to let them know that you will need extra electricity for the weekend. You’re told you have to fill out a purchase order and it will be five to seven days before you can get extra electricity. Of course, life is not like this, because basic utilities have extra capacity built into their delivery systems. But this would be a likely scenario if you were to find out at noon on Friday that you were expecting a major spike in usage on your servers. You’d have to call your provider, do a bunch of paperwork, and maybe in a few days you could get the extra capacity you need. That’s the kind of problem that utility computing aims to solve. THE TECHNOLOGY IMPLEMENTATION CONCLUSION Utility computing vendors are looking toward a future in which computing capacity is as easy to acquire as electricity. Rather than having a fixed amount of computing resources, you would have access to computing resources on an as-needed basis— just like electricity. Many IT market leaders are now starting to catch on to the concept of utility computing as a bulletproof utility service that we can virtually take for granted. IBM has spent more than $10 billion on its on-demand computing initiatives. HP also developed its Utility Data Center architecture, and Sun has its own N1 data center virtualization projects. Sun, HP, and IBM are duking it out over how best to meet utility computing requirements and command a leadership position. Already present in a variety of capacity-based pricing models, utility computing is poised to expand throughout the enterprise as various key technologies intersect (e.g., Web Services, grid computing, and provisioning). Growth of utility computing in the enterprise will deliver to the industry not only equal access to supercomputing resources, but also new revenue streams for commercial data centers, new application pricing models based on metered use, and an open computing infrastructure for companies with little or no standing IT maintenance budget. Utility computing is on track to be the “next big thing” for IT vendors and services companies that sell to large enterprises. Utility computing (also called “on-demand computing”) has become one of the hot topics in the IT analyst community and, increasingly, in larger enterprises that are looking for ways to reduce the fixed costs and complexity of IT. Utility computing tools provide total flexibility in information systems development, from in-house and self-managed to fully outsourced, with everything in between—including a hybrid deployment model in which in-house capacity can be supplemented by thirdparty resources to handle peak needs. Utility computing presents an IT paradigm shift (see Stafford 2005). References for Online File W15.4 Noel, D., “The Utility Computing Promise,” InfoWorld, April 2002. Stafford, J., “CEO: Labor Costs to Plummet with Utility Computing,” Enterprise Linux News, February 2005, utilitycomputing.itworld.com/ 4804/050215uclabor (accessed June 2006). Zimmerman, J., “Utility Computing Is the Next Big Thing,” ZDNetUK: Tech Update, March 2003, insight.zdnet.co.uk/hardware/servers/ 0,39020445,2131446,00.htm (accessed June 2006). W-297 ONLINE FILE W.15.5 CRITERIA FOR DETERMINING WHICH ACQUISITION APPROACH TO USE If a company decides to buy or lease an IT application, the following representative selection criteria need to be considered: • • • • • • • • • • • Functionality and flexibility. Commercial packages need to be modified or adapted to the specific requirements of an application. Therefore, it is important to evaluate the extent to which a package can be adapted and the willingness of the vendor to perform or support the adaptation. Information requirements. The selected package should satisfy the information requirements of the users. Information collection, storage and retrieval capabilities, and the database structure should be carefully examined. User friendliness. User friendliness is important. If the IT application is hard for business professionals to use, then it will be rarely used. Hardware and software resources. The computer type and the operating system required by the IT package must be compatible with the existing infrastructure. The CPU and storage requirements are also important considerations. Installation. The installation effort required to implement the package should also be taken into account. Some packages are complex, and their installation requires extensive consultation. The installation process may also take a considerable amount of time. Maintenance services. Because IT application requirements could be constantly changing, continuous maintenance is required. It is important to consider how often the package needs to be upgraded and whether the vendor provides assistance for its maintenance. Vendor quality and track record. It is less risky to acquire an IT package from a vendor that has a good reputation and track record than from one with a lessthan-stellar or unknown reputation. The quality of the vendors can be indicated by their related experience in the particular application and their sales and financial records, as well as their responsiveness to clients’ requests. To minimize risk, minor applications should be leased first. Estimating costs. The total costs of IT projects are usually difficult to assess and often underestimated. In addition to the obvious costs associated with system acquisition or development, it is also important to factor in the costs of installation, integration, customization, and maintenance. Measuring benefits. It is often difficult to accurately predict the benefits of EC applications, because such applications are usually novel and may have no precedent for comparisons. Furthermore, some IT and EC applications are interorganizational and are thus influenced by the environment of the organization. Such effects are usually intangible and difficult to isolate and quantify. Personnel. Staffing requirements should be planned for in advance to ensure that the organization has the appropriate human resources for systems development (in the case of in-house development), implementation, operation, and maintenance. It may be difficult to recruit and retain IS personnel with appropriate knowledge and experience in certain types of IT application development. Special expertise can be acquired from external consultants, but usually at a very high cost. Technological evolution. Planning ahead for technological evolution facilitates the upgrade of IT applications and enables the organization to adopt innovations W-298 • • • • • more quickly than the competition. It is therefore very important to allow for flexibility in the application design so that the chosen options do not impose major limitations on future choices. Given the rapid pace of IT evolution, it is sometimes preferable to develop IT applications incrementally to take advantage of the latest developments in the technology. Scaling. System scalability refers to how big a system can grow in various dimensions to provide more service. Scalability can be measured in several ways, including the total number of users, the number of simultaneous users, and the transaction volume. These dimensions are not independent, because scaling up the size of the system in one dimension can affect the other dimensions. The growth of scale is facilitated or constrained by the system architecture. Sizing. The required size and performance of an application are also difficult to predict, because the growth of the user population of certain IT applications is hard to anticipate. Overloading the application decreases performance. Performance. System performance is a critical factor for business success. In addition to convenience, good performance also brings customers and competitive advantages. Performance is measured by two main metrics: latency and throughput. Latency measures the time required to complete an operation such as downloading a Web page. It is an indicator of the users’ experience with the system. Throughput measures the number of operations completed in a given period of time. It indicates the capacity or number of users that a system can handle. Throughput and latency are interrelated. An increase in either measure will lead to an increase in the other. Reliability. Reliability is an essential requirement for a successful system. System failures and downtime may lead to public embarrassment. When an IT application fails, business is interrupted and the company loses customers. System reliability can be enhanced through redundancy (i.e., backup systems). Security. Security is one of the most important factors for the adoption and diffusion of IT applications. Data and information flow in IT applications, as well as stored data, may include private and/or proprietary information. Thus, a selected package must meet strict security requirements. Systems, communication, and data security must be addressed early in the design of the applications and not after their implementation. In addition to technological solutions such as firewalls and encryption, physical and procedural security measures must also be enforced. W-299 ONLINE FILE W15.6 THE PROCESS OF VENDOR AND SOFTWARE SELECTION Martin et al. (2002) identified six steps in selecting a software vendor and an MSS package. These six steps are illustrated in Figure 15.5 and explained in the following sections. STEP 1: IDENTIFY POTENTIAL VENDORS STEP 2: DETERMINE THE EVALUATION CRITERIA STEP 3: EVALUATE VENDORS AND PACKAGES STEP 4: CHOOSE THE VENDOR AND PACKAGE Potential vendors can be identified from software catalogs, lists provided by hardware vendors, technical and trade journals, consultants experienced in the application area, peers in other companies, and Web searches. These sources often yield so many vendors and packages that one must use some preliminary evaluation criteria to eliminate all but a few of the most promising ones from further consideration. For example, one can eliminate vendors that are too small or that have no track record or a questionable reputation. Also, packages may be eliminated if they do not have the required features or will not work with available hardware or operating system, communications network, or database management software. The most difficult and crucial task in evaluating a vendor and a packaged system is to determine a weighted set of detailed criteria for choosing the best vendor and package. Some areas in which detailed criteria should be developed are characteristics of the vendor, functional requirements of the system, technical requirements the software must satisfy, amount and quality of documentation provided, and vendor support of the package. These criteria should be documented in a request for proposal (RFP), which is sent to potential vendors to invite them to submit a proposal describing their software package and how it would meet the company’s needs. The RFP provides the vendors with information about the objectives and requirements of the system, the environment in which the system will be used, the general criteria that will be used to evaluate the proposals, and the conditions for submitting proposals. The collective responses to an RFP generate massive volumes of information that must be evaluated to determine the gaps between the company’s needs (as specified by the requirements) and the capabilities of the vendors and their application packages. Often, the vendors and packages are given an overall score by assigning an importance weight to each of the criteria, ranking the vendors on each of the weighted criteria (say 1 to 10), and then multiplying the ranks by the associated weights. Once a short list has been prepared, negotiations can begin with vendors to determine how their packages might be modified to remove any discrepancies with the company’s desired MSS application. Thus, one of the most important factors in the decision is the additional development effort that may be required to tailor the system to the company’s needs or at least to integrate it into the company’s environment. Additionally, the opinions of the users who will work with the system and the IT personnel who will have to support the system have to be considered. W-300 STEP 5: NEGOTIATE A CONTRACT STEP 6: ESTABLISH A SERVICE-LEVEL AGREEMENT The contract with the software vendor is very important. Not only does it specify the price of the software, but it also determines the type and amount of support to be provided by the vendor. The contract will be the only recourse if the system or the vendor does not perform as specified. Furthermore, if the vendor is modifying the software to tailor it to the company’s needs, the contract must include detailed specifications (essentially the requirements) of the modifications. Also, the contract should describe in detail the acceptance tests the software package must pass. Service-level agreements (SLAs) are formal agreements regarding the division of work between a company and its vendors. Such divisions are based on a set of agreed-upon milestones, quality checks, what-if situations, how checks will be made, and what is to be done in case of disputes. If the vendor is to meet its objectives of installing MSS applications, it must develop and deliver support services to meet these objectives. An effective approach to managing SLAs must achieve both facilitation and coordination. SLAs do this by (1) defining the partners’ responsibilities, (2) providing a framework for designing support services, and (3) allowing the company to retain as much control as possible over their own systems. Reference for Online File W15.6 Martin, E. W., et al., Managing Information Technology, 4th ed. Upper Saddle River, NJ: Prentice Hall, 2002. W-301 ONLINE FILE W15.7 IT at Work Boeing Designs a New Aircraft Boeing (boeing.com) is at a critical time in its history. European aerospace rival Airbus (airbus.com) has overtaken Boeing in commercial-airplane deliveries, and the two companies have different strategies for next-generation airplanes. Airbus is betting on a 550-seat aircraft called the A380. In contrast, Boeing is planning for a 200- to 300-passenger jet designed to consume 20 percent less fuel than bigger jets and fly longer routes previously limited to larger planes. Boeing has named its new jet the 787 Dreamliner. The company plans to start production of the 787 in 2006, with aricraft to be in service by 2008. The 787 represents a dramatic shift in how Boeing builds planes. The company, which used to design and build the bulk of its aircraft, will outsource 70 percent of the airplane to suppliers. This outsourcing will require cross-company, global collaboration. Boeing is designing the Dreamliner for half the cost of its last flagship airplane (the Boeing 777). To accomplish that, Boeing will use—and will insist that key suppliers use—software that lets designers around the world collaborate electronically in designing every manufacturing process and every component, Reference for Online File W15.7 Bacheldor, B., “Boeing’s Flight Plan,” Information Week, February 16, 2004. POM from wings to seat-back trays. As a result of this collaboration, the company anticipates improved efficiency in the plane’s development process. Designers will use a single set of data, so the data will not have to be reproduced for multiple purposes as in the past. In addition, planners will be able to simulate digitally the plane’s life cycle from design through production. The ability to quickly model iterations of a design will reduce errors and redundant work in achieving the best design. Boeing is using a “relational design,” which means that the digital models it builds will be made up of virtual components—digital versions of the chairs, metal, and screws used to build a plane. For example, if designers move the location of the windows, the associated parts will move with it, speeding the process. Also, models can also be used to test component combinations to see, for example, if the design can handle certain loads. Source: Compiled from Bacheldor (2004) and boeing.com (accessed June 2006). For Further Exploration: What makes the management of collaborative business processes difficult? W-302 ONLINE FILE W15.8 THE DRIVERS OF PROCESS REDESIGN • • • • • • • • • • Fitting commercial software. To reap the best benefit of buying or leasing software, it is frequently best to use the software as it is rather than to modify it. But what if the software does not fit your business processes, and it is not possible or advisable to change the software? The best solution sometimes is to redesign the affected business processes. Typical software in this category are the functional information systems, ERP, business intelligence, and business performance management software. Restructuring old processes prior to automation. Many organizations believe that the solution to their problem is to automate business processes. While in some cases it makes sense to do it, in many others it does not. Automating ineffective processes can result in only small savings, whereas restructuring can result in a much larger savings. Need for information integration. Focusing on vertical functions and their corresponding information systems to support the business has resulted in fragmented, piecemeal information systems. Integration of information is required for good decision making. Achieving it is one of the goals of business process redesign. Reducing cycle time. Cycle time refers to the time it takes to complete a process from beginning to end. As discussed earlier, competition today focuses not only on cost and quality, but also on speed. Time is recognized as a major element that provides competitive advantage, and therefore cycle time reduction is a major business objective. Need for customization. In today’s competitive business environment, customers demand products more customized to match their unique needs. Customization means major shifts in operating methods throughout the organization, engineering, manufacturing, marketing, and the supply chain. Business process redesign is an important strategy to achieve successful mass customization. Empowering employees. Empowering employees means giving employees power to do their job. To be empowered, employees need a system that would enable them to collaborate and give them an up-to-date view of the company’s activities. Streamlining the supply chain. As seen in Chapter 8, it is frequently necessary to change segments in the supply chain to streamline its operations and to better collaborate with business partners. Redesign is frequently done on small segments of the chain, but sometimes the entire chain is redesigned. Improving customer service. To properly introduce CRM, it is often necessary to change business processes. As will be seen later in this chapter, centralizing 800 numbers and empowering frontline employees involve process restructuring. Participating in private or public e-marketplaces. With the increased trend to use e-marketplaces comes the need to get connected to them, as well as to the organization’s back-end processes. To enable such integration, it is frequently necessary to redesign internal as well as external processes. The same is true with participation in auction sites. Not changing the processes results in manual operations (e.g., data entry) that may be expensive, slow, and error-prone. Conducting e-procurement. Introduction of e-procurement methods frequently requires complete redesign of the purchasing process (requisition, approval, control, and payment for purchases). W-303 • • • Enabling direct online marketing. Many manufacturers as well as retailers are using direct marketing to consumers, mostly via the Internet. Moving to such a business model requires design or redesign of order taking and order fulfilment. Reducing cost and improving productivity. For generations, companies have sought to reduce costs and increase productivity. An example is industrial engineering methods. Many of these are part of continuous small improvements, while others require radical changes in business processes. Transformation to e-business. When organizations transform themselves to e-business, usually by automating processes or collaborating electronically, they frequently need to change their business processes. W-304 ONLINE FILE W15.9 Changes in Business Processes Brought by IT Old Rule Intervening Technology New Rule Information appears in only one place at one time. Only an expert can perform complex work. Business must be either centralized or distributed. Only managers make decisions. Field personnel need offices to receive, send, store, and process information. The best contact with potential buyers is a personal contact. You have to locate items manually. Plans get revised periodically. Shared databases, client/server architecture, Internet, intranets Expert systems, neural computing Information appears simultaneously wherever needed. Novices can perform complex work. Business can be both centralized and distributed. Decision making is part of everyone’s job. Field personnel can manage information from any location. People must come to one place to work together. Customized products and services are expensive and take a long time to develop. A long period of time is spanned between the inception of an idea and its implementation (time-to-market). Organizations and processes are information-based. Move labor to countries where labor is inexpensive (off-shore production). Telecommunications and networks: client/server, intranet Decision support systems, enterprise support systems, expert systems Wireless communication and portable computers, the Web, electronic mail Interactive videodisk, desktop teleconferencing, electronic mail Tracking technology, groupware, workflow software, search engines High-performance computing systems, intelligent agents Groupware and group support systems, telecommunications, electronic mail, client/server CAD/CAM, CASE tools, online systems for JIT decision making, expert systems CAD/CAM, electronic data interchange, groupware, imaging (document) processing Artificial intelligence, expert systems Robots, imaging technologies, object-oriented programming, expert systems, geographical information systems (GIS) The best contact is the one that is most cost-effective. Items are located automatically. Plans get revised instantaneously whenever needed. People can work together while at different locations. Customized products can be made quickly and inexpensively (mass customization). Time-to-market can be reduced by 90 percent. Organizations and processes are knowledge-based. Work can be done in countries with high wages and salaries. Source: Compiled from M. Hammer and J. Champy, Re-engineering the Corporation (New York: Harper Business, 2001). W-305 ONLINE FILE W15.10 Ten Reasons to Value BPR Software Reason Description Graphical representation of process on a timeline The software allows easy capture of relevant process data (activities, resources, organizational data) into an organized repository that facilitates graphical representation of process flow on a timeline. BPR software facilitates the graphical display and analysis of a business process. The software facilitates the selection of different process data, process performance calculations, and for comparing process redesign alternatives. With the software, it is easy to ask what-if-questions and to assess the impacts of different process designs and organizational parameters. The software can simulate process behavior based on probabilistic input rates with visual tracking of work in queues and can uncover process capacity bottlenecks. The software allows the analysis and redesign of a particular process case or a comprehensive assessment of all possible cases combined. The software facilitates the business professional in processing analysis and reporting, its resource allocation capabilities, and links to costing, and the usefulness of its outputs for presentation to management. The software forces careful and blow-by-blow descriptions of process specifics. This helps deepen the understanding of how a process works. The software speaks the language of business processes and management rather than the language of data flows and software engineering. The software sensitizes the importance of coordinating dynamic interdependence among the different parts of a business process. Examining process at any level of detail Graphical objects that are “live” with data What-if capabilities Animated simulation Case generation and analysis BPR software is a business tool When you can explicitly describe a process, you deeply understand it A shared business language for communicating about processes and BPR BPR software changes the way you think about processes and BPR Source: Compiled from El Sawy (2001). Reference for Online File W15.10 El Sawy, O., Redesigning Enterprise Processes for E-Business. New York: McGraw-Hill, 2001. W-306 ONLINE FILE W15.11 RESTRUCTURING PROCESSES AND ORGANIZATIONS Redesign, restructuring, and reengineering efforts involve many activities, three of which are described in this section: redesign of one or a few processes, cycle time reduction, and restructuring the entire organization REDESIGN OF ONE OR A FEW PROCESSES Redesign efforts frequently involve only one or a few processes. One of the most publicized examples of process redesign is the accounts payable process at Ford Motor Company (Hammer and Champy, 1983). The Ford example, as shown in Figure W15.11.1, demonstrates changes in a simple process. Khan (2000) describes the restructure of an air cargo process that was much more complicated and involved several IT tools. Cycle time refers to the time it takes to complete a process from beginning to end. As discussed earlier, competition today focuses not only on cost and quality, but also on speed. Time is recognized as a major element that provides competitive advantage, and therefore cycle time reduction is a major business objective. The success of Federal Express, for example, is clearly attributable to its ability to reduce the delivery time of packages. It does this by using complex computer-supported systems that allow flexible planning, organization, and control (see Wetherbe, 1996). Additionally, the Internet, extranets, and intranets provide a means of economically reducing cycle time by cutting communications time through the use of e-mail and EDI (also Internet/EDI) and by allowing collaboration in design and operations of products and services. CYCLE TIME REDUCTION RESTRUCTURING THE WHOLE ORGANIZATION The fundamental problem with the hierarchical organizational structure is that any time a decision needs to be made, it must climb up and down the hierarchy. If one person says “no” to a pending decision, everything comes to a screeching halt. Also, if information is required from several “functional sources,” getting all the right information coordinated can be a time-consuming and frustrating process for employees and customers alike. So, how is organizational redesign done? It varies, depending on the organization and the circumstances. For example, providing each customer with a single New Process Old Process Supplier Purchasing Purchase order Copy of purchase order Supplier Purchasing Purchase order Goods Goods Ford receiving Ford receiving Receiving document Invoice Database Accounts payable Accounts payable Payment 500 Employees Figure W15.11.1 Reengineering processes at Ford Motor Company. Payment 125 Employees W-307 Customer Call center Account manager supported (via a portal) by. . . My accounts Customer accounts Databases Checking accounts Expert system Installment loans Backed up by. . . Savings accounts Mortgage loans Investment expert Trusts Etc. Statement Etc. Figure W15.11.2 Reengineered bank with integrated system. Loan expert Consolidated statement point of contact can solve the stovepipe problem. In the traditional bank, for example, each department views the same customer as a separate customer. Figure W15.11.2 depicts a redesigned bank in which the customer deals with a single point of contact, the account manager. The account manager is responsible for all bank services and provides all services to the customer, who receives a single statement for all of his or her accounts and can access all accounts on the same Web page (“My Accounts”). Notice that the role of IT is to back up the account manager by providing her with expert advice on specialized topics, such as loans. Also, by having easy access to the different databases, the account manager can answer queries, plan, and organize the work with customers. An alternative to the single-point contact is a networked structure. In this structure, regardless of where and when a client contacts the company, the networked agents would have access to all customer data, so that any employee can provide excellent customer service. Companies such as USAA, Otis Elevator, and others have all agents located in one city and give customers around the country the same toll-free number and a centralized Web address. In this model, the company also can install a computer-based call-center technology, which brings up complete customer information (or information about a customer’s elevator in the case of Otis) on the computer screen, whenever a customer calls. This means that anyone who answers the call would know all the information necessary to make a quick, frontline decision (see Chapter 12). There is no need to ask questions of the customer, and any agent can give personalized and customized service. This is especially important in services such as reservation systems for hotels or airlines, as well as for utility companies, financial services, universities, and health care services. W-308 References for Online File W15.11 Khan, M. R. R., “BPR of an Air Cargo Handling Process,” International Journal of Production Economics, January 2000. Hammer, M., and J. Champy, Re-engineering the Corporation. New York: Harper Business, 1983. Wetherbe, J. C., The World on Time. Santa Monica, CA: Knowledge Exchange, 1996.
© Copyright 2026 Paperzz